0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (3)
  • R250 - R500 (27)
  • R500+ (301)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

How To Hack Like A Legend (Paperback): Sparc Flow How To Hack Like A Legend (Paperback)
Sparc Flow
R813 R691 Discovery Miles 6 910 Save R122 (15%) Ships in 9 - 17 working days

Step into the shoes of a master hacker as he breaks into an intelligent, highly defensive Windows environment. You'll be infiltrating the suspicious (fictional) offshoring company G & S Trust and their hostile Microsoft stronghold. While the target is fictional, the corporation's vulnerabilities are based on real-life weaknesses in today s advanced Windows defense systems. You'll experience all the thrills, frustrations, dead-ends, and eureka moments of the mission first-hand, while picking up practical, cutting-edge techniques for evading Microsoft's best security systems.

Computer Forensics JumpStart 2e (Paperback, 2nd Edition): Mg Solomon Computer Forensics JumpStart 2e (Paperback, 2nd Edition)
Mg Solomon
R697 R626 Discovery Miles 6 260 Save R71 (10%) Ships in 18 - 22 working days

Essential reading for launching a career in computer forensics

Internet crime is on the rise, catapulting the need for computer forensics specialists. This new edition presents you with a completely updated overview of the basic skills that are required as a computer forensics professional. The author team of technology security veterans introduces the latest software and tools that exist and they review the available certifications in this growing segment of IT that can help take your career to a new level. A variety of real-world practices take you behind the scenes to look at the root causes of security attacks and provides you with a unique perspective as you launch a career in this fast-growing field.Explores the profession of computer forensics, which is more in demand than ever due to the rise of Internet crimeDetails the ways to conduct a computer forensics investigationHighlights tips and techniques for finding hidden data, capturing images, documenting your case, and presenting evidence in court as an expert witnessWalks you through identifying, collecting, and preserving computer evidenceExplains how to understand encryption and examine encryption files

"Computer Forensics JumpStart" is the resource you need to launch a career in computer forensics.

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with... Certified Ethical Hacker (CEH) v11 312-50 Exam Guide - Keep up to date with ethical hacking trends and hone your skills with hands-on activities (Paperback)
Dale Meredith, Christopher Rees
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification exam Key Features Learn how to look at technology from the standpoint of an attacker Understand the methods that attackers use to infiltrate networks Prepare to take and pass the exam in one attempt with the help of hands-on examples and mock tests Book DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book. This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book. By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker. What you will learn Get to grips with information security and ethical hacking Undertake footprinting and reconnaissance to gain primary information about a potential target Perform vulnerability analysis as a means of gaining visibility of known security weaknesses Become familiar with the tools and techniques used by an attacker to hack into a target system Discover how network sniffing works and ways to keep your information secure Explore the social engineering techniques attackers use to compromise systems Who this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Claim Denied (Paperback): DiAnn Schindler Claim Denied (Paperback)
DiAnn Schindler
R442 Discovery Miles 4 420 Ships in 18 - 22 working days
Satan's Gold - Money makes the world go 'round. Or stop. (Paperback): Michael Ray Ewing Satan's Gold - Money makes the world go 'round. Or stop. (Paperback)
Michael Ray Ewing
R493 Discovery Miles 4 930 Ships in 18 - 22 working days
Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition): Patricia... Hot Roll - Large Print (Caught Dead In Wyoming, Book 8) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R656 R610 Discovery Miles 6 100 Save R46 (7%) Ships in 18 - 22 working days
Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition): Patricia... Back Story - Large Print (Caught Dead In Wyoming, Book 6) (Large print, Paperback, Large type / large print edition)
Patricia McLinn
R654 R608 Discovery Miles 6 080 Save R46 (7%) Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware... Practical Hardware Pentesting - A guide to attacking embedded systems and protecting them against the most common hardware attacks (Paperback)
Jean-Georges Valle
R1,316 Discovery Miles 13 160 Ships in 18 - 22 working days

