0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (10)
  • R250 - R500 (88)
  • R500+ (138)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hackers Exposed - Discover the secret world of cybercrime (Paperback): Fernando Uilherme Barbosa de Azevedo Hackers Exposed - Discover the secret world of cybercrime (Paperback)
Fernando Uilherme Barbosa de Azevedo
R343 Discovery Miles 3 430 Ships in 10 - 15 working days
Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback): Vikram Sethi Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback)
Vikram Sethi; Foreword by Terry Oroszi
R646 R557 Discovery Miles 5 570 Save R89 (14%) Ships in 10 - 15 working days
Ptfm - Purple Team Field Manual (Paperback): Tim Bryant Ptfm - Purple Team Field Manual (Paperback)
Tim Bryant
R496 Discovery Miles 4 960 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R474 R398 Discovery Miles 3 980 Save R76 (16%) Ships in 10 - 15 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R496 R423 Discovery Miles 4 230 Save R73 (15%) Ships in 10 - 15 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R346 R295 Discovery Miles 2 950 Save R51 (15%) Ships in 10 - 15 working days
Intrusion Detection Honeypots (Paperback): Chris Sanders Intrusion Detection Honeypots (Paperback)
Chris Sanders
R981 R862 Discovery Miles 8 620 Save R119 (12%) Ships in 10 - 15 working days
Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network... Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats (Paperback)
Quinn Kiser
R426 Discovery Miles 4 260 Ships in 10 - 15 working days
Hacking - The Beginner's Complete Guide To Computer Hacking And Penetration Testing (Paperback): Miles Price Hacking - The Beginner's Complete Guide To Computer Hacking And Penetration Testing (Paperback)
Miles Price
R399 Discovery Miles 3 990 Ships in 10 - 15 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R506 R434 Discovery Miles 4 340 Save R72 (14%) Ships in 10 - 15 working days
Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,529 Discovery Miles 15 290 Ships in 10 - 15 working days
PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback): Jon Albert PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback)
Jon Albert
R309 R260 Discovery Miles 2 600 Save R49 (16%) Ships in 10 - 15 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R347 R296 Discovery Miles 2 960 Save R51 (15%) Ships in 10 - 15 working days
Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R352 R295 Discovery Miles 2 950 Save R57 (16%) Ships in 10 - 15 working days
Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social... Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social engineering attacks (Paperback)
Tim Rains
R2,329 Discovery Miles 23 290 Ships in 10 - 15 working days

A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation Key Features Protect your organization from cybersecurity threats with field-tested strategies Discover the most common ways enterprises initially get compromised Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself. What you will learn Discover cybersecurity strategies and the ingredients critical to their success Improve vulnerability management by reducing risks and costs for your organization Learn how malware and other threats have evolved over the past decade Mitigate internet-based threats, phishing attacks, and malware distribution sites Weigh the pros and cons of popular cybersecurity strategies of the past two decades Implement and then measure the outcome of a cybersecurity strategy Learn how the cloud provides better security capabilities than on-premises IT environments Who this book is forThis book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R755 R645 Discovery Miles 6 450 Save R110 (15%) Ships in 10 - 15 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R493 R419 Discovery Miles 4 190 Save R74 (15%) Ships in 10 - 15 working days
The Giant Black Book of Computer Viruses (Paperback): Mark Ludwig The Giant Black Book of Computer Viruses (Paperback)
Mark Ludwig
R942 Discovery Miles 9 420 Ships in 10 - 15 working days
Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield... Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield advantage (Paperback)
Johann Rehberger
R1,242 Discovery Miles 12 420 Ships in 10 - 15 working days

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R922 Discovery Miles 9 220 Ships in 10 - 15 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback): National Institute of Standards and Tech Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback)
National Institute of Standards and Tech
R844 Discovery Miles 8 440 Ships in 10 - 15 working days
Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd... Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd Revised edition)
Oleg Skulkin, Donnie Tindall, Rohit Tamma
R1,283 Discovery Miles 12 830 Ships in 10 - 15 working days

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts Key Features Get up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source forensic tools Learn malware detection and analysis techniques to investigate mobile cybersecurity incidents Book DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you'll be able to investigate cybersecurity incidents involving Android malware. By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis. What you will learn Understand Android OS and architecture Set up a forensics environment for Android analysis Perform logical and physical data extractions Learn to recover deleted data Explore how to analyze application data Identify malware on Android devices Analyze Android malware Who this book is forIf you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Paperback)
Alex Wagner
R1,277 R1,057 Discovery Miles 10 570 Save R220 (17%) Ships in 10 - 15 working days
Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to... Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Paperback, 2nd Revised edition)
Yuri Diogenes, Dr. Erdal Ozkaya
R2,176 Discovery Miles 21 760 Ships in 10 - 15 working days

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is forFor the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Paperback): Alex Wagner Hacking - 17 Must Tools every Hacker should have & 17 Most Dangerous Hacking Attacks (Paperback)
Alex Wagner
R880 R738 Discovery Miles 7 380 Save R142 (16%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computer Programming for Beginners and…
Alan Grid Hardcover R1,239 R1,036 Discovery Miles 10 360
Hacking - A Comprehensive Guide to…
Sam Griffin Hardcover R618 R525 Discovery Miles 5 250
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,217 R996 Discovery Miles 9 960
Computer Networking and Cybersecurity
Quinn Kiser Paperback R885 R749 Discovery Miles 7 490
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,656 Discovery Miles 56 560
GRU Cybervillains - The DOJ Indictment…
Department of Justice Hardcover R554 Discovery Miles 5 540
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver Hardcover R1,861 Discovery Miles 18 610
Hacking - 17 Must Tools every Hacker…
Alex Wagner Hardcover R1,047 R872 Discovery Miles 8 720
Cybersecurity - Learn Information…
Alan Grid Hardcover R787 R667 Discovery Miles 6 670
Unmasking the Hacker - Demystifying…
Amanda-Jane Turner Hardcover R729 Discovery Miles 7 290

 

Partners