0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (86)
  • R500+ (141)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Hardcover)
Adam Dodson
R546 R500 Discovery Miles 5 000 Save R46 (8%) Ships in 18 - 22 working days
Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover): Attila Kovacs Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Hardcover)
Attila Kovacs
R777 R681 Discovery Miles 6 810 Save R96 (12%) Ships in 18 - 22 working days
Cyber Weapons of Mass Psychological Destruction - and the People Who Use Them (Hardcover): Vikram Sethi Cyber Weapons of Mass Psychological Destruction - and the People Who Use Them (Hardcover)
Vikram Sethi
R1,092 R920 Discovery Miles 9 200 Save R172 (16%) Ships in 18 - 22 working days
GRU Cybervillains - The DOJ Indictment Against Six Russian Hackers (Hardcover): Department of Justice GRU Cybervillains - The DOJ Indictment Against Six Russian Hackers (Hardcover)
Department of Justice
R563 Discovery Miles 5 630 Ships in 10 - 15 working days
Computer Networking and Cybersecurity (Paperback): Quinn Kiser Computer Networking and Cybersecurity (Paperback)
Quinn Kiser
R794 R698 Discovery Miles 6 980 Save R96 (12%) Ships in 18 - 22 working days
Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the... Cybersecurity - A Simple Beginner's Guide to Cybersecurity, Computer Networks and Protecting Oneself from Hacking in the Form of Phishing, Malware, Ransomware, and Social Engineering (Hardcover)
Quinn Kiser
R667 R596 Discovery Miles 5 960 Save R71 (11%) Ships in 18 - 22 working days
Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover): Alex Wagner Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Hardcover)
Alex Wagner
R940 R808 Discovery Miles 8 080 Save R132 (14%) Ships in 18 - 22 working days
Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Hardcover)
Alex Wagner
R1,479 R1,233 Discovery Miles 12 330 Save R246 (17%) Ships in 18 - 22 working days
Combating Security Breaches and Criminal Activity in the Digital Sphere (Hardcover): S Geetha, Asnath Victy Phamila Combating Security Breaches and Criminal Activity in the Digital Sphere (Hardcover)
S Geetha, Asnath Victy Phamila
R5,171 Discovery Miles 51 710 Ships in 18 - 22 working days

With the rapid advancement in technology, a myriad of new threats have emerged in online environments. The broad spectrum of these digital risks requires new and innovative methods for protection against cybercrimes. Combating Security Breaches and Criminal Activity in the Digital Sphere is a pivotal reference source for the latest scholarly research on current trends in cyber forensic investigations, focusing on advanced techniques for protecting information security and preventing potential exploitation for online users. Featuring law enforcement perspectives, theoretical foundations, and forensic methods, this book is ideally designed for policy makers, analysts, researchers, technology developers, and upper-level students.

Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Hardcover): William Vance Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Hardcover)
William Vance
R581 R536 Discovery Miles 5 360 Save R45 (8%) Ships in 18 - 22 working days
Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Hardcover)
Frederic Scott Deaver
R1,808 Discovery Miles 18 080 Ships in 10 - 15 working days
Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Hardcover): Sam Griffin Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Hardcover)
Sam Griffin
R554 R509 Discovery Miles 5 090 Save R45 (8%) Ships in 18 - 22 working days
Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn
R449 R418 Discovery Miles 4 180 Save R31 (7%) Ships in 18 - 22 working days

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself. Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.

Malware Forensics - Investigating and Analyzing Malicious Code (Paperback): Cameron H. Malin, Eoghan Casey, James M. Aquilina Malware Forensics - Investigating and Analyzing Malicious Code (Paperback)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R1,539 Discovery Miles 15 390 Ships in 10 - 15 working days

"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code" also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, "Malware Forensics: Investigating and Analyzing Malicious Code" emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.
* Winner of Best Book Bejtlich read in 2008
* http: //taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Unmasking the Hacker - Demystifying Cybercrime (Hardcover): Amanda-Jane Turner Unmasking the Hacker - Demystifying Cybercrime (Hardcover)
Amanda-Jane Turner
R754 Discovery Miles 7 540 Ships in 10 - 15 working days
Mastering Your Introduction to Cyber Security (Hardcover): Michael C Redmond Mastering Your Introduction to Cyber Security (Hardcover)
Michael C Redmond
R604 Discovery Miles 6 040 Ships in 18 - 22 working days
Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Hardcover)
George Mansour
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback): Babak Akhgar, Andrew Staniforth, Francesca Bosco Cyber Crime and Cyber Terrorism Investigator's Handbook (Paperback)
Babak Akhgar, Andrew Staniforth, Francesca Bosco
R1,110 Discovery Miles 11 100 Ships in 10 - 15 working days

Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of the motivations, tools, and tactics behind cyber attacks and the defenses against them. With this book, you will learn about the technological and logistic framework of cyber crime, as well as the social and legal backgrounds of its prosecution and investigation. Whether you are a law enforcement professional, an IT specialist, a researcher, or a student, you will find valuable insight into the world of cyber crime and cyber warfare. Edited by experts in computer security, cyber investigations, and counter-terrorism, and with contributions from computer researchers, legal experts, and law enforcement professionals, Cyber Crime and Cyber Terrorism Investigator's Handbook will serve as your best reference to the modern world of cyber crime.

Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R956 R835 Discovery Miles 8 350 Save R121 (13%) Ships in 18 - 22 working days
Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Hardcover)
Alan Grid
R1,112 R956 Discovery Miles 9 560 Save R156 (14%) Ships in 18 - 22 working days
Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R908 R787 Discovery Miles 7 870 Save R121 (13%) Ships in 18 - 22 working days
Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,374 Discovery Miles 43 740 Ships in 18 - 22 working days
Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are... Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing the Internet (Hardcover)
Alan Grid
R706 R625 Discovery Miles 6 250 Save R81 (11%) Ships in 18 - 22 working days
The Art of Cyber Security - A Practical Guide to Winning the War on Cyber Crime (Paperback): It Governance Publishing The Art of Cyber Security - A Practical Guide to Winning the War on Cyber Crime (Paperback)
It Governance Publishing
R1,070 Discovery Miles 10 700 Ships in 18 - 22 working days

This book is about cyber security. In Part 1, the author discusses his thoughts on the cyber security industry and how those that operate within it should approach their role with the mindset of an artist. Part 2 explores the work of Sun Tzu's The Art of War.

The Eu Data Protection Code of Conduct for Cloud Service Providers - A Guide to Compliance (Paperback, One ed.): IT Governance The Eu Data Protection Code of Conduct for Cloud Service Providers - A Guide to Compliance (Paperback, One ed.)
IT Governance
R442 Discovery Miles 4 420 Ships in 18 - 22 working days

The EU Data Protection Code of Conduct for Cloud Service Providers - A guide to complianceFormally founded in 2017, the EU Data Protection Code of Conduct for Cloud Service Providers (otherwise known as the EU Cloud Code of Conduct; the Code) is a voluntary code of conduct created specifically to support GDPR compliance within the B2B (business-to-business) Cloud industry. The EU Commission, the Article 29 Working Party (now the European Data Protection Board (EDPB)), the EU Directorate-General for Justice and Consumers, and Cloud-industry leaders have all contributed to its development, resulting in a robust framework that recognises the unique requirements of the Cloud industry. Cloud providers must ensure that their services - which by design involve accessing and transferring data across the Internet, exposing it to far greater risk than data stored and processed within an organisation's internal network - meet or exceed the GDPR's requirements in order to provide the security and privacy that the market expects. Organisations can achieve this via compliance to the EU Cloud Code of Conduct. The EU Cloud Code of Conduct has already been adopted by major Cloud service organisations, including: Microsoft; Oracle; Salesforce; IBM; Google Cloud; Dropbox; and Alibaba Cloud. Public and business focus on information security and data protection continues to increase in the face of a constantly changing threat landscape and ever-more stringent regulation, and compliance to initiatives such as the EU Cloud Code of Conduct demonstrates to current and potential customers that your organisation is taking data privacy seriously, as well as strengthens your organisation's overall approach to information security management, and defences against data breaches. The EU Data Protection Code of Conduct for Cloud Service Providers provides guidance on how to implement the Code within your organisation. It explores the objectives of the Code, and how compliance can be achieved with or without a pre-existing ISMS (information security management system) within the organisation. Begin your journey to EU Cloud Code of Conduct implementation with our guide to compliance - Buy this book today!

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Discovering AutoCAD 2017
Mark Dix, Paul Riley Paperback R2,324 Discovery Miles 23 240
Algebraic Methods in Operator Theory
Raul E. Curto, Palle E. T. Jorgensen Hardcover R4,208 Discovery Miles 42 080
Computer-aided Nonlinear Control System…
Amir Nassirharand Hardcover R2,655 Discovery Miles 26 550
Matrix Analysis
Rajendra Bhatia Hardcover R1,876 Discovery Miles 18 760
Xcode Treasures
Chris Adamson Paperback R1,037 R907 Discovery Miles 9 070
IOS Programming For Beginners - The…
Tim Warren Hardcover R551 R505 Discovery Miles 5 050
Differential Operators and Related…
Vadim M. Adamyan, Israel Gohberg, … Hardcover R2,471 Discovery Miles 24 710
Advanced Control and Optimization…
Radu-Emil Precup, Tariq Kamal, … Hardcover R2,676 Discovery Miles 26 760
Knowledge Intensive CAD - Volume 2…
Martti Mantyla, Susan Finger, … Hardcover R2,817 Discovery Miles 28 170
Hardware Acceleration of EDA Algorithms…
Sunil P. Khatri, Kanupriya Gulati Hardcover R2,763 Discovery Miles 27 630

 

Partners