0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (144)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical... Hacking - 2 Books In 1 Bargain: The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Beginner's Complete Guide to Computer Hacking and Penetration Testing (Paperback)
Miles Price
R661 Discovery Miles 6 610 Ships in 10 - 15 working days
Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete... Hacking - 3 Books in 1: The Beginner's Complete Guide to Computer Hacking and Penetration Testing & The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples & The Comprehensive Beginner's Guide to Take Control of (Paperback)
Miles Price
R744 Discovery Miles 7 440 Ships in 10 - 15 working days
How to Investigate Like a Rockstar - Live a Real Crisis to Master the Secrets of Forensic Analysis (Paperback): Sparc Flow How to Investigate Like a Rockstar - Live a Real Crisis to Master the Secrets of Forensic Analysis (Paperback)
Sparc Flow
R484 Discovery Miles 4 840 Ships in 10 - 15 working days
Ransomware - Prevention and Recovery - How to Avoid Paying a Ransom (Paperback): David C Pettit Ransomware - Prevention and Recovery - How to Avoid Paying a Ransom (Paperback)
David C Pettit
R560 Discovery Miles 5 600 Ships in 10 - 15 working days
Metasploit - Penetration Testing for Novices (Paperback): William Rowley Metasploit - Penetration Testing for Novices (Paperback)
William Rowley
R239 Discovery Miles 2 390 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Open Source (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Open Source (Paperback)
Kenneth Fraser
R534 Discovery Miles 5 340 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Raspberry Pi 2 (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Raspberry Pi 2 (Paperback)
Kenneth Fraser
R518 Discovery Miles 5 180 Ships in 10 - 15 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R868 Discovery Miles 8 680 Ships in 10 - 15 working days
Sitting Duck (Hardcover): The World's Leading Experts Sitting Duck (Hardcover)
The World's Leading Experts
R726 Discovery Miles 7 260 Ships in 10 - 15 working days
Cyber Criminals - The Tips and Hacks They Use to Crack the Financial Industry and your most precious assets (Paperback): Andrew... Cyber Criminals - The Tips and Hacks They Use to Crack the Financial Industry and your most precious assets (Paperback)
Andrew Klein
R303 Discovery Miles 3 030 Ships in 10 - 15 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R447 Discovery Miles 4 470 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Malware (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Malware (Paperback)
Kenneth Fraser
R516 Discovery Miles 5 160 Ships in 10 - 15 working days
Metasploit for Beginners (Paperback): Sagar Rahalkar Metasploit for Beginners (Paperback)
Sagar Rahalkar
R1,036 Discovery Miles 10 360 Ships in 9 - 15 working days

An easy to digest practical guide to Metasploit covering all aspects of the framework from installation, configuration, and vulnerability hunting to advanced client side attacks and anti-forensics. About This Book * Carry out penetration testing in highly-secured environments with Metasploit * Learn to bypass different defenses to gain access into different systems. * A step-by-step guide that will quickly enhance your penetration testing skills. Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who wants to quickly learn the Metasploit framework to carry out elementary penetration testing in highly secured environments then, this book is for you. What You Will Learn * Get to know the absolute basics of the Metasploit framework so you have a strong foundation for advanced attacks * Integrate and use various supporting tools to make Metasploit even more powerful and precise * Set up the Metasploit environment along with your own virtual testing lab * Use Metasploit for information gathering and enumeration before planning the blueprint for the attack on the target system * Get your hands dirty by firing up Metasploit in your own virtual lab and hunt down real vulnerabilities * Discover the clever features of the Metasploit framework for launching sophisticated and deceptive client-side attacks that bypass the perimeter security * Leverage Metasploit capabilities to perform Web application security scanning In Detail This book will begin by introducing you to Metasploit and its functionality. Next, you will learn how to set up and configure Metasploit on various platforms to create a virtual test environment. You will also get your hands on various tools and components used by Metasploit. Further on in the book, you will learn how to find weaknesses in the target system and hunt for vulnerabilities using Metasploit and its supporting tools. Next, you'll get hands-on experience carrying out client-side attacks. Moving on, you'll learn about web application security scanning and bypassing anti-virus and clearing traces on the target system post compromise. This book will also keep you updated with the latest security techniques and methods that can be directly applied to scan, test, hack, and secure networks and systems with Metasploit. By the end of this book, you'll get the hang of bypassing different defenses, after which you'll learn how hackers use the network to gain access into different systems. Style and approach This tutorial is packed with step-by-step instructions that are useful for those getting started with Metasploit. This is an easy-to-read guide to learning Metasploit from scratch that explains simply and clearly all you need to know to use this essential IT power tool.

Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback): Eric Lawrence Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback)
Eric Lawrence
R707 Discovery Miles 7 070 Ships in 10 - 15 working days
#Lazarus10 (Paperback): Andrew Rajan #Lazarus10 (Paperback)
Andrew Rajan
R440 Discovery Miles 4 400 Ships in 10 - 15 working days
Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples... Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples (Paperback)
Miles Price
R446 Discovery Miles 4 460 Ships in 10 - 15 working days
Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback): Lillian Ablon,... Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback)
Lillian Ablon, Andy Bogart
R764 Discovery Miles 7 640 Ships in 9 - 15 working days
How to Hack Like a God - Master the Secrets of Hacking Through Real Life Scenarios (Paperback): Sparc Flow How to Hack Like a God - Master the Secrets of Hacking Through Real Life Scenarios (Paperback)
Sparc Flow
R486 Discovery Miles 4 860 Ships in 10 - 15 working days
Circuit Engineering & Malware (Paperback): Solis Tech Circuit Engineering & Malware (Paperback)
Solis Tech
R542 Discovery Miles 5 420 Ships in 10 - 15 working days
You've Been Hacked - 15 Hackers You Hope Your Computer Never Meets (Paperback): William Webb You've Been Hacked - 15 Hackers You Hope Your Computer Never Meets (Paperback)
William Webb
R303 Discovery Miles 3 030 Ships in 10 - 15 working days

They were invisible. They unleashed some of the worse attacks on computers the world has ever known. And now they are exposed. This book profiles 15 of the most notorious hackers in the world.

Easy Prey (Hardcover): The World's Leading Experts Easy Prey (Hardcover)
The World's Leading Experts
R759 Discovery Miles 7 590 Ships in 10 - 15 working days
Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,473 Discovery Miles 14 730 Ships in 10 - 15 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Hacking Made Easy - Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st... Hacking Made Easy - Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century (Paperback)
Hacking University, Robot
R420 Discovery Miles 4 200 Ships in 10 - 15 working days
Malware & Open Source (Paperback): Solis Tech Malware & Open Source (Paperback)
Solis Tech
R274 Discovery Miles 2 740 Ships in 10 - 15 working days
Hacking + Malware + Quality Assurance (Paperback): Solis Tech Hacking + Malware + Quality Assurance (Paperback)
Solis Tech
R546 Discovery Miles 5 460 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hate
Tate James Paperback  (1)
R402 Discovery Miles 4 020
The Strawberry Patch Pancake House
Laurie Gilmore Paperback R295 R229 Discovery Miles 2 290
King Of Wrath - Kings Of Sin: Book 1
Ana Huang Paperback  (1)
R295 R264 Discovery Miles 2 640
Conquered, Book 2 - She Who Dares
L. P. Lovell Paperback R382 Discovery Miles 3 820
Bonds of Cupidity - Heart Hassle: Book 2
Raven Kennedy Paperback R275 R254 Discovery Miles 2 540
Unshaken Romance
Christopher Woodward Hardcover R940 R802 Discovery Miles 8 020
Twisted Lies - Twisted: Book 4
Ana Huang Paperback  (2)
R295 R264 Discovery Miles 2 640
The Next 365 Days
Blanka Lipinska Paperback R496 R464 Discovery Miles 4 640
Garvey Feinstein - Hollywood Predator
Julian Tryst Hardcover R562 Discovery Miles 5 620
The Billionaire Romance
Christopher Woodward Hardcover R992 R842 Discovery Miles 8 420

 

Partners