0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (84)
  • R500+ (149)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hackers Exposed - Discover the secret world of cybercrime (Paperback): Fernando Uilherme Barbosa de Azevedo Hackers Exposed - Discover the secret world of cybercrime (Paperback)
Fernando Uilherme Barbosa de Azevedo
R365 Discovery Miles 3 650 Ships in 10 - 15 working days
Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback): Vikram Sethi Cyber Weapons of Mass Psychological Destruction - And the People Who Use Them (Paperback)
Vikram Sethi; Foreword by Terry Oroszi
R629 R573 Discovery Miles 5 730 Save R56 (9%) Ships in 10 - 15 working days
Ptfm - Purple Team Field Manual (Paperback): Tim Bryant Ptfm - Purple Team Field Manual (Paperback)
Tim Bryant
R519 Discovery Miles 5 190 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R461 R423 Discovery Miles 4 230 Save R38 (8%) Ships in 10 - 15 working days
Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing... Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing malicious viruses, malware, and spyware. (Paperback)
Hugh Mendoza
R225 Discovery Miles 2 250 Ships in 10 - 15 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R484 Discovery Miles 4 840 Ships in 10 - 15 working days
Intrusion Detection Honeypots (Paperback): Chris Sanders Intrusion Detection Honeypots (Paperback)
Chris Sanders
R956 R861 Discovery Miles 8 610 Save R95 (10%) Ships in 10 - 15 working days
The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R494 R461 Discovery Miles 4 610 Save R33 (7%) Ships in 10 - 15 working days
Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback): William Vance Linux Command - A Comprehensive Beginners Guide to Learn the Realms of Linux Command from A-Z (Paperback)
William Vance
R490 R457 Discovery Miles 4 570 Save R33 (7%) Ships in 10 - 15 working days
PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback): Jon Albert PC Computer Security & Backup Guide - How to Secure & Backup Your PC with Antivirus & Malware Software (Paperback)
Jon Albert
R301 R276 Discovery Miles 2 760 Save R25 (8%) Ships in 10 - 15 working days
Linux Command - Advanced Methods and Strategies to Shell Scripting (Paperback): William Vance Linux Command - Advanced Methods and Strategies to Shell Scripting (Paperback)
William Vance
R489 R456 Discovery Miles 4 560 Save R33 (7%) Ships in 10 - 15 working days
Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback): Mark Schumacher Shue's, CompTIA Security+, Exam SY0-601, Study Supplement (Paperback)
Mark Schumacher
R697 Discovery Miles 6 970 Ships in 10 - 15 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R338 R314 Discovery Miles 3 140 Save R24 (7%) Ships in 10 - 15 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R337 R313 Discovery Miles 3 130 Save R24 (7%) Ships in 10 - 15 working days
Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are... Cybersecurity - Learn Information Technology Security: How to Protect Your Electronic Data from Hacker Attacks While You Are Browsing the Internet with Your Smart Devices, PC or Television (Paperback)
Alan Grid
R494 R455 Discovery Miles 4 550 Save R39 (8%) Ships in 10 - 15 working days
Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback): Tim Warren Computer Hacking - The Crash Course Guide to Learning Computer Hacking Fast & How to Hack for Beginners (Paperback)
Tim Warren
R343 R313 Discovery Miles 3 130 Save R30 (9%) Ships in 10 - 15 working days
Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social... Cybersecurity Threats, Malware Trends, and Strategies - Learn to mitigate exploits, malware, phishing, and other social engineering attacks (Paperback)
Tim Rains
R2,291 Discovery Miles 22 910 Ships in 10 - 15 working days

