0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (13)
  • R250 - R500 (86)
  • R500+ (140)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Hacking + Malware + Quality Assurance (Paperback): Solis Tech Hacking + Malware + Quality Assurance (Paperback)
Solis Tech
R488 Discovery Miles 4 880 Ships in 18 - 22 working days
Under Attack (Hardcover): The World's Leading Experts Under Attack (Hardcover)
The World's Leading Experts
R674 Discovery Miles 6 740 Ships in 18 - 22 working days
Malware & Open Source (Paperback): Solis Tech Malware & Open Source (Paperback)
Solis Tech
R240 Discovery Miles 2 400 Ships in 18 - 22 working days
Leading Issues in Cyber Warfare and Security (Paperback): Julie Ryan Leading Issues in Cyber Warfare and Security (Paperback)
Julie Ryan
R769 Discovery Miles 7 690 Ships in 18 - 22 working days
Windows Malware Analysis Essentials (Paperback): Victor Marak Windows Malware Analysis Essentials (Paperback)
Victor Marak
R1,299 Discovery Miles 12 990 Ships in 18 - 22 working days

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set About This Book * Set the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malware * Understand how to decipher x86 assembly code from source code inside your favourite development environment * A step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process Who This Book Is For This book is best for someone who has prior experience with reverse engineering Windows executables and wants to specialize in malware analysis. The book presents the malware analysis thought process using a show-and-tell approach, and the examples included will give any analyst confidence in how to approach this task on their own the next time around. What You Will Learn * Use the positional number system for clear conception of Boolean algebra, that applies to malware research purposes * Get introduced to static and dynamic analysis methodologies and build your own malware lab * Analyse destructive malware samples from the real world (ITW) from fingerprinting and static/dynamic analysis to the final debrief * Understand different modes of linking and how to compile your own libraries from assembly code and integrate the codein your final program * Get to know about the various emulators, debuggers and their features, and sandboxes and set them up effectively depending on the required scenario * Deal with other malware vectors such as pdf and MS-Office based malware as well as scripts and shellcode In Detail Windows OS is the most used operating system in the world and hence is targeted by malware writers. There are strong ramifications if things go awry. Things will go wrong if they can, and hence we see a salvo of attacks that have continued to disrupt the normal scheme of things in our day to day lives. This book will guide you on how to use essential tools such as debuggers, disassemblers, and sandboxes to dissect malware samples. It will expose your innards and then build a report of their indicators of compromise along with detection rule sets that will enable you to help contain the outbreak when faced with such a situation. We will start with the basics of computing fundamentals such as number systems and Boolean algebra. Further, you'll learn about x86 assembly programming and its integration with high level languages such as C++.You'll understand how to decipher disassembly code obtained from the compiled source code and map it back to its original design goals. By delving into end to end analysis with real-world malware samples to solidify your understanding, you'll sharpen your technique of handling destructive malware binaries and vector mechanisms. You will also be encouraged to consider analysis lab safety measures so that there is no infection in the process. Finally, we'll have a rounded tour of various emulations, sandboxing, and debugging options so that you know what is at your disposal when you need a specific kind of weapon in order to nullify the malware. Style and approach An easy to follow, hands-on guide with descriptions and screenshots that will help you execute effective malicious software investigations and conjure up solutions creatively and confidently.

Hacking & Malware (Paperback): Solis Tech Hacking & Malware (Paperback)
Solis Tech
R675 Discovery Miles 6 750 Ships in 18 - 22 working days
Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback): Ken Cureton, Steve Levinson Safe Computing is Like Safe Sex - You have to practice it to avoid infection (Paperback)
Ken Cureton, Steve Levinson; Richard Lowe
R391 Discovery Miles 3 910 Ships in 18 - 22 working days
Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition): Vincent Nestler, Keith Harrison, Matthew... Principles of Computer Security Lab Manual, Fourth Edition (Paperback, 4th edition)
Vincent Nestler, Keith Harrison, Matthew Hirsch, Wm. Arthur Conklin
R1,852 Discovery Miles 18 520 Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary Labs can be performed on a Windows, Linux, or Mac platform with the use of virtual machines In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response Instructor resources available: This lab manual supplements the textbook Principles of Computer Security, Fourth Edition, which is available separately Virtual machine files Solutions to the labs are not included in the book and are only available to adopting instructors

Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide... Hacking - Viruses and Malware, Hacking an Email Address and Facebook page, and more! Cyber Security Playground Guide (Paperback)
Walter Spivak
R240 Discovery Miles 2 400 Ships in 18 - 22 working days
Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback): Eric Lawrence Debugging with Fiddler - The complete reference from the creator of the Fiddler Web Debugger (Paperback)
Eric Lawrence
R629 Discovery Miles 6 290 Ships in 18 - 22 working days
The CEO's Manual on Cyber Security (Paperback): James Scott The CEO's Manual on Cyber Security (Paperback)
James Scott
R411 Discovery Miles 4 110 Ships in 18 - 22 working days

Since 2002, there has been an enormous increase in the number of known server vulnerabilities, leaving the traditional defensive solutions far behind. Today, attackers have improved on the sophistication used and the nature of the crime has changed. For example, web attacks between 2008 and 2010 caused 53 Seattle-based enterprises to face damages worth $3 million. Most such attacks are because of complacency and not remaining alert to the threat. The CEO's Manual on Cyber Security teaches you how to educate employees as well as develop a framework for security management against social engineering, keeping your corporation one step ahead of the attackers. It also details how enterprises can implement defenses against social engineering within their security policy. In this book you will learn how to avoid and prevent all of the following and more: Web Attacks Social Engineering Denial of Service caused by botnets Cloud Hacks Attacks via the Universal Serial Bus Clickjacking and cross-site scripting Phishing attacks from trusted third parties Data Exfiltration SSFR Attacks and CRIME (Compression Ratio Info-Leak Made Easy). Don't let your company fall victim to the thousands that will try to compromise its security and take it for all they can. Simply following the steps outlined in this book and being proactive can save you millions.

Implementing AppFog (Paperback): Matthew Nohr, Isaac Rabinovitch Implementing AppFog (Paperback)
Matthew Nohr, Isaac Rabinovitch
R776 Discovery Miles 7 760 Ships in 18 - 22 working days

This book is a practical, hands-on guide to implementing and deploying apps on the AppFog platform. Implementing AppFog is for developers who want to be able to upload applications to the cloud, and for implementation specialists, who implement and deploy apps on the AppFog platform. It is best to have Ruby installed, but we will walk you through the installation process if you do not already have it. It would be ideal to have some knowledge of cloud computing and know about the basics of database and network deployment.

Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback): Shawn Rohrbach Virtual Chaos - Our Vulnerability to Cyber-Crime and How to Prevent It (Paperback)
Shawn Rohrbach
R560 Discovery Miles 5 600 Ships in 18 - 22 working days

In Virtual Chaos... Shawn Rohrbach describes in concise, easy to understand language the risks we face every day using our computers for work, entertainment and communication. Instead of giving complex and intimidating remedies, Rohrbach provides real security solutions any computer user can implement. You will learn how to: Analyze your computer for viruses, malware and spyware Protect your children while they use the Internet Secure your home and small business wireless network Prevent cyber stalking and unwarranted intrusion into your personal life Ensure your on line business transactions and purchases are secure ...and more

Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed): Christopher Elisan Malware, Rootkits & Botnets A Beginner's Guide (Paperback, Ed)
Christopher Elisan
R1,167 R985 Discovery Miles 9 850 Save R182 (16%) Ships in 18 - 22 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Security Smarts for the Self-Guided IT Professional Learn how to improve the security posture of your organization and defend against some of the most pervasive network attacks. Malware, Rootkits & Botnets: A Beginner's Guide explains the nature, sophistication, and danger of these risks and offers best practicesfor thwarting them. After reviewing the current threat landscape, the book describes the entire threat lifecycle, explaining how cybercriminals create, deploy, and manage the malware, rootkits, and botnets under their control. You'll learn proven techniques for identifying and mitigating these malicious attacks. Templates, checklists, and examples give you the hands-on help you need to get startedprotecting your network right away. Malware, Rootkits & Botnets: A Beginner's Guidefeatures: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

