0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (144)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Ptfm - Purple Team Field Manual (Paperback): Tim Bryant Ptfm - Purple Team Field Manual (Paperback)
Tim Bryant
R542 Discovery Miles 5 420 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R486 R445 Discovery Miles 4 450 Save R41 (8%) Ships in 10 - 15 working days
Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing... Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing malicious viruses, malware, and spyware. (Paperback)
Hugh Mendoza
R236 Discovery Miles 2 360 Ships in 10 - 15 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R505 Discovery Miles 5 050 Ships in 10 - 15 working days
Intrusion Detection Honeypots (Paperback): Chris Sanders Intrusion Detection Honeypots (Paperback)
Chris Sanders
R1,006 R902 Discovery Miles 9 020 Save R104 (10%) Ships in 10 - 15 working days
Hacking - The Beginner's Complete Guide To Computer Hacking And Penetration Testing (Paperback): Miles Price Hacking - The Beginner's Complete Guide To Computer Hacking And Penetration Testing (Paperback)
Miles Price
R446 Discovery Miles 4 460 Ships in 10 - 15 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R519 R484 Discovery Miles 4 840 Save R35 (7%) Ships in 10 - 15 working days
Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback): William Vance Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback)
William Vance
R516 R481 Discovery Miles 4 810 Save R35 (7%) Ships in 10 - 15 working days
PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback): Jon Albert PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback)
Jon Albert
R317 R291 Discovery Miles 2 910 Save R26 (8%) Ships in 10 - 15 working days
Linux Command - Advanced Methods and Strategies to Shell Scripting (Paperback): William Vance Linux Command - Advanced Methods and Strategies to Shell Scripting (Paperback)
William Vance
R515 R480 Discovery Miles 4 800 Save R35 (7%) Ships in 10 - 15 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R356 R330 Discovery Miles 3 300 Save R26 (7%) Ships in 10 - 15 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R355 R330 Discovery Miles 3 300 Save R25 (7%) Ships in 10 - 15 working days
Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network... Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats (Paperback)
Quinn Kiser
R476 Discovery Miles 4 760 Ships in 10 - 15 working days
Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Paperback): Alex Wagner Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Paperback)
Alex Wagner
R902 R775 Discovery Miles 7 750 Save R127 (14%) Ships in 10 - 15 working days
Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R361 R330 Discovery Miles 3 300 Save R31 (9%) Ships in 10 - 15 working days
Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social... Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social engineering attacks (Paperback)
Tim Rains
R2,407 Discovery Miles 24 070 Ships in 10 - 15 working days

A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation Key Features Protect your organization from cybersecurity threats with field-tested strategies Discover the most common ways enterprises initially get compromised Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself. What you will learn Discover cybersecurity strategies and the ingredients critical to their success Improve vulnerability management by reducing risks and costs for your organization Learn how malware and other threats have evolved over the past decade Mitigate internet-based threats, phishing attacks, and malware distribution sites Weigh the pros and cons of popular cybersecurity strategies of the past two decades Implement and then measure the outcome of a cybersecurity strategy Learn how the cloud provides better security capabilities than on-premises IT environments Who this book is forThis book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R774 R681 Discovery Miles 6 810 Save R93 (12%) Ships in 10 - 15 working days
The Giant Black Book of Computer Viruses (Paperback): Mark Ludwig The Giant Black Book of Computer Viruses (Paperback)
Mark Ludwig
R985 Discovery Miles 9 850 Ships in 10 - 15 working days
Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield... Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield advantage (Paperback)
Johann Rehberger
R1,292 Discovery Miles 12 920 Ships in 10 - 15 working days

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R964 Discovery Miles 9 640 Ships in 10 - 15 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd... Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd Revised edition)
Oleg Skulkin, Donnie Tindall, Rohit Tamma
R1,335 Discovery Miles 13 350 Ships in 10 - 15 working days

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts Key Features Get up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source forensic tools Learn malware detection and analysis techniques to investigate mobile cybersecurity incidents Book DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you'll be able to investigate cybersecurity incidents involving Android malware. By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis. What you will learn Understand Android OS and architecture Set up a forensics environment for Android analysis Perform logical and physical data extractions Learn to recover deleted data Explore how to analyze application data Identify malware on Android devices Analyze Android malware Who this book is forIf you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to... Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Paperback, 2nd Revised edition)
Yuri Diogenes, Dr. Erdal Ozkaya
R2,250 Discovery Miles 22 500 Ships in 10 - 15 working days

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is forFor the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R322 Discovery Miles 3 220 Ships in 10 - 15 working days
Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more!... Computer Hacking - A beginners guide to computer hacking, how to hack, internet skills, hacking techniques, and more! (Paperback)
Joe Benton
R356 R323 Discovery Miles 3 230 Save R33 (9%) Ships in 10 - 15 working days
Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Paperback)
Alex Wagner
R1,310 R1,102 Discovery Miles 11 020 Save R208 (16%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cybersecurity All-in-One For Dummies
Joseph Steinberg, Kevin Beaver, … Paperback R1,216 R894 Discovery Miles 8 940
Unmasking the Hacker - Demystifying…
Amanda-Jane Turner Hardcover R777 Discovery Miles 7 770
Computer Networking and Cybersecurity
Quinn Kiser Paperback R908 R786 Discovery Miles 7 860
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,248 R1,040 Discovery Miles 10 400
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,898 Discovery Miles 58 980
Hacking - Computer Hacking for…
Adam Dodson Hardcover R624 R560 Discovery Miles 5 600
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver Hardcover R1,954 Discovery Miles 19 540
Hacking - 17 Must Tools every Hacker…
Alex Wagner Hardcover R1,074 R912 Discovery Miles 9 120
Digital Earth - Cyber Threats, Privacy…
It Governance Publishing Paperback R709 Discovery Miles 7 090
Unhackable - Your Online Security…
George Mansour Hardcover R701 Discovery Miles 7 010

 

Partners