0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (79)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R442 R410 Discovery Miles 4 100 Save R32 (7%) Ships in 18 - 22 working days
Securing Telehealth Remote Patient Monitoring Ecosystem (Paperback): National Institute of Standards and Tech Securing Telehealth Remote Patient Monitoring Ecosystem (Paperback)
National Institute of Standards and Tech
R591 Discovery Miles 5 910 Ships in 18 - 22 working days
Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield... Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield advantage (Paperback)
Johann Rehberger
R1,141 Discovery Miles 11 410 Ships in 18 - 22 working days

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback): Vikram Sethi Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback)
Vikram Sethi; Foreword by Terry Oroszi
R700 Discovery Miles 7 000 Ships in 18 - 22 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and... Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide (Paperback)
Anthony Hack
R424 Discovery Miles 4 240 Ships in 18 - 22 working days
Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R854 Discovery Miles 8 540 Ships in 18 - 22 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Apoc@lypse - The End of Antivirus (Paperback): Rogerio Winter, Kil Park, Fernando Amatte Apoc@lypse - The End of Antivirus (Paperback)
Rogerio Winter, Kil Park, Fernando Amatte
R185 Discovery Miles 1 850 Ships in 18 - 22 working days
Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to... Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Paperback, 2nd Revised edition)
Yuri Diogenes, Dr. Erdal Ozkaya
R1,979 Discovery Miles 19 790 Ships in 18 - 22 working days

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is forFor the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback): Sairam Jetty, Sagar... Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Sairam Jetty, Sagar Rahalkar
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is forThis Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.

Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance... Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life (Two Book Bundle) (Paperback)
Trust Genics
R473 Discovery Miles 4 730 Ships in 18 - 22 working days
Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback): John a Schaefer Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback)
John a Schaefer
R535 R490 Discovery Miles 4 900 Save R45 (8%) Ships in 18 - 22 working days
Hacker & Virus Protection - The Complete Guide - Stay protected from Viruses, Trojans, Ransomware and other online threats -... Hacker & Virus Protection - The Complete Guide - Stay protected from Viruses, Trojans, Ransomware and other online threats - Super Easy and Effective Guide (Paperback)
Nitin Jain
R580 Discovery Miles 5 800 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Quality Assurance (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Quality Assurance (Paperback)
Kenneth Fraser
R476 Discovery Miles 4 760 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Cryptography (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Cryptography (Paperback)
Kenneth Fraser
R460 Discovery Miles 4 600 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Hacking (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Hacking (Paperback)
Kenneth Fraser
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd... Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd Revised edition)
Oleg Skulkin, Donnie Tindall, Rohit Tamma
R1,178 Discovery Miles 11 780 Ships in 18 - 22 working days

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts Key Features Get up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source forensic tools Learn malware detection and analysis techniques to investigate mobile cybersecurity incidents Book DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you'll be able to investigate cybersecurity incidents involving Android malware. By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis. What you will learn Understand Android OS and architecture Set up a forensics environment for Android analysis Perform logical and physical data extractions Learn to recover deleted data Explore how to analyze application data Identify malware on Android devices Analyze Android malware Who this book is forIf you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback)
Adam Dodson
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback): Michael... Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback)
Michael Born
R993 Discovery Miles 9 930 Ships in 18 - 22 working days

Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks Key Features Adopt a methodological approach to binary ELF analysis on Linux Learn how to disassemble binaries and understand disassembled code Discover how and when to patch a malicious binary during analysis Book DescriptionBinary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts. By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis. What you will learn Traverse the IA32, IA64, and ELF specifications Explore Linux tools to disassemble ELF binaries Identify vulnerabilities in 32-bit and 64-bit binaries Discover actionable solutions to overcome the limitations in analyzing ELF binaries Interpret the output of Linux tools to identify security risks in binaries Understand how dynamic taint analysis works Who this book is forThis book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book

Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback): National Institute of Standards and Tech Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback)
National Institute of Standards and Tech
R783 Discovery Miles 7 830 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Rearing Children in a Postmodern World
Carey N. Ingram Hardcover R453 Discovery Miles 4 530
Bare-Knuckle Boxer's Companion…
David Lindholm, Ulf Karlsson Hardcover R734 Discovery Miles 7 340
Deemway DNT2047 Tool for M6 Nut
R120 Discovery Miles 1 200
Wacom Intous Creative Stylus Replacement…
R649 R576 Discovery Miles 5 760
Yoga Gym - The Revolutionary 28 Day…
Nicola Jane Hobbs Paperback  (5)
R455 R421 Discovery Miles 4 210
HowExpert Guide to Yoga - 101 Tips to…
Howexpert, Jaime Larose Hardcover R755 Discovery Miles 7 550
Caged Lion - Joseph Pilates and His…
John Howard Steel Hardcover R655 R594 Discovery Miles 5 940
Yoga-Timeless Wisdom - The Path of…
Foster Walker, Barbara Wiebe Hardcover R759 Discovery Miles 7 590
The Argonaut; v. 70 (Jan.-June 1912)
Anonymous Hardcover R982 Discovery Miles 9 820
Dare to Be More - The Witness of Blessed…
Colleen Swaim, Matt Swaim Paperback R177 R164 Discovery Miles 1 640

 

Partners