21st Century Chinese Cyberwarfare (Hardcover): It Governance Publishing 21st Century Chinese Cyberwarfare (Hardcover)
It Governance Publishing
R1,610 Discovery Miles 16 100 Ships in 18 - 22 working days

Military doctrine of The People's Republic of China (PRC) envisages war being waged in five spheres: land, sea, air, outer space and cyberspace. The PRC believes that the early degradation, or destruction, of an enemy's command and control infrastructure will significantly improve its chances of ultimate victory. But the Chinese 21st century approach to cyberwarfare is both more sophisticated and comprehensive than that. This book examines the military background to today's doctrines, and explores how the teachings of Sun Tzu (The Art of War), the Thirty-Six Principles from the Warring States era and the hard-learnt lessons of Mao's Long March infuse and support the modern state's approach to engaging with enemies and rivals. Chinese cyberwarriors, operating from behind the Great Firewall of China, have substantial campaign experience, and this book reviews operations from Titan Rain - sustained multi-year cyberattacks against the US that started in 2003 - to the most recent, ShadyRAT. This book also reviews the contributions made to the overall Chinese cyberstrategy by civilian hackers and state-owned enterprises and looks at how Advanced Persistent Threats already undermine many of China's rival states and enterprises. China's rivals lack a coherent cyberstrategy of their own. They also do not understand the complex cultural, political and historical routes of the modern Chinese state and this is a significant weakness. This book helps everyone with an interest in cybersecurity to 'know their enemy'. William Hagestad II is an internationally-recognized expert on the Chinese People's Liberation Army & Government information warfare. He advises international intelligence organizations, military flag officers and multi-national commercial enterprises with regard to their internal IT security governance and external security policies. The linguistic, historical, cultural, economic and military aspects of Chinese cyberwarfare are his forte.

Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback): Marcos... Cyber Within - A Security Awareness Story and Guide for Employees (Cyber Crime & Fraud Prevention) (Paperback)
Marcos Christodonte II
R204 Discovery Miles 2 040 Ships in 18 - 22 working days

From the back cover: "Cyber Within is a stellar portrayal of why user education on Cyber Security threats, tactics, and techniques is so critical." --Robert Lentz, President, Cyber Security Strategies and former Deputy Assistant Secretary of Defense for Cyber, Identity and Information Assurance and Chief Information Officer, U.S. Dept of Defense "Lack of awareness is a grand security weakness. This book provides a unique approach to help fill the gaps and would be a great addition to anyone's information security toolbox." --Kevin Beaver, independent information security consultant with Principle Logic, LLC and author of Hacking For Dummies and Security On Wheels audio programs "This is one of the most fun information security books I've read...it combines a fun storyline with easy to digest tips on information security for employees and even contains 'tear-down' tip sheets " --Dr. Anton Chuvakin, author of PCI Compliance, chuvakin.org While companies spend millions on security products, attackers continue to steal their corporate secrets (and customer data) by exploiting the asset most often ignored on the security budget - people. Organizations that want to keep their trade secrets a secret must find better ways to help employees understand the importance of security. Packed with suspenseful lessons and quick tips for employees, Cyber Within helps organizations take that challenge head-on.

Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback): Robert T Mba Uda Cybercrime, Cyberterrorism, and Cyberwarfare (Paperback)
Robert T Mba Uda
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
Constraint-based Analysis of Security Properties (Paperback): Beata Sarna-Starosta Constraint-based Analysis of Security Properties (Paperback)
Beata Sarna-Starosta
R1,403 Discovery Miles 14 030 Ships in 18 - 22 working days
Hacking - 2 Libros En 1: La Guia Completa Para Principiantes De Aprendizaje De Hacking Etico Con Python Junto Con Ejemplos... Hacking - 2 Libros En 1: La Guia Completa Para Principiantes De Aprendizaje De Hacking Etico Con Python Junto Con Ejemplos Practicos & Guia Completa Del Principiante a la Pirateria Informatica y Pruebas De Penetracion (Spanish, Paperback)
Miles Price
R592 Discovery Miles 5 920 Ships in 18 - 22 working days
Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover): Victor... Information Security & Cybersecurity at the Federal Aviation Administration - Challenges & Control Efforts (Hardcover)
Victor Morris
R3,739 Discovery Miles 37 390 Ships in 10 - 15 working days

