0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (144)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Cyber Curiosity - A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World (Paperback): Lakeidra... Cyber Curiosity - A Beginner's Guide to Cybersecurity - How to Protect Yourself in the Modern World (Paperback)
Lakeidra Smith
R529 R494 Discovery Miles 4 940 Save R35 (7%) Ships in 10 - 15 working days
Memory Dump Analysis Anthology, Volume 1, Revised Edition (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 1, Revised Edition (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R1,309 Discovery Miles 13 090 Ships in 10 - 15 working days
Assembly Language Laboratory Work (Paperback): Marius Silaghi Assembly Language Laboratory Work (Paperback)
Marius Silaghi
R596 Discovery Miles 5 960 Ships in 10 - 15 working days
Dad's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Dad's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R398 Discovery Miles 3 980 Ships in 10 - 15 working days
Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback): John a Schaefer Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback)
John a Schaefer
R612 R548 Discovery Miles 5 480 Save R64 (10%) Ships in 10 - 15 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,248 Discovery Miles 12 480 Ships in 10 - 15 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R564 Discovery Miles 5 640 Ships in 10 - 15 working days
Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and... Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide (Paperback)
Anthony Hack
R483 Discovery Miles 4 830 Ships in 10 - 15 working days
The Many Faces of John McAfee - Biography of an American Hustler (Paperback): Steven Matthews The Many Faces of John McAfee - Biography of an American Hustler (Paperback)
Steven Matthews 1
R342 R320 Discovery Miles 3 200 Save R22 (6%) Ships in 10 - 15 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R505 R468 Discovery Miles 4 680 Save R37 (7%) Ships in 10 - 15 working days
Anyone seen my password? (Paperback): Cristie Jameslake Anyone seen my password? (Paperback)
Cristie Jameslake
R430 Discovery Miles 4 300 Ships in 10 - 15 working days
Cyber Security - Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked (Paperback): Hacking... Cyber Security - Understand Hacking and Protect Yourself and Your Organization From Ever Getting Hacked (Paperback)
Hacking Studios
R356 Discovery Miles 3 560 Ships in 10 - 15 working days
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback): Mark Schumacher Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback)
Mark Schumacher
R729 Discovery Miles 7 290 Ships in 10 - 15 working days
Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are... Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing the Internet with Your Smart Devices, PC or Television (Paperback)
Alan Grid
R520 R479 Discovery Miles 4 790 Save R41 (8%) Ships in 10 - 15 working days
Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback): Richard... Hacking for Beginners - Mastery Guide to Learn and Practice the Basics of Computer and Cyber Security (Paperback)
Richard Dorsel
R600 Discovery Miles 6 000 Ships in 10 - 15 working days
Hacking with Kali Linux THE ULTIMATE BEGINNERS GUIDE - Learn and Practice the Basics of Ethical Hacking and Cybersecurity... Hacking with Kali Linux THE ULTIMATE BEGINNERS GUIDE - Learn and Practice the Basics of Ethical Hacking and Cybersecurity (Paperback)
Nathan Jones
R466 R435 Discovery Miles 4 350 Save R31 (7%) Ships in 10 - 15 working days
Hacking - Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks (Paperback):... Hacking - Become a World Class Hacker, Hack Any Password, Program Or System With Proven Strategies and Tricks (Paperback)
Hacking Studios
R356 Discovery Miles 3 560 Ships in 10 - 15 working days
Incident Response in the Age of Cloud - Techniques and best practices to effectively respond to cybersecurity incidents... Incident Response in the Age of Cloud - Techniques and best practices to effectively respond to cybersecurity incidents (Paperback)
Dr. Erdal Ozkaya
R1,133 Discovery Miles 11 330 Ships in 10 - 15 working days

Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences Key Features Discover Incident Response (IR), from its evolution to implementation Understand cybersecurity essentials and IR best practices through real-world phishing incident scenarios Explore the current challenges in IR through the perspectives of leading experts Book DescriptionCybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK (R) and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an "Ask the Experts" chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learn Understand IR and its significance Organize an IR team Explore best practices for managing attack situations with your IR team Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity Organize all the entities involved in product security response Respond to security vulnerabilities using tools developed by Keepnet Labs and Binalyze Adapt all the above learnings for the cloud Who this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book. The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

Penetration Testing Step By Step Guide (Paperback): Radhi Shatob Penetration Testing Step By Step Guide (Paperback)
Radhi Shatob
R2,291 Discovery Miles 22 910 Ships in 10 - 15 working days
Linux Command - Logical and Systematic Approach to Linux Administration (Paperback): William Vance Linux Command - Logical and Systematic Approach to Linux Administration (Paperback)
William Vance
R514 R479 Discovery Miles 4 790 Save R35 (7%) Ships in 10 - 15 working days
Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance... Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life (Two Book Bundle) (Paperback)
Trust Genics
R565 R530 Discovery Miles 5 300 Save R35 (6%) Ships in 10 - 15 working days
Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to... Computer Programming for Beginners and Cybersecurity - 4 MANUSCRIPTS IN 1: The Ultimate Manual to Learn step by step How to Professionally Code and Protect Your Data. This Book includes: Python, Java, C ++ and Cybersecurity (Paperback)
Alan Grid
R983 R855 Discovery Miles 8 550 Save R128 (13%) Ships in 10 - 15 working days
Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Paperback): Sam Griffin Hacking - A Comprehensive Guide to Computer Hacking and Cybersecurity (Paperback)
Sam Griffin
R370 R340 Discovery Miles 3 400 Save R30 (8%) Ships in 10 - 15 working days
Hackers Exposed - Discover the secret world of cybercrime (Paperback): Fernando Uilherme Barbosa de Azevedo Hackers Exposed - Discover the secret world of cybercrime (Paperback)
Fernando Uilherme Barbosa de Azevedo
R384 Discovery Miles 3 840 Ships in 10 - 15 working days
Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback): Vikram Sethi Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback)
Vikram Sethi; Foreword by Terry Oroszi
R663 R599 Discovery Miles 5 990 Save R64 (10%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Twisted Love - Twisted: Book 1
Ana Huang Paperback  (4)
R295 R264 Discovery Miles 2 640
God Of Malice - Legacy Of Gods: Book 1
Rina Kent Paperback R295 R245 Discovery Miles 2 450
Otherworldly
C F Rabbiosi Hardcover R831 R732 Discovery Miles 7 320
Legacy - Love, Intrigue and Redemption…
Hannah Fielding Paperback  (1)
R285 Discovery Miles 2 850
Droomjagter
Leon van Nierop Paperback R340 R314 Discovery Miles 3 140
Hate
Tate James Paperback  (1)
R402 Discovery Miles 4 020
Things We Do for Love
Christopher Woodward Hardcover R995 R844 Discovery Miles 8 440
King Of Wrath - Kings Of Sin: Book 1
Ana Huang Paperback  (1)
R295 R264 Discovery Miles 2 640
Too Far - The Blacklist: Book 2
Sylvia Day Paperback R380 R149 Discovery Miles 1 490
Bonds of Cupidity - Heart Hassle: Book 2
Raven Kennedy Paperback R275 R254 Discovery Miles 2 540

 

Partners