A comprehensive guide for cybersecurity professionals to acquire unique insights on the evolution of the threat landscape and how you can address modern cybersecurity challenges in your organisation Key Features Protect your organization from cybersecurity threats with field-tested strategies Discover the most common ways enterprises initially get compromised Measure the effectiveness of your organization's current cybersecurity program against cyber attacks Book DescriptionAfter scrutinizing numerous cybersecurity strategies, Microsoft's former Global Chief Security Advisor in this book helps you understand the efficacy of popular cybersecurity strategies and more. Cybersecurity Threats, Malware Trends, and Strategies offers an unprecedented long-term view of the global threat landscape by examining the twenty-year trend in vulnerability disclosures and exploitation, nearly a decade of regional differences in malware infections, the socio-economic factors that underpin them, and how global malware has evolved. This will give you further perspectives into malware protection for your organization. It also examines internet-based threats that CISOs should be aware of. The book will provide you with an evaluation of the various cybersecurity strategies that have ultimately failed over the past twenty years, along with one or two that have actually worked. It will help executives and security and compliance professionals understand how cloud computing is a game changer for them. By the end of this book, you will know how to measure the effectiveness of your organization's cybersecurity strategy and the efficacy of the vendors you employ to help you protect your organization and yourself. What you will learn Discover cybersecurity strategies and the ingredients critical to their success Improve vulnerability management by reducing risks and costs for your organization Learn how malware and other threats have evolved over the past decade Mitigate internet-based threats, phishing attacks, and malware distribution sites Weigh the pros and cons of popular cybersecurity strategies of the past two decades Implement and then measure the outcome of a cybersecurity strategy Learn how the cloud provides better security capabilities than on-premises IT environments Who this book is forThis book is designed to benefit engineers, leaders, or any professional with either a responsibility for cyber security within their organization, or an interest in working in this ever-growing field.

Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Paperback)
Alex Wagner
R735 R651 Discovery Miles 6 510 Save R84 (11%) Ships in 10 - 15 working days
Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network... Computer Networking and Cybersecurity - A Guide to Understanding Communications Systems, Internet Connections, and Network Security Along with Protection from Hacking and Cyber Security Threats (Paperback)
Quinn Kiser
R453 Discovery Miles 4 530 Ships in 10 - 15 working days
The Giant Black Book of Computer Viruses (Paperback): Mark Ludwig The Giant Black Book of Computer Viruses (Paperback)
Mark Ludwig
R940 Discovery Miles 9 400 Ships in 10 - 15 working days
Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield... Cybersecurity Attacks - Red Team Strategies - A practical guide to building a penetration testing program having homefield advantage (Paperback)
Johann Rehberger
R1,232 Discovery Miles 12 320 Ships in 10 - 15 working days

Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key Features Build, manage, and measure an offensive red team program Leverage the homefield advantage to stay ahead of your adversaries Understand core adversarial tactics and techniques, and protect pentesters and pentesting assets Book DescriptionIt's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learn Understand the risks associated with security breaches Implement strategies for building an effective penetration testing team Map out the homefield using knowledge graphs Hunt credentials using indexing and other practical techniques Gain blue team tooling insights to enhance your red team skills Communicate results and influence decision makers with appropriate data Who this book is forThis is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the... Cyber Warfare - Truth, Tactics, and Strategies - Strategic concepts and truths to help you and your organization survive on the battleground of cyber warfare (Paperback)
Dr. Chase Cunningham; Foreword by Gregory J. Touhill
R920 Discovery Miles 9 200 Ships in 10 - 15 working days

Insights into the true history of cyber warfare, and the strategies, tactics, and cybersecurity tools that can be used to better defend yourself and your organization against cyber threat. Key Features Define and determine a cyber-defence strategy based on current and past real-life examples Understand how future technologies will impact cyber warfare campaigns and society Future-ready yourself and your business against any cyber threat Book DescriptionThe era of cyber warfare is now upon us. What we do now and how we determine what we will do in the future is the difference between whether our businesses live or die and whether our digital self survives the digital battlefield. Cyber Warfare - Truth, Tactics, and Strategies takes you on a journey through the myriad of cyber attacks and threats that are present in a world powered by AI, big data, autonomous vehicles, drones video, and social media. Dr. Chase Cunningham uses his military background to provide you with a unique perspective on cyber security and warfare. Moving away from a reactive stance to one that is forward-looking, he aims to prepare people and organizations to better defend themselves in a world where there are no borders or perimeters. He demonstrates how the cyber landscape is growing infinitely more complex and is continuously evolving at the speed of light. The book not only covers cyber warfare, but it also looks at the political, cultural, and geographical influences that pertain to these attack methods and helps you understand the motivation and impacts that are likely in each scenario. Cyber Warfare - Truth, Tactics, and Strategies is as real-life and up-to-date as cyber can possibly be, with examples of actual attacks and defense techniques, tools. and strategies presented for you to learn how to think about defending your own systems and data. What you will learn Hacking at scale - how machine learning (ML) and artificial intelligence (AI) skew the battlefield Defending a boundaryless enterprise Using video and audio as weapons of influence Uncovering DeepFakes and their associated attack vectors Using voice augmentation for exploitation Defending when there is no perimeter Responding tactically to counter-campaign-based attacks Who this book is forThis book is for any engineer, leader, or professional with either a responsibility for cyber security within their organizations, or an interest in working in this ever-growing field.

Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to... Cybersecurity - Attack and Defense Strategies - Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against cybercriminals, 2nd Edition (Paperback, 2nd Revised edition)
Yuri Diogenes, Dr. Erdal Ozkaya
R2,141 Discovery Miles 21 410 Ships in 10 - 15 working days

Updated and revised edition of the bestselling guide to developing defense strategies against the latest threats to cybersecurity Key Features Covers the latest security threats and defense strategies for 2020 Introduces techniques and skillsets required to conduct threat hunting and deal with a system breach Provides new information on Cloud Security Posture Management, Microsoft Azure Threat Protection, Zero Trust Network strategies, Nation State attacks, the use of Azure Sentinel as a cloud-based SIEM for logging and investigation, and much more Book DescriptionCybersecurity - Attack and Defense Strategies, Second Edition is a completely revised new edition of the bestselling book, covering the very latest security threats and defense mechanisms including a detailed overview of Cloud Security Posture Management (CSPM) and an assessment of the current threat landscape, with additional focus on new IoT threats and cryptomining. Cybersecurity starts with the basics that organizations need to know to maintain a secure posture against outside threat and design a robust cybersecurity program. It takes you into the mindset of a Threat Actor to help you better understand the motivation and the steps of performing an actual attack - the Cybersecurity kill chain. You will gain hands-on experience in implementing cybersecurity using new techniques in reconnaissance and chasing a user's identity that will enable you to discover how a system is compromised, and identify and then exploit the vulnerabilities in your own system. This book also focuses on defense strategies to enhance the security of a system. You will also discover in-depth tools, including Azure Sentinel, to ensure there are security controls in each network layer, and how to carry out the recovery process of a compromised system. What you will learn The importance of having a solid foundation for your security posture Use cyber security kill chain to understand the attack strategy Boost your organization's cyber resilience by improving your security policies, hardening your network, implementing active sensors, and leveraging threat intelligence Utilize the latest defense tools, including Azure Sentinel and Zero Trust Network strategy Identify different types of cyberattacks, such as SQL injection, malware and social engineering threats such as phishing emails Perform an incident investigation using Azure Security Center and Azure Sentinel Get an in-depth understanding of the disaster recovery process Understand how to consistently monitor security and implement a vulnerability management strategy for on-premises and hybrid cloud Learn how to perform log analysis using the cloud to identify suspicious activities, including logs from Amazon Web Services and Azure Who this book is forFor the IT professional venturing into the IT security domain, IT pentesters, security consultants, or those looking to perform ethical hacking. Prior knowledge of penetration testing is beneficial.

Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Paperback)
Alex Wagner
R1,244 R1,051 Discovery Miles 10 510 Save R193 (16%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Viruses, Hardware and Software Trojans…
Anatoly Belous, Vitali Saladukha Hardcover R4,540 Discovery Miles 45 400
Malware Forensics - Investigating and…
Cameron H. Malin, Eoghan Casey, … Paperback R1,632 Discovery Miles 16 320
Computer Networking and Cybersecurity
Quinn Kiser Paperback R862 R751 Discovery Miles 7 510
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,186 R992 Discovery Miles 9 920
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,607 Discovery Miles 56 070
Hacking - Computer Hacking for…
Adam Dodson Hardcover R593 R536 Discovery Miles 5 360
Deaver on Cybersecurity - An irreverent…
Frederic Scott Deaver Hardcover R1,918 Discovery Miles 19 180
Hacking - 17 Must Tools every Hacker…
Alex Wagner Hardcover R1,020 R871 Discovery Miles 8 710
Digital Earth - Cyber Threats, Privacy…
It Governance Publishing Paperback R678 Discovery Miles 6 780
Mastering Your Introduction to Cyber…
Michael C Redmond Hardcover R648 Discovery Miles 6 480

 

Partners