0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (81)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Wireless Hacking With Kali Linux - Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and... Wireless Hacking With Kali Linux - Begin to Learn Fast How to Hack any Wireless Networks With this Penetration Test and Implementation Guide (2022 Crash Course for Beginners) (Paperback)
Eugene Delgado
R730 R639 Discovery Miles 6 390 Save R91 (12%) Ships in 18 - 22 working days
Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,132 R1,759 Discovery Miles 17 590 Save R373 (17%) Ships in 18 - 22 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback): Kim Zetter Countdown to Zero Day - Stuxnet and the Launch of the World's First Digital Weapon (Paperback)
Kim Zetter
R455 R420 Discovery Miles 4 200 Save R35 (8%) Ships in 5 - 10 working days
Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,028 Discovery Miles 30 280 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response... Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response (Paperback, 3rd Revised edition)
Gerard Johansen
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks. After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Integrate digital forensic techniques and procedures into the overall incident response process Understand different techniques for threat hunting Write incident reports that document the key findings of your analysis Apply incident response practices to ransomware attacks Leverage cyber threat intelligence to augment digital forensics findings Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. You'll also find the book helpful if you're new to the concept of digital forensics and looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,565 Discovery Miles 25 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R625 R552 Discovery Miles 5 520 Save R73 (12%) Ships in 9 - 17 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,059 Discovery Miles 10 590 Ships in 10 - 15 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R867 R746 Discovery Miles 7 460 Save R121 (14%) Ships in 18 - 22 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed): Roger A. Grimes Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed)
Roger A. Grimes
R1,049 R902 Discovery Miles 9 020 Save R147 (14%) Ships in 18 - 22 working days

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,099 R843 Discovery Miles 8 430 Save R256 (23%) Ships in 10 - 15 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

Cyber-Risk Management (Paperback, 1st ed. 2015): Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management (Paperback, 1st ed. 2015)
Atle Refsdal, Bjornar Solhaug, Ketil Stolen
R2,462 Discovery Miles 24 620 Ships in 18 - 22 working days

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback): Robert Karamagi EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback)
Robert Karamagi
R752 Discovery Miles 7 520 Ships in 18 - 22 working days
Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and... Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and applications (Paperback, 3rd Revised edition)
Jose Manuel Ortega
R1,123 Discovery Miles 11 230 Ships in 18 - 22 working days

Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application Key Features * Discover security techniques to protect your network and systems using Python 3.10 * Create scripts in Python to automate security and pentesting tasks * Analyze network traffic in a network and extract information using Python 3.10 Book Description Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture. The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts. The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks. By the end of this book, you will be able to make the most of Python to test the security of your network and applications. What you will learn * Create scripts in Python to automate security and pentesting tasks * Program your own tools in Python that can be used in a Network Security process * Automate tasks of analysis and extraction of information from servers * Detect Server Vulnerabilities and analyze security in web applications * Utilize the ssh-audit tool to check the security in SSH servers * Explore WriteHat as a pentesting reports tool written in Python * Automate the process of detecting vulnerabilities in applications with tools like Fuxploider Who This Book Is For This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite.

Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback): John... Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback)
John Paul Mueller, Anshul Bhatnagar, Sarthak Sarbahi
R1,062 Discovery Miles 10 620 Ships in 18 - 22 working days

Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning. As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references. The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively. What you will learn Explore methods to detect and prevent illegal access to your system Implement detection techniques when access does occur Employ machine learning techniques to determine motivations Mitigate hacker access once security is breached Perform statistical measurement and behavior analysis Repair damage to your data and applications Use ethical data collection methods to reduce security risks Who this book is forWhether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

Web Penetration Testing - Hack Your Way (Paperback): Shubham Mishra Web Penetration Testing - Hack Your Way (Paperback)
Shubham Mishra
R325 Discovery Miles 3 250 Ships in 18 - 22 working days
Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on... Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on your infrastructure (Paperback)
Marius Sandbu
R921 Discovery Miles 9 210 Ships in 18 - 22 working days

Protecting your end-users and IT infrastructure against the common ransomware attack vectors and efficiently monitoring future threats. Key Features * Learn to build security monitoring solutions based on Microsoft 365 and Sentinel * Understand how Zero-Trust access and SASE services can help in reducing and mitigating risks * Build a secure foundation for Windows Endpoints, email, infrastructure, and cloud services Book Description Looking for an effective way to secure your environment from ransomware attacks? Grab this book to learn how to monitor security threats, security monitoring, and how to establish countermeasures to protect against ransomware attacks. This book starts with understanding how ransomware attacks work, identifying different attack vectors, and how to build a secure network foundation and Windows environment. Then this book will guide you through ransomware countermeasures in different segments such as Identity Management Access, Networking, Endpoint Manager, Cloud, and Infrastructure by which you will learn how to protect against attacks. As you move forward, you will get your hands into forensics about important considerations if you got attacked or compromised with ransomware, what you should do, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes. By the end of this book, you will learn how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload. What you will learn * Understand how ransomware has evolved into the larger threat * Secure identity-based access using services like MFA * Enrich data with threat intelligence and other external data sources * Protect devices with Microsoft Defender and Network Protection * Learn how to secure users in Active Directory and Azure Active Directory * Secure your Windows Endpoints using Endpoint Manager * Design network architecture in Azure to reduce the risk of lateral movement Who This Book Is For This book is for Windows administrators, Cloud administrators, CISOs, and Blue Team members, who want to understand the ransomware problem, how attackers execute the intrusions, and how one can use the techniques to counteract the attacks. This book is also for Security administrators who want more insight into how they can secure their environment. Basic experience is needed across Windows and Cloud.

Deadly Odds 5.0 (Paperback): Allen Wyler Deadly Odds 5.0 (Paperback)
Allen Wyler
R497 Discovery Miles 4 970 Ships in 18 - 22 working days
Nan's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Nan's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Unhackable - Workbook (Paperback): George Mansour Unhackable - Workbook (Paperback)
George Mansour
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback): Glen Mitchell CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback)
Glen Mitchell
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback): Robert M Peterson Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback)
Robert M Peterson; Michael I. Kaplan
R1,382 Discovery Miles 13 820 Ships in 18 - 22 working days
Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third... Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third Edition (Paperback, 3rd ed.)
Dmitry Vostokov, Software Diagnostics Services
R2,263 Discovery Miles 22 630 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Securing Cloud Services - A Pragmatic…
IT Governance Paperback R1,386 Discovery Miles 13 860
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,092 R920 Discovery Miles 9 200
The Ransomware Threat Landscape…
IT Governance Paperback R626 Discovery Miles 6 260
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710
Computer Networking and Cybersecurity
Quinn Kiser Paperback R794 R698 Discovery Miles 6 980
Linux Command - A Comprehensive…
William Vance Hardcover R581 R536 Discovery Miles 5 360
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R667 R596 Discovery Miles 5 960
Unhackable - Your Online Security…
George Mansour Hardcover R623 Discovery Miles 6 230
Hacking - A Comprehensive Guide to…
Sam Griffin Hardcover R554 R509 Discovery Miles 5 090
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, … Paperback R1,110 Discovery Miles 11 100

 

Partners