0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (86)
  • R500+ (166)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback): Lillian Ablon,... Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback)
Lillian Ablon, Andy Bogart
R728 Discovery Miles 7 280 Ships in 9 - 15 working days
Hacking + Malware + Quality Assurance (Paperback): Solis Tech Hacking + Malware + Quality Assurance (Paperback)
Solis Tech
R506 Discovery Miles 5 060 Ships in 10 - 15 working days
Malware & Raspberry Pi 2 (Paperback): Solis Tech Malware & Raspberry Pi 2 (Paperback)
Solis Tech
R712 Discovery Miles 7 120 Ships in 10 - 15 working days
Metasploit Bootcamp (Paperback): Nipun Jaswal Metasploit Bootcamp (Paperback)
Nipun Jaswal
R1,263 Discovery Miles 12 630 Ships in 10 - 15 working days

Master the art of penetration testing with Metasploit Framework in 7 days About This Book * A fast-paced guide that will quickly enhance your penetration testing skills in just 7 days * Carry out penetration testing in complex and highly-secured environments. * Learn techniques to Integrate Metasploit with industry's leading tools Who This Book Is For If you are a penetration tester, ethical hacker, or security consultant who quickly wants to master the Metasploit framework and carry out advanced penetration testing in highly secured environments then, this book is for you. What You Will Learn * Get hands-on knowledge of Metasploit * Perform penetration testing on services like Databases, VOIP and much more * Understand how to Customize Metasploit modules and modify existing exploits * Write simple yet powerful Metasploit automation scripts * Explore steps involved in post-exploitation on Android and mobile platforms. In Detail The book starts with a hands-on Day 1 chapter, covering the basics of the Metasploit framework and preparing the readers for a self-completion exercise at the end of every chapter. The Day 2 chapter dives deep into the use of scanning and fingerprinting services with Metasploit while helping the readers to modify existing modules according to their needs. Following on from the previous chapter, Day 3 will focus on exploiting various types of service and client-side exploitation while Day 4 will focus on post-exploitation, and writing quick scripts that helps with gathering the required information from the exploited systems. The Day 5 chapter presents the reader with the techniques involved in scanning and exploiting various services, such as databases, mobile devices, and VOIP. The Day 6 chapter prepares the reader to speed up and integrate Metasploit with leading industry tools for penetration testing. Finally, Day 7 brings in sophisticated attack vectors and challenges based on the user's preparation over the past six days and ends with a Metasploit challenge to solve. Style and approach This book is all about fast and intensive learning. That means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, show solving problems in newer and unseen ways, and solve real-world examples.

Hacking & Malware (Paperback): Solis Tech Hacking & Malware (Paperback)
Solis Tech
R730 Discovery Miles 7 300 Ships in 10 - 15 working days
Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples... Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples (Paperback)
Miles Price
R403 Discovery Miles 4 030 Ships in 10 - 15 working days
How to Investigate Like a Rockstar - Live a Real Crisis to Master the Secrets of Forensic Analysis (Paperback): Sparc Flow How to Investigate Like a Rockstar - Live a Real Crisis to Master the Secrets of Forensic Analysis (Paperback)
Sparc Flow
R439 Discovery Miles 4 390 Ships in 10 - 15 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover): Richard G Lowe Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Hardcover)
Richard G Lowe
R1,120 R917 Discovery Miles 9 170 Save R203 (18%) Ships in 10 - 15 working days
#Lazarus10 (Paperback): Andrew Rajan #Lazarus10 (Paperback)
Andrew Rajan
R400 Discovery Miles 4 000 Ships in 10 - 15 working days
Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,402 R1,316 Discovery Miles 13 160 Save R86 (6%) Ships in 12 - 17 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

How to Hack Like a God - Master the Secrets of Hacking Through Real Life Scenarios (Paperback): Sparc Flow How to Hack Like a God - Master the Secrets of Hacking Through Real Life Scenarios (Paperback)
Sparc Flow
R442 Discovery Miles 4 420 Ships in 10 - 15 working days
Malware - Black Book of the Israeli Mossad (Paperback): Noah Noah Malware - Black Book of the Israeli Mossad (Paperback)
Noah Noah
R831 Discovery Miles 8 310 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Open Source (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Open Source (Paperback)
Kenneth Fraser
R493 Discovery Miles 4 930 Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Raspberry Pi 2 (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Raspberry Pi 2 (Paperback)
Kenneth Fraser
R475 Discovery Miles 4 750 Ships in 10 - 15 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R838 Discovery Miles 8 380 Ships in 10 - 15 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R470 R408 Discovery Miles 4 080 Save R62 (13%) Ships in 10 - 15 working days
Robotics + Human-Computer Interaction + Malware (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Malware (Paperback)
Kenneth Fraser
R473 Discovery Miles 4 730 Ships in 10 - 15 working days
Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback): Eric Lawrence Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback)
Eric Lawrence
R683 Discovery Miles 6 830 Ships in 10 - 15 working days
Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback): John H Ferrari Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback)
John H Ferrari
R438 Discovery Miles 4 380 Ships in 10 - 15 working days
Circuit Engineering & Malware (Paperback): Solis Tech Circuit Engineering & Malware (Paperback)
Solis Tech
R502 Discovery Miles 5 020 Ships in 10 - 15 working days
You've Been Hacked - 15 Hackers You Hope Your Computer Never Meets (Paperback): William Webb You've Been Hacked - 15 Hackers You Hope Your Computer Never Meets (Paperback)
William Webb
R275 Discovery Miles 2 750 Ships in 10 - 15 working days

They were invisible. They unleashed some of the worse attacks on computers the world has ever known. And now they are exposed. This book profiles 15 of the most notorious hackers in the world.

Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,436 Discovery Miles 14 360 Ships in 10 - 15 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Hacking - Hacking Essentials, What You Must Know About Hacking (Paperback): Hacking Boy Hacking - Hacking Essentials, What You Must Know About Hacking (Paperback)
Hacking Boy
R178 Discovery Miles 1 780 Ships in 10 - 15 working days
The Giant Black Book (Paperback): American Eagle Books The Giant Black Book (Paperback)
American Eagle Books
R883 Discovery Miles 8 830 Ships in 10 - 15 working days
Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide... Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide (Paperback)
Walter Spivak
R250 Discovery Miles 2 500 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ransomware Protection Playbook
RA Grimes Paperback R523 Discovery Miles 5 230
Cult of the Dead Cow - How the Original…
Joseph Menn Paperback R502 R379 Discovery Miles 3 790
Sandworm - A New Era of Cyberwar and the…
Andy Greenberg Paperback R529 R399 Discovery Miles 3 990
Cyber Security: Essential Principles to…
IT Governance Paperback R371 Discovery Miles 3 710
Malicious Mobile Code - Virus Protection…
Roger A. Grimes Paperback R1,118 R815 Discovery Miles 8 150
Botnets
Heli Tiirmaa-Klaar, Jan Gassen, … Paperback R1,835 Discovery Miles 18 350
Securing Cloud Services - A Pragmatic…
IT Governance Paperback R1,240 Discovery Miles 12 400
The Cyber Security Handbook - Prepare…
IT Governance Paperback R1,393 Discovery Miles 13 930
How Cyber Security Can Protect Your…
IT Governance Paperback R370 Discovery Miles 3 700
The Art of Attack - Attacker Mindset for…
M Reynolds Paperback R543 Discovery Miles 5 430

 

Partners