Learn how to pentest your hardware with the most common attract techniques and patterns Key Features Explore various pentesting tools and techniques to secure your hardware infrastructure Protect your hardware by finding potential entry points like glitches Find the best practices for securely designing your products Book DescriptionIf you're looking for hands-on introduction to pentesting that delivers, then Practical Hardware Pentesting is for you. This book will help you plan attacks, hack your embedded devices, and secure the hardware infrastructure. Throughout the book, you will see how a specific device works, explore the functional and security aspects, and learn how a system senses and communicates with the outside world. You'll set up a lab from scratch and then gradually work towards an advanced hardware lab-but you'll still be able to follow along with a basic setup. As you progress, you'll get to grips with the global architecture of an embedded system and sniff on-board traffic, learn how to identify and formalize threats to the embedded system, and understand its relationship with its ecosystem. You'll discover how to analyze your hardware and locate its possible system vulnerabilities before going on to explore firmware dumping, analysis, and exploitation. The reverse engineering chapter will get you thinking from an attacker point of view; you'll understand how devices are attacked, how they are compromised, and how you can harden a device against the most common hardware attack vectors. By the end of this book, you will be well-versed with security best practices and understand how they can be implemented to secure your hardware. What you will learn Perform an embedded system test and identify security critical functionalities Locate critical security components and buses and learn how to attack them Discover how to dump and modify stored information Understand and exploit the relationship between the firmware and hardware Identify and attack the security functions supported by the functional blocks of the device Develop an attack lab to support advanced device analysis and attacks Who this book is forIf you're a researcher or a security professional who wants a comprehensive introduction into hardware security assessment, then this book is for you. Electrical engineers who want to understand the vulnerabilities of their devices and design them with security in mind will also find this book useful. You won't need any prior knowledge with hardware pentensting before you get started; everything you need is in the chapters.

At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback): Stephen Timm At Any Cost - The South African Fraudster Who Took The Tech World For More Than $40 Million (Paperback)
Stephen Timm
R385 R166 Discovery Miles 1 660 Save R219 (57%) In Stock

Eran Eyal had it all: a trendy New York apartment, a jet-set lifestyle and investors lining up to get in on his million-dollar cryptocurrency start-up, Shopin. He had come a long way from an ordinary middle-class childhood in Durban and the burgeoning tech start-up world of Cape Town.

But the New York authorities pounced in 2018, charged him with fraud and packed him off to Rikers Island. There began the gobsmacking unravelling of a scam that spanned investors across the globe and revealed that Eyal had built a house of cards involving fictitious products, clients and advisors for Shopin and his previous company, Springleap. As more than $40 million went up in smoke, the South African entrepreneur was exposed as an audacious fraudster determined to succeed at any cost – even if it meant spinning a web of  lies to do so.

“An age-old narrative about ego and flying too close to the sun as well as a modern version of greed in the tech world.” Michael Jordaan

“Eyal proves definitively that a thousand white lies can get you convicted of fraud. This book meticulously walks the reader though the start-up lies that ended in tears.” Nic Haralambous

Bit By Bit (Large print, Hardcover, Large type / large print edition): Hanley Bit By Bit (Large print, Hardcover, Large type / large print edition)
Hanley; Edited by Christine A. Adams
R715 Discovery Miles 7 150 Ships in 9 - 17 working days
Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R289 R274 Discovery Miles 2 740 Save R15 (5%) Ships in 18 - 22 working days
Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition... Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition (Paperback, 3rd Revised edition)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari
R1,335 Discovery Miles 13 350 Ships in 18 - 22 working days

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

How to Hack a Human: Cybersecurity for the Mind (Paperback): Raef Meeuwisse How to Hack a Human: Cybersecurity for the Mind (Paperback)
Raef Meeuwisse
R545 Discovery Miles 5 450 Ships in 18 - 22 working days
Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,146 Discovery Miles 11 460 Ships in 18 - 22 working days
The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback): Peter Kim The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback)
Peter Kim
R738 Discovery Miles 7 380 Ships in 18 - 22 working days
Cyber Crimes - History of World's Worst Cyber Attacks (Paperback): Vannesa Pitts Cyber Crimes - History of World's Worst Cyber Attacks (Paperback)
Vannesa Pitts
R425 Discovery Miles 4 250 Ships in 18 - 22 working days
Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R528 Discovery Miles 5 280 Ships in 9 - 17 working days
How to Keep Your Stuff Safe Online (Paperback): Raef Meeuwisse How to Keep Your Stuff Safe Online (Paperback)
Raef Meeuwisse
R191 Discovery Miles 1 910 Ships in 18 - 22 working days
Cybersecurity: Home and Small Business (Paperback): Raef Meeuwisse Cybersecurity: Home and Small Business (Paperback)
Raef Meeuwisse
R318 Discovery Miles 3 180 Ships in 18 - 22 working days
Cybersecurity Exposed: The Cyber House Rules (Paperback): Raef Meeuwisse Cybersecurity Exposed: The Cyber House Rules (Paperback)
Raef Meeuwisse
R416 Discovery Miles 4 160 Ships in 9 - 17 working days
Binary Bullets - The Ethics of Cyberwarfare (Paperback): Fritz Allhoff, Adam Henschke, Bradley Jay Strawser Binary Bullets - The Ethics of Cyberwarfare (Paperback)
Fritz Allhoff, Adam Henschke, Bradley Jay Strawser
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

