0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (81)
  • R500+ (125)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
A Hacker I Am Vol 2 (Hardcover): Craig Ford A Hacker I Am Vol 2 (Hardcover)
Craig Ford
R886 R606 Discovery Miles 6 060 Save R280 (32%) Ships in 9 - 17 working days
Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R854 Discovery Miles 8 540 Ships in 18 - 22 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Apoc@lypse - The End of Antivirus (Paperback): Rogerio Winter, Kil Park, Fernando Amatte Apoc@lypse - The End of Antivirus (Paperback)
Rogerio Winter, Kil Park, Fernando Amatte
R185 Discovery Miles 1 850 Ships in 18 - 22 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to... Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Paperback, 2nd Revised edition)
Yuri Diogenes, Dr. Erdal Ozkaya
R1,979 Discovery Miles 19 790 Ships in 18 - 22 working days

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is forFor the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback): Sairam Jetty, Sagar... Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Sairam Jetty, Sagar Rahalkar
R1,311 Discovery Miles 13 110 Ships in 18 - 22 working days

Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is forThis Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.

Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Hacker & Virus Protection - The Complete Guide - Stay protected from Viruses, Trojans, Ransomware and other online threats -... Hacker & Virus Protection - The Complete Guide - Stay protected from Viruses, Trojans, Ransomware and other online threats - Super Easy and Effective Guide (Paperback)
Nitin Jain
R580 Discovery Miles 5 800 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Quality Assurance (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Quality Assurance (Paperback)
Kenneth Fraser
R476 Discovery Miles 4 760 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Cryptography (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Cryptography (Paperback)
Kenneth Fraser
R460 Discovery Miles 4 600 Ships in 18 - 22 working days
Robotics + Human-Computer Interaction + Hacking (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Hacking (Paperback)
Kenneth Fraser
R252 Discovery Miles 2 520 Ships in 18 - 22 working days
Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and... Hacking with Kali Linux - Step by Step Guide To Learn Kali Linux for Hackers, Cybersecurity, Wireless Network Security and Penetration Testing. Your First Hack and Computer Hacking Beginners Guide (Paperback)
Anthony Hack
R424 Discovery Miles 4 240 Ships in 18 - 22 working days
Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd... Learning Android Forensics - Analyze Android devices with the latest forensic tools and techniques, 2nd Edition (Paperback, 2nd Revised edition)
Oleg Skulkin, Donnie Tindall, Rohit Tamma
R1,178 Discovery Miles 11 780 Ships in 18 - 22 working days

A comprehensive guide to Android forensics, from setting up the workstation to analyzing key artifacts Key Features Get up and running with modern mobile forensic strategies and techniques Analyze the most popular Android applications using free and open source forensic tools Learn malware detection and analysis techniques to investigate mobile cybersecurity incidents Book DescriptionMany forensic examiners rely on commercial, push-button tools to retrieve and analyze data, even though there is no tool that does either of these jobs perfectly. Learning Android Forensics will introduce you to the most up-to-date Android platform and its architecture, and provide a high-level overview of what Android forensics entails. You will understand how data is stored on Android devices and how to set up a digital forensic examination environment. As you make your way through the chapters, you will work through various physical and logical techniques to extract data from devices in order to obtain forensic evidence. You will also learn how to recover deleted data and forensically analyze application data with the help of various open source and commercial tools. In the concluding chapters, you will explore malware analysis so that you'll be able to investigate cybersecurity incidents involving Android malware. By the end of this book, you will have a complete understanding of the Android forensic process, you will have explored open source and commercial forensic tools, and will have basic skills of Android malware identification and analysis. What you will learn Understand Android OS and architecture Set up a forensics environment for Android analysis Perform logical and physical data extractions Learn to recover deleted data Explore how to analyze application data Identify malware on Android devices Analyze Android malware Who this book is forIf you are a forensic analyst or an information security professional wanting to develop your knowledge of Android forensics, then this is the book for you. Some basic knowledge of the Android mobile platform is expected.

Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback): National Institute of Standards and Tech Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback)
National Institute of Standards and Tech
R783 Discovery Miles 7 830 Ships in 18 - 22 working days
Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance... Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life (Two Book Bundle) (Paperback)
Trust Genics
R473 Discovery Miles 4 730 Ships in 18 - 22 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R442 R410 Discovery Miles 4 100 Save R32 (7%) Ships in 18 - 22 working days
Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback): Michael... Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback)
Michael Born
R993 Discovery Miles 9 930 Ships in 18 - 22 working days

Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks Key Features Adopt a methodological approach to binary ELF analysis on Linux Learn how to disassemble binaries and understand disassembled code Discover how and when to patch a malicious binary during analysis Book DescriptionBinary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts. By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis. What you will learn Traverse the IA32, IA64, and ELF specifications Explore Linux tools to disassemble ELF binaries Identify vulnerabilities in 32-bit and 64-bit binaries Discover actionable solutions to overcome the limitations in analyzing ELF binaries Interpret the output of Linux tools to identify security risks in binaries Understand how dynamic taint analysis works Who this book is forThis book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book

Metasploit Bootcamp (Paperback): Nipun Jaswal Metasploit Bootcamp (Paperback)
Nipun Jaswal
R1,147 Discovery Miles 11 470 Ships in 18 - 22 working days

Master the art of penetration testing with Metasploit Framework in 7 days About This Book * A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days * Carry out penetration testing in complex and highly-secured environments. * Learn techniques to Integrate Metasploit with industry's leading tools Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out advanced penetration testing in highly secured environments then, this book is for you. What You Will Learn * Get hands-on knowledge of Metasploit * Perform penetration testing on services like Databases, VOIP and much more * Understand how to Customize Metasploit modules and modify existing exploits * Write simple yet powerful Metasploit automation scripts * Explore steps involved in post-exploitation on Android and mobile platforms. In Detail The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve. Style and approach This book is all about fast and intensive learning. That means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, show solving problems in newer and unseen ways, and solve real-world examples.

Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback)
Adam Dodson
R316 R289 Discovery Miles 2 890 Save R27 (9%) Ships in 18 - 22 working days
Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,146 Discovery Miles 11 460 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mechanics of Moving Materials
Nikolay Banichuk, Juha Jeronen, … Hardcover R4,662 Discovery Miles 46 620
Mechanics of Periodically Heterogeneous…
L.I. Manevitch, I. V. Andrianov, … Hardcover R2,801 Discovery Miles 28 010
Computational Biomechanics for Medicine…
Adam Wittek, Grand Joldes, … Hardcover R5,790 Discovery Miles 57 900
Advances in Mathematical Modeling and…
Rivka Gilat, Leslie Banks-Sills Hardcover R2,704 Discovery Miles 27 040
Particle Mechanics
Chris Collinson, Tom Roper Paperback R824 Discovery Miles 8 240
Fluid Dynamics - Theory, Computation…
Constantine Pozrikidis Hardcover R3,411 Discovery Miles 34 110
Patterns and Interfaces in Dissipative…
Y. Pomeau Hardcover R2,790 R1,620 Discovery Miles 16 200
Large Time Asymptotics for Solutions of…
P.L. Sachdev, Ch. Srinivasa Rao Hardcover R2,779 Discovery Miles 27 790
The Nature of Mathematics and the…
S. Andersson, M. Jacob Hardcover R7,396 Discovery Miles 73 960
Cosmic Update - Dark Puzzles. Arrow of…
Fred Adams, Thomas Buchert, … Hardcover R1,398 Discovery Miles 13 980

 

Partners