0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (81)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Malware & Raspberry Pi 2 (Paperback): Solis Tech Malware & Raspberry Pi 2 (Paperback)
Solis Tech
R659 Discovery Miles 6 590 Ships in 18 - 22 working days
Easy Prey (Hardcover): The World's Leading Experts Easy Prey (Hardcover)
The World's Leading Experts
R674 Discovery Miles 6 740 Ships in 18 - 22 working days
Hacking Made Easy - Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st... Hacking Made Easy - Hack Your Way Through Life One Step at A Time - Discover The Revolutionary Hacking Secrets Of The 21st Century (Paperback)
Hacking University, Robot
R367 Discovery Miles 3 670 Ships in 18 - 22 working days
Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback): John H Ferrari Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback)
John H Ferrari
R175 Discovery Miles 1 750 Ships in 18 - 22 working days
Hacking + Malware + Quality Assurance (Paperback): Solis Tech Hacking + Malware + Quality Assurance (Paperback)
Solis Tech
R488 Discovery Miles 4 880 Ships in 18 - 22 working days
Malware & Open Source (Paperback): Solis Tech Malware & Open Source (Paperback)
Solis Tech
R240 Discovery Miles 2 400 Ships in 18 - 22 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R769 Discovery Miles 7 690 Ships in 18 - 22 working days
Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,299 Discovery Miles 12 990 Ships in 18 - 22 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Hacking & Malware (Paperback): Solis Tech Hacking & Malware (Paperback)
Solis Tech
R675 Discovery Miles 6 750 Ships in 18 - 22 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R391 Discovery Miles 3 910 Ships in 18 - 22 working days
Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R1,852 Discovery Miles 18 520 Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

Under Attack (Hardcover): The World's Leading Experts Under Attack (Hardcover)
The World's Leading Experts
R674 Discovery Miles 6 740 Ships in 18 - 22 working days
Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide... Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide (Paperback)
Walter Spivak
R240 Discovery Miles 2 400 Ships in 18 - 22 working days
Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback): Eric Lawrence Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback)
Eric Lawrence
R629 Discovery Miles 6 290 Ships in 18 - 22 working days
Implementing AppFog (Paperback): Matthew Nohr, Isaac Rabinovitch Implementing AppFog (Paperback)
Matthew Nohr, Isaac Rabinovitch
R776 Discovery Miles 7 760 Ships in 18 - 22 working days

This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform. Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the installation process if you do not already have it. It would be ideal to have some knowledge of cloud computing and know about the basics of database and network deployment.

The CEO's Manual on Cyber Security (Paperback): James Scott The CEO's Manual on Cyber Security (Paperback)
James Scott
R411 Discovery Miles 4 110 Ships in 18 - 22 working days

Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social engineering, keeping your corporation one step ahead of the attackers. It also details how enterprises can implement defenses against social engineering within their security policy. In this book you will learn how to avoid and prevent all of the following and more: Web Attacks Social Engineering Denial of Service caused by botnets Cloud Hacks Attacks via the Universal Serial Bus Clickjacking and cross-site scripting Phishing attacks from trusted third parties Data Exfiltration SSFR Attacks and CRIME (Compression Ratio Info-Leak Made Easy). Don't let your company fall victim to the thousands that will try to compromise its security and take it for all they can. Simply following the steps outlined in this book and being proactive can save you millions.

Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed): Christopher Elisan Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed)
Christopher Elisan
R1,167 R985 Discovery Miles 9 850 Save R182 (16%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

21st Century Chinese Cyberwarfare (Hardcover): It Governance Publishing 21st Century Chinese Cyberwarfare (Hardcover)
It Governance Publishing
R1,610 Discovery Miles 16 100 Ships in 18 - 22 working days

Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States era and the hard-learnt lessons of Mao's Long March infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the Great Firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain - sustained multi-year cyberattacks against the US that started in 2003 - to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how Advanced Persistent Threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to 'know their enemy'. William Hagestad II is an internationally-recognized expert on the Chinese People's Liberation Army & Government information warfare. He advises international intelligence organizations, military flag officers and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of Chinese cyberwarfare are his forte.

Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback): Shawn Rohrbach Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback)
Shawn Rohrbach
R560 Discovery Miles 5 600 Ships in 18 - 22 working days

In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement. You will learn how to: Analyze your computer for viruses, malware and spyware Protect your children while they use the Internet Secure your home and small business wireless network Prevent cyber stalking and unwarranted intrusion into your personal life Ensure your on line business transactions and purchases are secure ...and more

Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback): Robert T Mba Uda Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback)
Robert T Mba Uda
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback): Marcos... Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback)
Marcos Christodonte II
R204 Discovery Miles 2 040 Ships in 18 - 22 working days

From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with Principle Logic, LLC and author of Hacking For Dummies and Security On Wheels audio programs "This is one of the most fun information security books I've read...it combines a fun storyline with easy to digest tips on information security for employees and even contains 'tear-down' tip sheets " --Dr. Anton Chuvakin, author of PCI Compliance, chuvakin.org While companies spend millions on security products, attackers continue to steal their corporate secrets (and customer data) by exploiting the asset most often ignored on the security budget - people. Organizations that want to keep their trade secrets a secret must find better ways to help employees understand the importance of security. Packed with suspenseful lessons and quick tips for employees, Cyber Within helps organizations take that challenge head-on.

Constraint-based Analysis of Security Properties (Paperback): Beata Sarna-Starosta Constraint-based Analysis of Security Properties (Paperback)
Beata Sarna-Starosta
R1,403 Discovery Miles 14 030 Ships in 18 - 22 working days
Surviving a Virus Plague (Paperback): The World War Museum Surviving a Virus Plague (Paperback)
The World War Museum
R767 R666 Discovery Miles 6 660 Save R101 (13%) Ships in 18 - 22 working days
Computer Viruses for Dummies (Paperback, New): Ph Gregory Computer Viruses for Dummies (Paperback, New)
Ph Gregory
R419 R394 Discovery Miles 3 940 Save R25 (6%) Ships in 18 - 22 working days

Computer viruses--just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there's a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail.

Fortunately, there are ways to inoculate and protect your computer. "Computer Viruses For Dummies" helps you: Understand the risks and analyze your PC's current conditionSelect, install, and configure antivirus softwareScan your computer and e-mailRid your computer of viruses it's already caughtUpdate antivirus software and install security patchesUse firewalls and spyware blockersProtect handheld PDAs from virusesAdopt safe computing practices, especially with e-mail and when you're surfing the Net

Written by Peter H. Gregory, coauthor of "CISSP For Dummies" and "Security + For Dummies," "Computer Viruses For Dummies" goes beyond viruses to explain other nasty computer infections like Trojan horses, HiJackers, worms, phishing scams, spyware, and hoaxes. It also profiles major antivirus software to help you choose the best program(s) for your needs.

Remember, if you don't protect your computer, not only do you risk having your computer infiltrated and your data contaminated, you risk unknowingly transmitting a virus, worm, or other foul computer germ to everybody in your address book This guide will help you properly immunize your PC with antivirus software now and install updates and security patches that are like booster shots to keep your software protected against new viruses.

Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover): Victor... Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover)
Victor Morris
R3,739 Discovery Miles 37 390 Ships in 10 - 15 working days

While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorised access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorising users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses. The objective of this book is to evaluate the extent to which FAA has effectively implemented information security controls to protect its air traffic control systems. This book also identifies the cybersecurity challenges facing FAA as it shifts to the NextGen ATC system and how FAA has begun addressing those challenges; and assesses the extent to which FAA and its contractors, in the acquisition of NextGen programs, have followed federal guidelines for incorporating cybersecurity controls.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mastering Your Introduction to Cyber…
Michael C Redmond Hardcover R604 Discovery Miles 6 040
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R667 R596 Discovery Miles 5 960
Application Security Program Handbook
Derek Fisher Paperback R1,055 Discovery Miles 10 550
Computer Networking and Cybersecurity
Quinn Kiser Paperback R794 R698 Discovery Miles 6 980
Redes de ordenadores y ciberseguridad…
Quinn Kiser Hardcover R761 R675 Discovery Miles 6 750
Kali Linux Hacking - A Complete Step by…
Ethem Mining Paperback R476 Discovery Miles 4 760
Hacking - Computer Hacking for…
Adam Dodson Hardcover R546 R500 Discovery Miles 5 000
Integrated Circuit Authentication…
Mohammad Tehranipoor, Hassan Salmani, … Hardcover R3,981 Discovery Miles 39 810
Unhackable - Your Online Security…
George Mansour Hardcover R623 Discovery Miles 6 230
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710

 

Partners