Philosophical and ethical discussions of warfare are often tied to emerging technologies and techniques. Today we are presented with what many believe is a radical shift in the nature of war-the realization of conflict in the cyber-realm, the so-called "fifth domain " of warfare. Does an aggressive act in the cyber-realm constitute an act of war? If so, what rules should govern such warfare? Are the standard theories of just war capable of analyzing and assessing this mode of conflict? These changing circumstances present us with a series of questions demanding serious attention. Is there such a thing as cyberwarfare? How do the existing rules of engagement and theories from the just war tradition apply to cyberwarfare? How should we assess a cyber-attack conducted by a state agency against private enterprise and vice versa? Furthermore, how should actors behave in the cyber-realm? Are there ethical norms that can be applied to the cyber-realm? Are the classic just war constraints of non-combatant immunity and proportionality possible in this realm? Especially given the idea that events that are constrained within the cyber-realm do not directly physically harm anyone, what do traditional ethics of war conventions say about this new space? These questions strike at the very center of contemporary intellectual discussion over the ethics of war. In twelve original essays, plus a foreword from John Arquilla and an introduction, Binary Bullets: The Ethics of Cyberwarfare, engages these questions head on with contributions from the top scholars working in this field today.

Hacking (Hardcover): Walter Spivak Hacking (Hardcover)
Walter Spivak
R872 Discovery Miles 8 720 Ships in 18 - 22 working days

In this book, you will learn several skills and techniques that you need to acquire in order to become a successful computer hacker. Hacking is a term that has been associated with negativity over the years. It has been mentioned when referring to a ran

Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback): Peter Jukes Beyond Contempt - The Inside Story of the Phone Hacking Trial (Paperback)
Peter Jukes; Cover design or artwork by Martin Rowson
R439 Discovery Miles 4 390 Ships in 18 - 22 working days

'A must read for anyone who wants to understand not only our media, but power in Britain' - OWEN JONES, author The Establishment 'Top court reporting' - NICK DAVIES, THE GUARDIAN Go behind the doors of Court 12 of the Old Bailey for what was billed as 'the trial of the century' - the phone hacking trial of journalists from Rupert Murdoch's two biggest British tabloid newspapers. Every twist and turn of the longest-running criminal trial in English legal history is covered by Peter Jukes in this edition, crowdfunded by members of the public. Heard in London in 2013 and 2014, the phone hacking trial had a heady brew of criminal eavesdropping, media rights, political intrigue, and Hollywood stardust. Rebekah Brooks and Andy Coulson were accused of phone hacking and corrupting public officials while editing the Sun and the News of the World newspapers respectively. Brooks and her husband Charlie and her former PA, Cheryl Carter, were also accused of perverting the course of justice in an attempt to thwart detectives investigating the hacking. The trial took place after years of cover up of phone hacking at Britain's biggest newspaper group News International (now News UK), the country's biggest police force, the Metropolitan Police, and the Conservative government led by David Cameron, who employed Coulson as his director of communications. After they were sworn in, the judge, Justice Saunders, told the jury: "British justice is on trial". The long-running trial laid bare the intense illegal surveillance of individuals carried out by the politically-connected News of the World. Employing an array of private detectives, pried deeply into the private lives of anyone who mattered to them at the time: a Hollywood actress, a missing schoolgirl, a Cabinet minister. Sometimes the surveillance was based on well-founded intelligence that revealed a legitimate story, sometimes it was on a whim or the result of a malicious tip-off. The trial pitted London's most extravagantly paid barristers against each other. Rupert Murdoch's millions hired top Queens Counsel to represent the seven defendants. The GBP5,000-a-day barrister, Jonathan Laidlaw, for instance, represented Rebekah Brooks. The multi-million pound case tottered on the brink of collapse several times as a result media misbehaviour, illness and delay. Drawing on verbatim court exchanges and exhibits, Jukes reveals the daily reality and grand strategies of this major criminal case. He reveals a secret about Rebekah Brooks' 14 days in the witness box. He explains why a defence lawyer gave him a wry smile during a cigarette break. And he discloses the failings of the Crown Prosecution Service which contribute to the verdicts. Like Dial M for Murdoch by Tom Watson and Martin Hickman and Hack Attack by Nick Davies, this book will fascinate anyone wanting to know about the phone hacking scandal. It is also ideal for anyone who wants to know the twists and turns of a major criminal trial. REVIEWS 'Remarkable. I feel I now know all the key players and why some defendants were found guilty and some not, despite never having spent a minute at the trial.' - PROFESSOR STEWART PURVIS, FORMER ITN EDITOR 'Written in a chatty, gossipy style that brings the courtroom drama alive.' - NIGEL PAULEY, DAILY STAR JOURNALIST

