0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (148)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hacking & Malware (Paperback): Solis Tech Hacking & Malware (Paperback)
Solis Tech
R726 Discovery Miles 7 260 Ships in 10 - 15 working days
#Lazarus10 (Paperback): Andrew Rajan #Lazarus10 (Paperback)
Andrew Rajan
R418 Discovery Miles 4 180 Ships in 10 - 15 working days
Hacking + Malware + Comptia A+ (Paperback): Solis Tech Hacking + Malware + Comptia A+ (Paperback)
Solis Tech
R525 Discovery Miles 5 250 Ships in 10 - 15 working days
Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide... Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide (Paperback)
Walter Spivak
R260 Discovery Miles 2 600 Ships in 10 - 15 working days
Malware & Raspberry Pi 2 (Paperback): Solis Tech Malware & Raspberry Pi 2 (Paperback)
Solis Tech
R709 Discovery Miles 7 090 Ships in 10 - 15 working days
Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback): John H Ferrari Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback)
John H Ferrari
R191 Discovery Miles 1 910 Ships in 10 - 15 working days
Malware & Open Source (Paperback): Solis Tech Malware & Open Source (Paperback)
Solis Tech
R260 Discovery Miles 2 600 Ships in 10 - 15 working days
Under Attack (Hardcover): The World's Leading Experts Under Attack (Hardcover)
The World's Leading Experts
R725 Discovery Miles 7 250 Ships in 10 - 15 working days
Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,403 Discovery Miles 14 030 Ships in 10 - 15 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R829 Discovery Miles 8 290 Ships in 10 - 15 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R425 Discovery Miles 4 250 Ships in 10 - 15 working days
Implementing AppFog (Paperback): Matthew Nohr, Isaac Rabinovitch Implementing AppFog (Paperback)
Matthew Nohr, Isaac Rabinovitch
R836 Discovery Miles 8 360 Ships in 10 - 15 working days

This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform. Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the installation process if you do not already have it. It would be ideal to have some knowledge of cloud computing and know about the basics of database and network deployment.

Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback): Eric Lawrence Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback)
Eric Lawrence
R676 Discovery Miles 6 760 Ships in 10 - 15 working days
Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R2,004 Discovery Miles 20 040 Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed): Christopher Elisan Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed)
Christopher Elisan
R1,267 R1,063 Discovery Miles 10 630 Save R204 (16%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

The CEO's Manual on Cyber Security (Paperback): James Scott The CEO's Manual on Cyber Security (Paperback)
James Scott
R446 Discovery Miles 4 460 Ships in 10 - 15 working days

Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social engineering, keeping your corporation one step ahead of the attackers. It also details how enterprises can implement defenses against social engineering within their security policy. In this book you will learn how to avoid and prevent all of the following and more: Web Attacks Social Engineering Denial of Service caused by botnets Cloud Hacks Attacks via the Universal Serial Bus Clickjacking and cross-site scripting Phishing attacks from trusted third parties Data Exfiltration SSFR Attacks and CRIME (Compression Ratio Info-Leak Made Easy). Don't let your company fall victim to the thousands that will try to compromise its security and take it for all they can. Simply following the steps outlined in this book and being proactive can save you millions.

Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback): Shawn Rohrbach Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback)
Shawn Rohrbach
R601 Discovery Miles 6 010 Ships in 10 - 15 working days

In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement. You will learn how to: Analyze your computer for viruses, malware and spyware Protect your children while they use the Internet Secure your home and small business wireless network Prevent cyber stalking and unwarranted intrusion into your personal life Ensure your on line business transactions and purchases are secure ...and more

Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback): Marcos... Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback)
Marcos Christodonte II
R222 Discovery Miles 2 220 Ships in 10 - 15 working days

From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with Principle Logic, LLC and author of Hacking For Dummies and Security On Wheels audio programs "This is one of the most fun information security books I've read...it combines a fun storyline with easy to digest tips on information security for employees and even contains 'tear-down' tip sheets " --Dr. Anton Chuvakin, author of PCI Compliance, chuvakin.org While companies spend millions on security products, attackers continue to steal their corporate secrets (and customer data) by exploiting the asset most often ignored on the security budget - people. Organizations that want to keep their trade secrets a secret must find better ways to help employees understand the importance of security. Packed with suspenseful lessons and quick tips for employees, Cyber Within helps organizations take that challenge head-on.

Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback): Robert T Mba Uda Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback)
Robert T Mba Uda
R570 Discovery Miles 5 700 Ships in 10 - 15 working days
Constraint-based Analysis of Security Properties (Paperback): Beata Sarna-Starosta Constraint-based Analysis of Security Properties (Paperback)
Beata Sarna-Starosta
R1,516 Discovery Miles 15 160 Ships in 10 - 15 working days
Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R481 R361 Discovery Miles 3 610 Save R120 (25%) Ships in 12 - 19 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Surviving a Virus Plague (Paperback): The World War Museum Surviving a Virus Plague (Paperback)
The World War Museum
R833 R716 Discovery Miles 7 160 Save R117 (14%) Ships in 10 - 15 working days
Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover): Victor... Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover)
Victor Morris
R3,973 Discovery Miles 39 730 Ships in 12 - 19 working days

While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorised access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorising users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses. The objective of this book is to evaluate the extent to which FAA has effectively implemented information security controls to protect its air traffic control systems. This book also identifies the cybersecurity challenges facing FAA as it shifts to the NextGen ATC system and how FAA has begun addressing those challenges; and assesses the extent to which FAA and its contractors, in the acquisition of NextGen programs, have followed federal guidelines for incorporating cybersecurity controls.

Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback): Stefan Beissel Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback)
Stefan Beissel
R1,236 R1,032 Discovery Miles 10 320 Save R204 (17%) Ships in 10 - 15 working days
Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R637 Discovery Miles 6 370 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advanced Introduction to Law and…
Shubha Ghosh Paperback R714 Discovery Miles 7 140
Infringement of the United States Patent…
Richard T. Holzmann Hardcover R2,795 Discovery Miles 27 950
Time-dependent Problems in Imaging and…
Barbara Kaltenbacher, Thomas Schuster, … Hardcover R4,265 Discovery Miles 42 650
New Developments in the Visualization…
David H. Laidlaw, Anna Vilanova Hardcover R4,412 Discovery Miles 44 120
Murder At Small Koppie - The Real Story…
Greg Marinovich Paperback  (5)
R336 Discovery Miles 3 360
Peacekeeping and the African Union…
Jude Cocodia Hardcover R4,480 Discovery Miles 44 800
New Directions in Copyright Law, Volume…
Fiona Macmillan Hardcover R3,345 Discovery Miles 33 450
Form in Intellectual Property Law
David Booton Hardcover R3,663 Discovery Miles 36 630
Patent information and documentation in…
Brenda M. Rimmer, Commission of the European Communities Hardcover R3,570 Discovery Miles 35 700
The New Intellectual Property of Health…
Alberto Alemanno, Enrico Bonadio Hardcover R4,179 Discovery Miles 41 790

 

Partners