0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (79)
  • R500+ (125)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback): John Sammons, Michael Cross The Basics of Cyber Safety - Computer and Mobile Device Safety Made Easy (Paperback)
John Sammons, Michael Cross
R759 Discovery Miles 7 590 Ships in 10 - 15 working days

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Hardcover, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Hardcover, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R4,188 Discovery Miles 41 880 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Hardcover)
Mohssen Mohammed, Al-Sakib Khan Pathan
R2,753 Discovery Miles 27 530 Ships in 10 - 15 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R885 Discovery Miles 8 850 Ships in 10 - 15 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Mr. Robot and Philosophy - Beyond Good and Evil Corp (Paperback): Richard Greene, Rachel Robison-Greene Mr. Robot and Philosophy - Beyond Good and Evil Corp (Paperback)
Richard Greene, Rachel Robison-Greene
R416 Discovery Miles 4 160 Ships in 10 - 15 working days

Mr. Robot has been hailed, not only as one of the most haunting and unnerving dramas ever to appear on television, but also as the first accurate popular presentation of how computer hacking and cyberterrorism actually work. Mr. Robot and Philosophy is aimed at thoughtful fans of this addictive show who will welcome the opportunity to explore Elliot Alderson's world from a philosophical perspective. The developing story of Mr. Robot constantly raises ethical and metaphysical issues. What happens to our personal identity when it's extended into cyberspace and an array of electronic devices? Are we in control of our online lives or are we being controlled? What does our right to privacy mean in a world where millions of people can observe what we're doing and saying? Is a virtual currency true money and could it replace traditional money? Can there be healthy forms of drug addiction? Can some types of so-called mental illness be useful and beneficial? Does it make any sense to unleash destruction upon the existing corporate economic structures, and can we expect something better to emerge from the ruins of a digital meltdown?

Dark Territory - The Secret History of Cyber War (Paperback): Fred Kaplan Dark Territory - The Secret History of Cyber War (Paperback)
Fred Kaplan
R454 R423 Discovery Miles 4 230 Save R31 (7%) Ships in 18 - 22 working days
Cybersecurity All-in-One For Dummies (Paperback): Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs Cybersecurity All-in-One For Dummies (Paperback)
Joseph Steinberg, Kevin Beaver, Ira Winkler, Ted Coombs
R899 R771 Discovery Miles 7 710 Save R128 (14%) Ships in 5 - 10 working days

Over 700 pages of insight into all things cybersecurity Cybersecurity All-in-One For Dummies covers a lot of ground in the world of keeping computer systems safe from those who want to break in. This book offers a one-stop resource on cybersecurity basics, personal security, business security, cloud security, security testing, and security awareness. Filled with content to help with both personal and business cybersecurity needs, this book shows you how to lock down your computers, devices, and systems--and explains why doing so is more important now than ever. Dig in for info on what kind of risks are out there, how to protect a variety of devices, strategies for testing your security, securing cloud data, and steps for creating an awareness program in an organization. Explore the basics of cybersecurity at home and in business Learn how to secure your devices, data, and cloud-based assets Test your security to find holes and vulnerabilities before hackers do Create a culture of cybersecurity throughout an entire organization This For Dummies All-in-One is a stellar reference for business owners and IT support pros who need a guide to making smart security choices. Any tech user with concerns about privacy and protection will also love this comprehensive guide.

Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en... Ciberseguridad - Una Simple Guia para Principiantes sobre Ciberseguridad, Redes Informaticas y Como Protegerse del Hacking en Forma de Phishing, Malware, Ransomware e Ingenieria Social (Spanish, Hardcover)
Quinn Kiser
R670 R599 Discovery Miles 5 990 Save R71 (11%) Ships in 18 - 22 working days
Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de... Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de las redes, proteccion contra el hackeo y las amenazas de ciberseguridad (Spanish, Hardcover)
Quinn Kiser
R761 R675 Discovery Miles 6 750 Save R86 (11%) Ships in 18 - 22 working days
Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R453 R338 Discovery Miles 3 380 Save R115 (25%) Ships in 10 - 15 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback): Kim Zetter Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback)
Kim Zetter
R466 R438 Discovery Miles 4 380 Save R28 (6%) Ships in 18 - 22 working days
Botnets (Paperback, 2013 ed.): Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini Botnets (Paperback, 2013 ed.)
Heli Tiirmaa-Klaar, Jan Gassen, Elmar Gerhards-Padilla, Peter Martini
R1,645 Discovery Miles 16 450 Ships in 18 - 22 working days

