0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (9)
  • R250 - R500 (85)
  • R500+ (144)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Malware & Raspberry Pi 2 (Paperback): Solis Tech Malware & Raspberry Pi 2 (Paperback)
Solis Tech
R742 Discovery Miles 7 420 Ships in 10 - 15 working days
Malware - Malware Detection & Threats Made Easy! (Paperback): Solis Tech Malware - Malware Detection & Threats Made Easy! (Paperback)
Solis Tech
R511 Discovery Miles 5 110 Ships in 10 - 15 working days
Hacking & Malware (Paperback): Solis Tech Hacking & Malware (Paperback)
Solis Tech
R759 Discovery Miles 7 590 Ships in 10 - 15 working days
Under Attack (Hardcover): The World's Leading Experts Under Attack (Hardcover)
The World's Leading Experts
R759 Discovery Miles 7 590 Ships in 10 - 15 working days
Hacking + Malware + Comptia A+ (Paperback): Solis Tech Hacking + Malware + Comptia A+ (Paperback)
Solis Tech
R548 Discovery Miles 5 480 Ships in 10 - 15 working days
Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback): John H Ferrari Cyber Attacks - How to Protect Yourself NOW in Cyber Warfare (Paperback)
John H Ferrari
R278 Discovery Miles 2 780 Ships in 10 - 15 working days
Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide... Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide (Paperback)
Walter Spivak
R274 Discovery Miles 2 740 Ships in 10 - 15 working days
Implementing AppFog (Paperback): Matthew Nohr, Isaac Rabinovitch Implementing AppFog (Paperback)
Matthew Nohr, Isaac Rabinovitch
R876 Discovery Miles 8 760 Ships in 10 - 15 working days

This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform. Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the installation process if you do not already have it. It would be ideal to have some knowledge of cloud computing and know about the basics of database and network deployment.

Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R2,105 Discovery Miles 21 050 Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

The CEO's Manual on Cyber Security (Paperback): James Scott The CEO's Manual on Cyber Security (Paperback)
James Scott
R469 Discovery Miles 4 690 Ships in 10 - 15 working days

Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social engineering, keeping your corporation one step ahead of the attackers. It also details how enterprises can implement defenses against social engineering within their security policy. In this book you will learn how to avoid and prevent all of the following and more: Web Attacks Social Engineering Denial of Service caused by botnets Cloud Hacks Attacks via the Universal Serial Bus Clickjacking and cross-site scripting Phishing attacks from trusted third parties Data Exfiltration SSFR Attacks and CRIME (Compression Ratio Info-Leak Made Easy). Don't let your company fall victim to the thousands that will try to compromise its security and take it for all they can. Simply following the steps outlined in this book and being proactive can save you millions.

Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed): Christopher Elisan Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed)
Christopher Elisan
R1,334 R1,115 Discovery Miles 11 150 Save R219 (16%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback): Shawn Rohrbach Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback)
Shawn Rohrbach
R628 Discovery Miles 6 280 Ships in 10 - 15 working days

In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement. You will learn how to: Analyze your computer for viruses, malware and spyware Protect your children while they use the Internet Secure your home and small business wireless network Prevent cyber stalking and unwarranted intrusion into your personal life Ensure your on line business transactions and purchases are secure ...and more

Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback): Robert T Mba Uda Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback)
Robert T Mba Uda
R596 Discovery Miles 5 960 Ships in 10 - 15 working days
Stuxnet Computer Worm & Industrial Control System Security (Hardcover): Jackson C. Rebane Stuxnet Computer Worm & Industrial Control System Security (Hardcover)
Jackson C. Rebane
R4,216 Discovery Miles 42 160 Ships in 12 - 17 working days

In September 2010, media reports emerged about a new form of cyber attack that appeared to target Iran, although the actual target, if any, is unknown. Through the use of thumb drives in computers that were not connected to the Internet, a malicious software program known as Stuxnet infected computer systems that were used to control the functioning of a nuclear power plant. Once inside the system, Stuxnet had the ability to degrade or destroy the software on which it operated. This book examines the discovery of the Stuxnet worm which has raised several issues for Congress, including the effect on national security, what the government's response should be, whether an international treaty to curb the use of malicious software is necessary, and how such a treaty could be implemented.

Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback): Marcos... Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback)
Marcos Christodonte II
R233 Discovery Miles 2 330 Ships in 10 - 15 working days

From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with Principle Logic, LLC and author of Hacking For Dummies and Security On Wheels audio programs "This is one of the most fun information security books I've read...it combines a fun storyline with easy to digest tips on information security for employees and even contains 'tear-down' tip sheets " --Dr. Anton Chuvakin, author of PCI Compliance, chuvakin.org While companies spend millions on security products, attackers continue to steal their corporate secrets (and customer data) by exploiting the asset most often ignored on the security budget - people. Organizations that want to keep their trade secrets a secret must find better ways to help employees understand the importance of security. Packed with suspenseful lessons and quick tips for employees, Cyber Within helps organizations take that challenge head-on.

