0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (82)
  • R500+ (127)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Penetration Testing Step By Step Guide (Paperback): Radhi Shatob Penetration Testing Step By Step Guide (Paperback)
Radhi Shatob
R2,015 Discovery Miles 20 150 Ships in 18 - 22 working days
Malware Analysis Techniques - Tricks for the triage of adversarial software (Paperback): Dylan Barker Malware Analysis Techniques - Tricks for the triage of adversarial software (Paperback)
Dylan Barker
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Analyze malicious samples, write reports, and use industry-standard methodologies to confidently triage and analyze adversarial software and malware Key Features Investigate, detect, and respond to various types of malware threat Understand how to use what you've learned as an analyst to produce actionable IOCs and reporting Explore complete solutions, detailed walkthroughs, and case studies of real-world malware samples Book DescriptionMalicious software poses a threat to every enterprise globally. Its growth is costing businesses millions of dollars due to currency theft as a result of ransomware and lost productivity. With this book, you'll learn how to quickly triage, identify, attribute, and remediate threats using proven analysis techniques. Malware Analysis Techniques begins with an overview of the nature of malware, the current threat landscape, and its impact on businesses. Once you've covered the basics of malware, you'll move on to discover more about the technical nature of malicious software, including static characteristics and dynamic attack methods within the MITRE ATT&CK framework. You'll also find out how to perform practical malware analysis by applying all that you've learned to attribute the malware to a specific threat and weaponize the adversary's indicators of compromise (IOCs) and methodology against them to prevent them from attacking. Finally, you'll get to grips with common tooling utilized by professional malware analysts and understand the basics of reverse engineering with the NSA's Ghidra platform. By the end of this malware analysis book, you'll be able to perform in-depth static and dynamic analysis and automate key tasks for improved defense against attacks. What you will learn Discover how to maintain a safe analysis environment for malware samples Get to grips with static and dynamic analysis techniques for collecting IOCs Reverse-engineer and debug malware to understand its purpose Develop a well-polished workflow for malware analysis Understand when and where to implement automation to react quickly to threats Perform malware analysis tasks such as code analysis and API inspection Who this book is forThis book is for incident response professionals, malware analysts, and researchers who want to sharpen their skillset or are looking for a reference for common static and dynamic analysis techniques. Beginners will also find this book useful to get started with learning about malware analysis. Basic knowledge of command-line interfaces, familiarity with Windows and Unix-like filesystems and registries, and experience in scripting languages such as PowerShell, Python, or Ruby will assist with understanding the concepts covered.

Anyone seen my password? (Paperback): Cristie Jameslake Anyone seen my password? (Paperback)
Cristie Jameslake
R376 Discovery Miles 3 760 Ships in 18 - 22 working days
The Many Faces of John McAfee - Biography of an American Hustler (Paperback): Steven Matthews The Many Faces of John McAfee - Biography of an American Hustler (Paperback)
Steven Matthews 1
R299 R280 Discovery Miles 2 800 Save R19 (6%) Ships in 18 - 22 working days
Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Paperback): Sam Griffin Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Paperback)
Sam Griffin
R324 R298 Discovery Miles 2 980 Save R26 (8%) Ships in 18 - 22 working days
Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social... Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social engineering attacks (Paperback)
Tim Rains
R2,116 Discovery Miles 21 160 Ships in 18 - 22 working days

A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation Key Features Protect your organization from cybersecurity threats with field-tested strategies Discover the most common ways enterprises initially get compromised Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself. What you will learn Discover cybersecurity strategies and the ingredients critical to their success Improve vulnerability management by reducing risks and costs for your organization Learn how malware and other threats have evolved over the past decade Mitigate internet-based threats, phishing attacks, and malware distribution sites Weigh the pros and cons of popular cybersecurity strategies of the past two decades Implement and then measure the outcome of a cybersecurity strategy Learn how the cloud provides better security capabilities than on-premises IT environments Who this book is forThis book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.

Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are... Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing the Internet with Your Smart Devices, PC or Television (Paperback)
Alan Grid
R455 R419 Discovery Miles 4 190 Save R36 (8%) Ships in 18 - 22 working days
Unhackable - Workbook (Paperback): George Mansour Unhackable - Workbook (Paperback)
George Mansour
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
Assembly Language Laboratory Work (Paperback): Marius Silaghi Assembly Language Laboratory Work (Paperback)
Marius Silaghi
R532 Discovery Miles 5 320 Ships in 18 - 22 working days
Cyber Curiosity - A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World (Paperback): Lakeidra... Cyber Curiosity - A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World (Paperback)
Lakeidra Smith
R463 R434 Discovery Miles 4 340 Save R29 (6%) Ships in 18 - 22 working days
Cyber Security - Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked (Paperback): Hacking... Cyber Security - Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked (Paperback)
Hacking Studios
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R535 Discovery Miles 5 350 Ships in 18 - 22 working days
CompTIA Security+: SY0-601 Certification Guide - Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass... CompTIA Security+: SY0-601 Certification Guide - Complete coverage of the new CompTIA Security+ (SY0-601) exam to help you pass on the first attempt, 2nd Edition (Paperback, 2nd Revised edition)
Ian Neil
R879 Discovery Miles 8 790 Ships in 18 - 22 working days

