0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (11)
  • R250 - R500 (79)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,028 Discovery Miles 30 280 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,199 Discovery Miles 11 990 Ships in 10 - 15 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,565 Discovery Miles 25 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R625 R552 Discovery Miles 5 520 Save R73 (12%) Ships in 9 - 17 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

Robotics + Human-Computer Interaction + Malware (Paperback): Kenneth Fraser Robotics + Human-Computer Interaction + Malware (Paperback)
Kenneth Fraser
R458 Discovery Miles 4 580 Ships in 18 - 22 working days
Malware - Malware Detection & Threats Made Easy! (Paperback): Solis Tech Malware - Malware Detection & Threats Made Easy! (Paperback)
Solis Tech
R453 Discovery Miles 4 530 Ships in 18 - 22 working days
Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R887 Discovery Miles 8 870 Ships in 9 - 17 working days
The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,099 R830 Discovery Miles 8 300 Save R269 (24%) Ships in 10 - 15 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

Cyber-Risk Management (Paperback, 1st ed. 2015): Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management (Paperback, 1st ed. 2015)
Atle Refsdal, Bjornar Solhaug, Ketil Stolen
R2,462 Discovery Miles 24 620 Ships in 18 - 22 working days

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback): Robert Karamagi EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback)
Robert Karamagi
R752 Discovery Miles 7 520 Ships in 18 - 22 working days
Web Penetration Testing - Hack Your Way (Paperback): Shubham Mishra Web Penetration Testing - Hack Your Way (Paperback)
Shubham Mishra
R325 Discovery Miles 3 250 Ships in 18 - 22 working days
Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and... Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and applications (Paperback, 3rd Revised edition)
Jose Manuel Ortega
R1,163 Discovery Miles 11 630 Ships in 18 - 22 working days

Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application Key Features * Discover security techniques to protect your network and systems using Python 3.10 * Create scripts in Python to automate security and pentesting tasks * Analyze network traffic in a network and extract information using Python 3.10 Book Description Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture. The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts. The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks. By the end of this book, you will be able to make the most of Python to test the security of your network and applications. What you will learn * Create scripts in Python to automate security and pentesting tasks * Program your own tools in Python that can be used in a Network Security process * Automate tasks of analysis and extraction of information from servers * Detect Server Vulnerabilities and analyze security in web applications * Utilize the ssh-audit tool to check the security in SSH servers * Explore WriteHat as a pentesting reports tool written in Python * Automate the process of detecting vulnerabilities in applications with tools like Fuxploider Who This Book Is For This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite.

Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Deadly Odds 5.0 (Paperback): Allen Wyler Deadly Odds 5.0 (Paperback)
Allen Wyler
R497 Discovery Miles 4 970 Ships in 18 - 22 working days
Nan's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Nan's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Unhackable - Workbook (Paperback): George Mansour Unhackable - Workbook (Paperback)
George Mansour
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback): Glen Mitchell CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback)
Glen Mitchell
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback): Robert M Peterson Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback)
Robert M Peterson; Michael I. Kaplan
R1,382 Discovery Miles 13 820 Ships in 18 - 22 working days
Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third... Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third Edition (Paperback, 3rd ed.)
Dmitry Vostokov, Software Diagnostics Services
R2,263 Discovery Miles 22 630 Ships in 18 - 22 working days
Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on... Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on your infrastructure (Paperback)
Marius Sandbu
R962 Discovery Miles 9 620 Ships in 18 - 22 working days

Protecting your end-users and IT infrastructure against the common ransomware attack vectors and efficiently monitoring future threats. Key Features * Learn to build security monitoring solutions based on Microsoft 365 and Sentinel * Understand how Zero-Trust access and SASE services can help in reducing and mitigating risks * Build a secure foundation for Windows Endpoints, email, infrastructure, and cloud services Book Description Looking for an effective way to secure your environment from ransomware attacks? Grab this book to learn how to monitor security threats, security monitoring, and how to establish countermeasures to protect against ransomware attacks. This book starts with understanding how ransomware attacks work, identifying different attack vectors, and how to build a secure network foundation and Windows environment. Then this book will guide you through ransomware countermeasures in different segments such as Identity Management Access, Networking, Endpoint Manager, Cloud, and Infrastructure by which you will learn how to protect against attacks. As you move forward, you will get your hands into forensics about important considerations if you got attacked or compromised with ransomware, what you should do, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes. By the end of this book, you will learn how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload. What you will learn * Understand how ransomware has evolved into the larger threat * Secure identity-based access using services like MFA * Enrich data with threat intelligence and other external data sources * Protect devices with Microsoft Defender and Network Protection * Learn how to secure users in Active Directory and Azure Active Directory * Secure your Windows Endpoints using Endpoint Manager * Design network architecture in Azure to reduce the risk of lateral movement Who This Book Is For This book is for Windows administrators, Cloud administrators, CISOs, and Blue Team members, who want to understand the ransomware problem, how attackers execute the intrusions, and how one can use the techniques to counteract the attacks. This book is also for Security administrators who want more insight into how they can secure their environment. Basic experience is needed across Windows and Cloud.

Mum's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Mum's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large... Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large type / large print edition)
Hope Oje
R616 R570 Discovery Miles 5 700 Save R46 (7%) Ships in 18 - 22 working days
Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response... Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response (Paperback, 3rd Revised edition)
Gerard Johansen
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks. After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Integrate digital forensic techniques and procedures into the overall incident response process Understand different techniques for threat hunting Write incident reports that document the key findings of your analysis Apply incident response practices to ransomware attacks Leverage cyber threat intelligence to augment digital forensics findings Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. You'll also find the book helpful if you're new to the concept of digital forensics and looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Memory Dump Analysis Anthology, Volume 5, Revised Edition (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 5, Revised Edition (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R990 Discovery Miles 9 900 Ships in 18 - 22 working days
Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback): John... Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback)
John Paul Mueller, Anshul Bhatnagar, Sarthak Sarbahi
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning. As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references. The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively. What you will learn Explore methods to detect and prevent illegal access to your system Implement detection techniques when access does occur Employ machine learning techniques to determine motivations Mitigate hacker access once security is breached Perform statistical measurement and behavior analysis Repair damage to your data and applications Use ethical data collection methods to reduce security risks Who this book is forWhether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Basics of Cyber Safety - Computer…
John Sammons, Michael Cross Paperback R759 Discovery Miles 7 590
GRU Cybervillains - The DOJ Indictment…
Department of Justice Hardcover R563 Discovery Miles 5 630
Cyber Security: Essential Principles to…
IT Governance Paperback R445 Discovery Miles 4 450
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710
Computer Networking and Cybersecurity
Quinn Kiser Paperback R794 R698 Discovery Miles 6 980
Linux Command - A Comprehensive…
William Vance Hardcover R581 R536 Discovery Miles 5 360
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R667 R596 Discovery Miles 5 960
Computer Programming for Beginners and…
Alan Grid Hardcover R1,112 R956 Discovery Miles 9 560
Malware Forensics - Investigating and…
Cameron H. Malin, Eoghan Casey, … Paperback R1,539 Discovery Miles 15 390
Unhackable - Your Online Security…
George Mansour Hardcover R623 Discovery Miles 6 230

 

Partners