Malware poses one of the major threats to all currently operated computer systems. The scale of the problem becomes obvious by looking at the global economic loss caused by different kinds of malware, which is estimated to be more than US$ 10 billion every year. Botnets, a special kind of malware, are used to reap economic gains by criminals as well as for politically motivated activities. In contrast to other kinds of malware, botnets utilize a hidden communication channel to receive commands from their operator and communicate their current status. The ability to execute almost arbitrary commands on the infected machines makes botnets a general-purpose tool to perform malicious cyber-activities. Botnets provides a comprehensive analysis of the topic, and comprises both technical and non-technical sections written by leading cybersecurity experts. The non-technical section addresses how botnet infrastructure could be exploited for national security and cybercrime purposes. It approaches the subject as a public policy issue and analyzes the phenomenon of botnets from national security, law enforcement and regulatory policy perspectives, and makes recommendations for policy-makers on different public policies, highlighting the need for international response mechanisms. The technical section provides insight into current botnet techniques and discusses state-of-the-art countermeasures to combat the botnet threat in detail. It includes new detection methods as well as different approaches to actively compromise running botnets.

Android Malware (Paperback, 2013 ed.): Xuxian Jiang, Yajin Zhou Android Malware (Paperback, 2013 ed.)
Xuxian Jiang, Yajin Zhou
R1,508 Discovery Miles 15 080 Ships in 18 - 22 working days

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile malware raises substantial security and privacy concerns. Android Malware presents a systematic view on state-of-the-art mobile malware that targets the popular Android mobile platform. Covering key topics like the Android malware history, malware behavior and classification, as well as, possible defense techniques.

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback): Mohssen Mohammed, Al-Sakib Khan... Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks (Paperback)
Mohssen Mohammed, Al-Sakib Khan Pathan
R1,876 Discovery Miles 18 760 Ships in 10 - 15 working days

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methods such as manually creating and storing signatures to defend against these threats is just too slow. Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems. If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. There's also a chapter with references to helpful reading resources on automated signature generation systems. The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.

Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.): Mark Pearce Comprehensive VB .NET Debugging (Paperback, Softcover reprint of the original 1st ed.)
Mark Pearce
R1,288 R1,091 Discovery Miles 10 910 Save R197 (15%) Ships in 18 - 22 working days

Visual Studio .NET, and more specifically, Visual Basic .NET give developers more productivity and more power to develop applications, but at the cost of a complex development environment together with a whole new set of potential bugs. This text analyses the new defect types that arise with VB .NET, and investigates the debugging of every type of VB .NET application together with many common debugging scenarios. Mark Pearce also shows developers how to use the powerful new .NET debugging tools to find bugs wherever they hide, even deep inside distributed applications.

Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13,... Computer Safety, Reliability and Security - 21st International Conference, SAFECOMP 2002, Catania, Italy, September 10-13, 2002. Proceedings (Paperback, 2002 ed.)
Stuart Anderson, Sandro Bologna, Massimo Felici
R1,534 Discovery Miles 15 340 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 21st International Conference on Computer Safety, Reliability and Security, SAFECOMP 2002, held in Catania, Italy in September 2002.The 27 revised papers presented together with 3 keynote presentations were carefully reviewed and selected from 69 submissions. The papers are organized in topical sections on human-computer system dependability, human factors, security, dependability assessment, application of formal methods, reliability assessment, design for dependability, and safety assessment.

Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996):... Guide to Computer Viruses - How to avoid them, how to get rid of them, and how to get help (Mixed media product, 2nd ed. 1996)
Robert Slade
R2,460 Discovery Miles 24 600 Ships in 18 - 22 working days

This book gives a thorough explanation of what computer viruses are, how they work, and how much computer users should worry about them. It is written to apply to all systems: micro, network, and mainframe and for both professional managers of computing systems and users of personal computers of all types, PCs, Macintoshes, and others. Robert Slade presents details of many of the most virulent of the known viruses and of the damage that they have done, as well as providing quidelines and recommendations to protect systems from infection. In addition, the book provides the widest possible range of reviews of the major anti-virus software packages available as well as many of the books on viruses. Contact addresses, telephone numbers, and electronic mail addresses are also given. In the event of a suspected virus infection, this book is the one that users will reach for! Included with the book is a diskette containing both four antiviral pieces of software for the PC and Macintosh and the complete virus catalog as produced by the Virus Test Centre at the University of Hamburg.

The Art of Attack - Attacker Mindset for Security Professionals (Paperback): M Reynolds The Art of Attack - Attacker Mindset for Security Professionals (Paperback)
M Reynolds
R651 R571 Discovery Miles 5 710 Save R80 (12%) Ships in 9 - 17 working days

Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover: A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques The unique tells and signs of an attack and how to avoid becoming a victim of one What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.