Constraint-based Analysis of Security Properties (Paperback): Beata Sarna-Starosta Constraint-based Analysis of Security Properties (Paperback)
Beata Sarna-Starosta
R1,592 Discovery Miles 15 920 Ships in 10 - 15 working days
Malware Forensics - Investigating and Analyzing Malicious Code (Paperback): Cameron H. Malin, Eoghan Casey, James M. Aquilina Malware Forensics - Investigating and Analyzing Malicious Code (Paperback)
Cameron H. Malin, Eoghan Casey, James M. Aquilina
R2,507 Discovery Miles 25 070 Ships in 10 - 15 working days

"Malware Forensics: Investigating and Analyzing Malicious Code" covers the emerging and evolving field of "live forensics," where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss "live forensics" on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised system.
"Malware Forensics: Investigating and Analyzing Malicious Code" also devotes extensive coverage of the burgeoning forensic field of physical and process memory analysis on both Windows and Linux platforms. This book provides clear and concise guidance as to how to forensically capture and examine physical and process memory as a key investigative step in malicious code forensics.
Prior to this book, competing texts have described malicious code, accounted for its evolutionary history, and in some instances, dedicated a mere chapter or two to analyzing malicious code. Conversely, "Malware Forensics: Investigating and Analyzing Malicious Code" emphasizes the practical "how-to" aspect of malicious code investigation, giving deep coverage on the tools and techniques of conducting runtime behavioral malware analysis (such as file, registry, network and port monitoring) and static code analysis (such as file identification and profiling, strings discovery, armoring/packing detection, disassembling, debugging), and more.
* Winner of Best Book Bejtlich read in 2008
* http: //taosecurity.blogspot.com/2008/12/best-book-bejtlich-read-in-2008.html
* Authors have investigated and prosecuted federal malware cases, which allows them to provide unparalleled insight to the reader.
* First book to detail how to perform "live forensic" techniques on malicous code.
* In addition to the technical topics discussed, this book also offers critical legal considerations addressing the legal ramifications and requirements governing the subject matter

Surviving a Virus Plague (Paperback): The World War Museum Surviving a Virus Plague (Paperback)
The World War Museum
R876 R749 Discovery Miles 7 490 Save R127 (14%) Ships in 10 - 15 working days
Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R491 R378 Discovery Miles 3 780 Save R113 (23%) Ships in 12 - 17 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback): Stefan Beissel Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback)
Stefan Beissel
R1,301 R1,082 Discovery Miles 10 820 Save R219 (17%) Ships in 10 - 15 working days
Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R666 Discovery Miles 6 660 Ships in 10 - 15 working days
Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de... Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de las redes, proteccion contra el hackeo y las amenazas de ciberseguridad (Spanish, Paperback)
Quinn Kiser
R480 Discovery Miles 4 800 Ships in 10 - 15 working days
Principi Della Sicurezza Informatica - Become an Ethical Hacker (Italian, Paperback): Giuseppe Compare Principi Della Sicurezza Informatica - Become an Ethical Hacker (Italian, Paperback)
Giuseppe Compare
R685 Discovery Miles 6 850 Ships in 10 - 15 working days
Hacking - Der Anfanger Leitfaden fur Computer Hacking und Penetration Testen (German, Paperback): Miles Price Hacking - Der Anfanger Leitfaden fur Computer Hacking und Penetration Testen (German, Paperback)
Miles Price
R450 Discovery Miles 4 500 Ships in 10 - 15 working days
Comando de Linux - Una guia completa para principiantes para aprender los reinos del comando Linux desde A-Z (Spanish,... Comando de Linux - Una guia completa para principiantes para aprender los reinos del comando Linux desde A-Z (Spanish, Paperback)
William Vance
R520 R485 Discovery Miles 4 850 Save R35 (7%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Pucking Sweet
Emily Rath Paperback R275 R228 Discovery Miles 2 280
Fake
Tate James Paperback  (1)
R446 R289 Discovery Miles 2 890
Sabrina September Is A Liar
Nikki Lincoln Paperback R604 Discovery Miles 6 040
Two Risky To Love
Lisa Jane Lordan Paperback R453 Discovery Miles 4 530
Terms And Conditions - Dreamland…
Lauren Asher Paperback  (2)
R295 R264 Discovery Miles 2 640
Training The Heart - Silver Pines Ranch…
Paisley Hope Paperback R275 R229 Discovery Miles 2 290
Redeemed
Lauren Asher Paperback R295 R264 Discovery Miles 2 640
Brutal Vows - Queens And Monsters: Book…
J T Geissinger Paperback R470 R426 Discovery Miles 4 260
Keep Me In Your Heart
Monica Murphy Paperback R275 R217 Discovery Miles 2 170
A Year in the Life of Peter Short
C. J. Martin Paperback R365 Discovery Miles 3 650

 

Partners