0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (144)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Ethical Hacking for Beginners - Pre-Engagement Process Execution (Paperback): Attila Kovacs Ethical Hacking for Beginners - Pre-Engagement Process Execution (Paperback)
Attila Kovacs
R486 R444 Discovery Miles 4 440 Save R42 (9%) Ships in 10 - 15 working days
Cybersecurity for Beginners - How to Get a Job in Cybersecurity (Paperback): Attila Kovacs Cybersecurity for Beginners - How to Get a Job in Cybersecurity (Paperback)
Attila Kovacs
R628 R559 Discovery Miles 5 590 Save R69 (11%) Ships in 10 - 15 working days
Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback): National Institute of Standards and Tech Cybersecurity Framework Smart Grid Profile - NIST Technical Note 2051 (Paperback)
National Institute of Standards and Tech
R884 Discovery Miles 8 840 Ships in 10 - 15 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,614 Discovery Miles 16 140 Ships in 10 - 15 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration... Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts. (Paperback)
Ethem Mining
R512 Discovery Miles 5 120 Ships in 10 - 15 working days
Securing Telehealth Remote Patient Monitoring Ecosystem - Cybersecurity for the Healthcare Sector (Paperback): National... Securing Telehealth Remote Patient Monitoring Ecosystem - Cybersecurity for the Healthcare Sector (Paperback)
National Institute of Standards and Tech
R696 Discovery Miles 6 960 Ships in 10 - 15 working days
Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Paperback)
Frederic Scott Deaver
R2,652 R2,157 Discovery Miles 21 570 Save R495 (19%) Ships in 10 - 15 working days
Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Paperback): Attila Kovacs Ethical Hacking for Beginners - How to Build Your Pen Test Lab Fast (Paperback)
Attila Kovacs
R672 R597 Discovery Miles 5 970 Save R75 (11%) Ships in 10 - 15 working days
Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback): Sairam Jetty, Sagar... Securing Network Infrastructure - Discover practical network security with Nmap and Nessus 7 (Paperback)
Sairam Jetty, Sagar Rahalkar
R1,271 Discovery Miles 12 710 Ships in 10 - 15 working days

Plug the gaps in your network's infrastructure with resilient network security models Key Features Develop a cost-effective and end-to-end vulnerability management program Explore best practices for vulnerability scanning and risk assessment Understand and implement network enumeration with Nessus and Network Mapper (Nmap) Book DescriptionDigitization drives technology today, which is why it's so important for organizations to design security mechanisms for their network infrastructures. Analyzing vulnerabilities is one of the best ways to secure your network infrastructure. This Learning Path begins by introducing you to the various concepts of network security assessment, workflows, and architectures. You will learn to employ open source tools to perform both active and passive network scanning and use these results to analyze and design a threat model for network security. With a firm understanding of the basics, you will then explore how to use Nessus and Nmap to scan your network for vulnerabilities and open ports and gain back door entry into a network. As you progress through the chapters, you will gain insights into how to carry out various key scanning tasks, including firewall detection, OS detection, and access management to detect vulnerabilities in your network. By the end of this Learning Path, you will be familiar with the tools you need for network scanning and techniques for vulnerability scanning and network protection. This Learning Path includes content from the following Packt books: Network Scanning Cookbook by Sairam Jetty Network Vulnerability Assessment by Sagar Rahalkar What you will learn Explore various standards and frameworks for vulnerability assessments and penetration testing Gain insight into vulnerability scoring and reporting Discover the importance of patching and security hardening Develop metrics to measure the success of a vulnerability management program Perform configuration audits for various platforms using Nessus Write custom Nessus and Nmap scripts on your own Install and configure Nmap and Nessus in your network infrastructure Perform host discovery to identify network devices Who this book is forThis Learning Path is designed for security analysts, threat analysts, and security professionals responsible for developing a network threat model for an organization. Professionals who want to be part of a vulnerability management team and implement an end-to-end robust vulnerability management program will also find this Learning Path useful.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R509 R473 Discovery Miles 4 730 Save R36 (7%) Ships in 10 - 15 working days
Cybersecurity for Beginners - What You Must Know about Cybersecurity (Paperback): Attila Kovacs Cybersecurity for Beginners - What You Must Know about Cybersecurity (Paperback)
Attila Kovacs
R631 R562 Discovery Miles 5 620 Save R69 (11%) Ships in 10 - 15 working days
Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback): Michael... Binary Analysis Cookbook - Actionable recipes for disassembling and analyzing binaries for security risks (Paperback)
Michael Born
R1,123 Discovery Miles 11 230 Ships in 10 - 15 working days

Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks Key Features Adopt a methodological approach to binary ELF analysis on Linux Learn how to disassemble binaries and understand disassembled code Discover how and when to patch a malicious binary during analysis Book DescriptionBinary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts. By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis. What you will learn Traverse the IA32, IA64, and ELF specifications Explore Linux tools to disassemble ELF binaries Identify vulnerabilities in 32-bit and 64-bit binaries Discover actionable solutions to overcome the limitations in analyzing ELF binaries Interpret the output of Linux tools to identify security risks in binaries Understand how dynamic taint analysis works Who this book is forThis book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you're a Linux system administrator or information security professional, you'll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book