While the Federal Aviation Administration (FAA) has taken steps to protect its air traffic control systems from cyber-based and other threats, significant security control weaknesses remain, threatening the agency's ability to ensure the safe and uninterrupted operation of the national airspace system (NAS). These include weaknesses in controls intended to prevent, limit, and detect unauthorised access to computer resources, such as controls for protecting system boundaries, identifying and authenticating users, authorising users to access systems, encrypting sensitive data, and auditing and monitoring activity on FAA's systems. Additionally, shortcomings in boundary protection controls between less-secure systems and the operational NAS environment increase the risk from these weaknesses. The objective of this book is to evaluate the extent to which FAA has effectively implemented information security controls to protect its air traffic control systems. This book also identifies the cybersecurity challenges facing FAA as it shifts to the NextGen ATC system and how FAA has begun addressing those challenges; and assesses the extent to which FAA and its contractors, in the acquisition of NextGen programs, have followed federal guidelines for incorporating cybersecurity controls.

Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback): Lillian Ablon,... Zero Days, Thousands of Nights - The Life and Times of Zero-Day Vulnerabilities and Their Exploits (Paperback)
Lillian Ablon, Andy Bogart
R710 Discovery Miles 7 100 Ships in 9 - 17 working days
Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback): Stefan Beissel Security Awareness - Grundlagen, Massnahmen Und Programme Fur Die Informationssicherheit (German, Paperback)
Stefan Beissel
R1,139 R957 Discovery Miles 9 570 Save R182 (16%) Ships in 18 - 22 working days
?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback): Cory Silverberg ?Como se hace un bebe? - Spanish Language Edition (Spanish, Paperback)
Cory Silverberg; Illustrated by Fiona Smyth
R261 R240 Discovery Miles 2 400 Save R21 (8%) Ships in 18 - 22 working days
Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen... Hacking - 2 B cher in 1: Der Vollst ndige Anf ngerleitfaden Zum Erlernen Ethischen Hackens Mit Python Und Praktischen Beispielen & Der Anf nger Leitfaden F r Computer Hacking Und Penetration Testen (German, Paperback)
Miles Price
R593 Discovery Miles 5 930 Ships in 18 - 22 working days
Principi Della Sicurezza Informatica - Become an Ethical Hacker (Italian, Paperback): Giuseppe Compare Principi Della Sicurezza Informatica - Become an Ethical Hacker (Italian, Paperback)
Giuseppe Compare
R610 Discovery Miles 6 100 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Teacher-Pupil Conflict in Secondary…
Kate Cronk Paperback R735 Discovery Miles 7 350
Theories of School Psychology - Critical…
Kristy K. Kelly, S. Andrew Garbacz, … Paperback R1,255 Discovery Miles 12 550
Hybrid-Renewable Energy Systems in…
Hina Fathima, Prabaharan N, … Paperback R4,492 R4,170 Discovery Miles 41 700
Engendering Mayan History - Kaqchikel…
David Carey Jr Hardcover R4,485 Discovery Miles 44 850
High Temperature Superconductors (HTS…
Ziad Melhem Hardcover R4,493 Discovery Miles 44 930
Modern Batteries
C. Vincent, B. Scrosati Paperback R1,428 Discovery Miles 14 280
How to Thrive and Survive in Your…
Marjan Glavac, Paul Jackson Paperback R478 Discovery Miles 4 780
Understanding and Managing Children's…
Cath Hunter Paperback R1,154 Discovery Miles 11 540
Encouraging Children to Learn
Rudolf Dreikurs, Don Sr. Dinkmeyer Paperback R1,114 Discovery Miles 11 140
Bullying and Young Children…
Christine Macintyre Hardcover R5,472 Discovery Miles 54 720

 

Partners