Learn IT security essentials and prepare for the Security+ exam with this CompTIA exam guide, complete with additional online resources-including flashcards, PBQs, and mock exams-at securityplus.training Key Features Written by Ian Neil, one of the world's top CompTIA Security+ trainers Test your knowledge of cybersecurity jargon and acronyms with realistic exam questions Learn about cryptography, encryption, and security policies to deliver a robust infrastructure Book DescriptionThe CompTIA Security+ certification validates the fundamental knowledge required to perform core security functions and pursue a career in IT security. Authored by Ian Neil, a world-class CompTIA certification trainer, this book is a best-in-class study guide that fully covers the CompTIA Security+ 601 exam objectives. Complete with chapter review questions, realistic mock exams, and worked solutions, this guide will help you master the core concepts to pass the exam the first time you take it. With the help of relevant examples, you'll learn fundamental security concepts from certificates and encryption to identity and access management (IAM). As you progress, you'll delve into the important domains of the exam, including cloud security, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, cryptography, and public key infrastructure (PKI). You can access extra practice materials, including flashcards, performance-based questions, practical labs, mock exams, key terms glossary, and exam tips on the author's website at securityplus.training. By the end of this Security+ book, you'll have gained the knowledge and understanding to take the CompTIA exam with confidence. What you will learn Master cybersecurity fundamentals, from the CIA triad through to IAM Explore cloud security and techniques used in penetration testing Use different authentication methods and troubleshoot security issues Secure the devices and applications used by your company Identify and protect against various types of malware and viruses Protect yourself against social engineering and advanced attacks Understand and implement PKI concepts Delve into secure application development, deployment, and automation Who this book is forIf you want to take and pass the CompTIA Security+ SY0-601 exam, even if you are not from an IT background, this book is for you. You'll also find this guide useful if you want to become a qualified security professional. This CompTIA book is also ideal for US Government and US Department of Defense personnel seeking cybersecurity certification.

Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Paperback)
Alan Grid
R860 R759 Discovery Miles 7 590 Save R101 (12%) Ships in 18 - 22 working days
Days of Pandemic (Paperback): Andrew Aldred Days of Pandemic (Paperback)
Andrew Aldred
R523 Discovery Miles 5 230 Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback): William Vance Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback)
William Vance
R451 R421 Discovery Miles 4 210 Save R30 (7%) Ships in 18 - 22 working days
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback): Mark Schumacher Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback)
Mark Schumacher
R648 Discovery Miles 6 480 Ships in 18 - 22 working days
Hacking - Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks (Paperback):... Hacking - Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks (Paperback)
Hacking Studios
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking (Paperback): Hilary Morrison, Hein... Ethical Hacking - A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking (Paperback)
Hilary Morrison, Hein Smith
R387 Discovery Miles 3 870 Ships in 18 - 22 working days
Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more!... Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more! (Paperback)
Joe Benton
R311 R283 Discovery Miles 2 830 Save R28 (9%) Ships in 18 - 22 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network... Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats (Paperback)
Quinn Kiser
R417 Discovery Miles 4 170 Ships in 18 - 22 working days
Intrusion Detection Honeypots (Paperback): Chris Sanders Intrusion Detection Honeypots (Paperback)
Chris Sanders
R881 R800 Discovery Miles 8 000 Save R81 (9%) Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Portfolio Management - A practical guide
APM Portfolio Management SIG Paperback R680 Discovery Miles 6 800
A Guide to Conducting Integrated…
Paperback R660 Discovery Miles 6 600
Handbook of Research on Implementing…
Yousif Abdullatif Albastaki, Adel Ismail Al-Alawi, … Hardcover R7,366 Discovery Miles 73 660
Strategy Scout - How to Deal with…
Matthias Kolbusa Hardcover R2,368 R1,873 Discovery Miles 18 730
Fundamentals Of Project Management…
Rory Burke Paperback  (2)
R495 R457 Discovery Miles 4 570
APM Guide to Contracts and Procurement…
APM Contracts Procurement SIG Paperback R820 Discovery Miles 8 200
Project Management for Modern…
Hardcover R2,405 Discovery Miles 24 050
Business and Office Environment 3e
A.A. de Beer, E.J. Ferreira, … Electronic book text R251 Discovery Miles 2 510
Project Management Techniques
Rory Burke Paperback R550 R503 Discovery Miles 5 030
Project Management For Engineering…
John M. Nicholas, Herman Steyn Paperback R2,008 Discovery Miles 20 080

 

Partners