A Pathology of Computer Viruses (Paperback, Edition. ed.): David Ferbrache A Pathology of Computer Viruses (Paperback, Edition. ed.)
David Ferbrache
R1,424 Discovery Miles 14 240 Ships in 18 - 22 working days

The 1980's saw the advent of widespread (and potentially damaging) computer virus infection of both personal computer and mainframe systems. The computer security field has been comparatively slow to react to this emerging situation. It is only over the last two years that a significant body of knowledge on the operation, likely evolution and prevention of computer viruses has developed. A Pathology of Computer Viruses gives a detailed overview of the history of the computer virus and an in-depth technical review of the principles of computer virus and worm operation under DOS, Mac, UNIX and DEC operating systems. David Ferbrache considers the possible extension of the threat to the mainframe systems environment and suggests how the threat can be effectively combatted using an antiviral management plan. The author addresses the latest developments in "stealth" virus operations, specifically the trend for virus authors to adopt extensive camouflage and concealment techniques, which allow viruses to evade both existing anti-viral software and to avoid detection by direct observation of machine behaviour. A Pathology of Computer Viruses addresses a distinct need - that of the computer specialist and professional who needs a source reference work detailing all aspects of the computer virus threat.

Application Security Program Handbook (Paperback): Derek Fisher Application Security Program Handbook (Paperback)
Derek Fisher
R1,359 Discovery Miles 13 590 Ships in 10 - 15 working days

Stop dangerous threats and secure your vulnerabilities without slowing down delivery. This practical book is a one-stop guide to implementing a robust application security program.Application Security Program Handbook teaches you to implement a robust program of security throughout your development process. It goes well beyond the basics, detailing a flexible approach that can adapt and evolve to new and emerging threats. Follow the expert advice in this guide and you'll reliably deliver software that is free from security defects and critical vulnerabilities. As a developer, you must build security into your software throughout its development lifecycle. This book addresses all the practices, tools, technology, people, and processes you need to reduce the risk of attacks and vulnerabilities in your software. Application Security Program Handbook is full of strategies for setting up and maturing a security program for your development process. Its realistic recommendations take a service-oriented approach to application security that's perfectly suited to the fast-pace of modern development. Focused on the realities of software development, it shows you how to avoid making security a gated exercise. Inside, you'll learn to assess the current state of your app's security, identify key risks to your organization, and measure the success of any defensive programs you deploy. You'll master common methodologies and practices that help safeguard your software, along with defensive tools you can use to keep your apps safe. With this handy reference guide by your side, you'll be able to implement reliable security in a way that doesn't impact your delivery speed. RETAIL SELLING POINTS Application security tools you can use throughout the development lifecycle Creating threat models Mitigating web app vulnerabilities Creating a DevSecOps pipeline Application security as a service model Reporting structures that highlight the value of application security Creating a software security ecosystem that benefits development AUDIENCE For software developers, architects, team leaders, and project managers looking to implement security in their pipelines.

Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,132 R1,759 Discovery Miles 17 590 Save R373 (17%) Ships in 18 - 22 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Securing the Internet of Things (Paperback): Shancang Li, Li Da Xu Securing the Internet of Things (Paperback)
Shancang Li, Li Da Xu
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R867 R746 Discovery Miles 7 460 Save R121 (14%) Ships in 18 - 22 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed): Roger A. Grimes Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed)
Roger A. Grimes
R1,049 R902 Discovery Miles 9 020 Save R147 (14%) Ships in 18 - 22 working days

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback): Andy Greenberg Sandworm - A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers (Paperback)
Andy Greenberg
R452 R421 Discovery Miles 4 210 Save R31 (7%) Ships in 18 - 22 working days

From Wired senior writer Andy Greenberg comes the true story of the most devastating cyberattack in history and the desperate hunt to identify and track the elite Russian agents behind it.

"Much more than a true-life techno-thriller ... a tour through a realm that is both invisible and critical to the daily lives of every person alive in the 21st century." —Los Angeles Times

In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen.

The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.

A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spinoza's Dream - On Nature and Meaning
David Weissman Hardcover R3,279 Discovery Miles 32 790
The Right to Sex - Feminism in the…
Amia Srinivasan Paperback R430 R401 Discovery Miles 4 010
Hegel's Value
Dean Moyar Hardcover R2,127 Discovery Miles 21 270
From Enlightenment to Receptivity…
Michael Slote Hardcover R1,887 Discovery Miles 18 870
Murder in our Midst - Comparing Crime…
Romayne Smith Fullerton, Maggie Jones Patterson Hardcover R2,442 Discovery Miles 24 420
Our Faithfulness to the Past - The…
Sue Campbell Hardcover R3,835 Discovery Miles 38 350
How Physics Makes Us Free
J. T. Ismael Hardcover R1,192 Discovery Miles 11 920
Playing Politics with Science…
David B Resnik Hardcover R1,996 Discovery Miles 19 960
Shared Agency - A Planning Theory of…
Michael E. Bratman Hardcover R3,834 Discovery Miles 38 340
From Bondage to Freedom - Spinoza on…
Michael Lebuffe Hardcover R2,805 Discovery Miles 28 050

 

Partners