E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback): Les Hatton E-mail Forensics: Eliminating Spam, Scams and Phishing (Paperback)
Les Hatton
R936 Discovery Miles 9 360 Ships in 18 - 22 working days

This is the first book of its kind to document the detailed application of forensic analysis techniques to the field of e-mail security. Both investigative and preventative techniques are described but the focus is on prevention.

The world has been subjected to an increasing wave of spam and more recently, scamming and phishing attacks in the last twenty years. Such attacks now include industrial espionage and government-sponsored spying. The volume and sophistication of such attacks has rendered existing technologies only partially effective leaving the end-user vulnerable and the number of successful attacks is increasing.

The seeds of this book were sown three years ago when the author, a Professor of Forensic Software Engineering, was trying to recover his 20 year-old e-mail address from the clutches of spammers who had rendered it almost unusable with more than 140,000 junk messages a day. It got to the point where he was invited by his ISP to either change it or take it elsewhere. Instead he decided to find out how to prevent the deluge, acquired his own servers and began researching.

The book is a mixture of analysis, experiment and implementation in almost equal proportions with detailed description of the defence in depth necessary to turn the tidal wave of junk aside leaving only what the end user wants to see - no more and no less. It covers: -

  • 1. The rise of e-mail
  • 2. How it all works
  • 3. Scams, spam and other abuse
  • 4. Protection: the principles of filtering
  • 5. Going deeper: setting up a mail server
  • 6. Advanced content filtering
  • 7. The bottom line - how well can we do ?
  • 8. Where is all this going ?
There is something here for everyone. Chapters 1-4 are suitable for the general reader who just wants to understand how spammers and scammers work and find out a little more about the many forms of attack. Chapters 5 and 6 are highly technical and suitable for both e-mail administrators and theoreticians and include a discussion of the latest computational and mathematical techniques for detecting textual patterns. Chapter 7 presents the results of applying the techniques in this book on the several million junk messages the author's servers received over a 10 month period. Chapter 8 tries to see into the future a little to predict how the arms race between the attackers and defenders might go. Finally, those interested in governance will find discussions of the dangers of release of e-mail addresses under Freedom of Information Requests.

The book contains many illustrations of attacks and is supported by numerous code examples in Perl and C.

Perfection is impossible, but if you follow the advice in this book, you can build mail systems which provably make no more than 5 mistakes per million messages received, very close to the definitive manufacturing standard of six sigma. The threat from viruses effectively disappears and the e-mail user is secured from toxic content.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Entitled - How Male Privilege Hurts…
Kate Manne Paperback R313 R284 Discovery Miles 2 840
Living While Black - The Essential Guide…
Guilaine Kinouani Paperback R485 R440 Discovery Miles 4 400
Frenemies - Feminists, Conservatives…
Nancy Whittier Hardcover R3,277 Discovery Miles 32 770
Our Faithfulness to the Past - The…
Sue Campbell Hardcover R3,835 Discovery Miles 38 350
Marginal Bodies, Trans Utopias
Caterina Nirta Hardcover R4,911 Discovery Miles 49 110
Finding Me - A Memoir
Viola Davis Hardcover  (1)
R706 R523 Discovery Miles 5 230
Autonomy, Oppression, and Gender
Andrea Veltman, Mark Piper Hardcover R3,854 Discovery Miles 38 540
Beyond Speech - Pornography and Analytic…
Mari Mikkola Hardcover R3,573 Discovery Miles 35 730
Buddhist Nuns and Gendered Practice - In…
Nirmala S. Salgado Hardcover R3,851 Discovery Miles 38 510
The Black Bourgeoisie
Edward Franklin Frazier Paperback R450 R420 Discovery Miles 4 200

 

Partners