Ethical Hacking - A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking (Paperback): Hilary Morrison, Hein... Ethical Hacking - A Comprehensive Beginner's Guide to Learn and Master Ethical Hacking (Paperback)
Hilary Morrison, Hein Smith
R442 Discovery Miles 4 420 Ships in 10 - 15 working days
Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback): Adam Dodson Hacking - Computer Hacking for beginners, how to hack, and understanding computer security! (Paperback)
Adam Dodson
R361 R330 Discovery Miles 3 300 Save R31 (9%) Ships in 10 - 15 working days
Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process (Paperback): Rodney... Solving Information Assurance Issues using Defense in Depth Measures and The Analytical Hiearchy Process (Paperback)
Rodney Alexander
R501 Discovery Miles 5 010 Ships in 10 - 15 working days
Securing Telehealth Remote Patient Monitoring Ecosystem (Paperback): National Institute of Standards and Tech Securing Telehealth Remote Patient Monitoring Ecosystem (Paperback)
National Institute of Standards and Tech
R663 Discovery Miles 6 630 Ships in 10 - 15 working days
Conversations in Cyberspace (Paperback): Giulio D'Agostino Conversations in Cyberspace (Paperback)
Giulio D'Agostino
R672 R597 Discovery Miles 5 970 Save R75 (11%) Ships in 10 - 15 working days

Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world. The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some of the key figures in industrial control systems (ICS), advanced persistent threat (APT) and online/deep web members organizations. It aims to be an introduction to the relationships between security, OSINT and the vast and complex world hiding in the deep web. The information provided will be beneficial to security professionals and system administrators interested in exploring today's concerns in database design, privacy and security-by-design, and deep web members organizations, including Cicada 3301, the Unknowns, Anonymous, and more.

Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,298 Discovery Miles 12 980 Ships in 10 - 15 working days
Apoc@lypse - The End of Antivirus (Paperback): Rogerio Winter, Kil Park, Fernando Amatte Apoc@lypse - The End of Antivirus (Paperback)
Rogerio Winter, Kil Park, Fernando Amatte
R211 Discovery Miles 2 110 Ships in 10 - 15 working days
Online Hacker Survival Guide - Achieving Online Invisibility for Asset and Reputation Protection (Paperback): Naven Johnson Online Hacker Survival Guide - Achieving Online Invisibility for Asset and Reputation Protection (Paperback)
Naven Johnson
R272 Discovery Miles 2 720 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Quality Assurance (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Quality Assurance (Paperback)
Kenneth Fraser
R533 Discovery Miles 5 330 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Cryptography (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Cryptography (Paperback)
Kenneth Fraser
R518 Discovery Miles 5 180 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Hacking (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Hacking (Paperback)
Kenneth Fraser
R288 Discovery Miles 2 880 Ships in 10 - 15 working days
Mastering Your Introduction to Cyber Security (Paperback): Michael C Redmond Mastering Your Introduction to Cyber Security (Paperback)
Michael C Redmond
R413 Discovery Miles 4 130 Ships in 10 - 15 working days
Metasploit Bootcamp (Paperback): Nipun Jaswal Metasploit Bootcamp (Paperback)
Nipun Jaswal
R1,299 Discovery Miles 12 990 Ships in 10 - 15 working days

Master the art of penetration testing with Metasploit Framework in 7 days About This Book * A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days * Carry out penetration testing in complex and highly-secured environments. * Learn techniques to Integrate Metasploit with industry's leading tools Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out advanced penetration testing in highly secured environments then, this book is for you. What You Will Learn * Get hands-on knowledge of Metasploit * Perform penetration testing on services like Databases, VOIP and much more * Understand how to Customize Metasploit modules and modify existing exploits * Write simple yet powerful Metasploit automation scripts * Explore steps involved in post-exploitation on Android and mobile platforms. In Detail The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve. Style and approach This book is all about fast and intensive learning. That means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, show solving problems in newer and unseen ways, and solve real-world examples.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Loved By The First
C F Rabbiosi Hardcover R808 R716 Discovery Miles 7 160
Twisted Games - Twisted: Book 2
Ana Huang Paperback  (2)
R295 R264 Discovery Miles 2 640
Training The Heart - Silver Pines Ranch…
Paisley Hope Paperback R275 R229 Discovery Miles 2 290
The Rhythm of Love
Christopher Woodward Hardcover R936 R798 Discovery Miles 7 980
Brutal Vows - Queens And Monsters: Book…
J T Geissinger Paperback R470 R426 Discovery Miles 4 260
Terms And Conditions - Dreamland…
Lauren Asher Paperback  (2)
R295 R264 Discovery Miles 2 640
Redeemed
Lauren Asher Paperback R295 R264 Discovery Miles 2 640
King Of Envy - Kings Of Sin: Book 5
Ana Huang Paperback R537 Discovery Miles 5 370
God Of Pain - Legacy Of Gods: Book 2
Rina Kent Paperback R352 R323 Discovery Miles 3 230
Bloodshed
Molly Doyle Hardcover R865 R761 Discovery Miles 7 610

 

Partners