0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (79)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de... Redes de ordenadores y ciberseguridad - Una guia sobre los sistemas de comunicacion, las conexiones a Internet, la seguridad de las redes, proteccion contra el hackeo y las amenazas de ciberseguridad (Spanish, Paperback)
Quinn Kiser
R420 Discovery Miles 4 200 Ships in 18 - 22 working days
Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st... Malware Analysis and Detection Engineering - A Comprehensive Approach to Detect and Analyze Modern Malware (Paperback, 1st ed.)
Abhijit Mohanta, Anoop Saldanha
R2,132 R1,759 Discovery Miles 17 590 Save R373 (17%) Ships in 18 - 22 working days

Discover how the internals of malware work and how you can analyze and detect it. You will learn not only how to analyze and reverse malware, but also how to classify and categorize it, giving you insight into the intent of the malware. Malware Analysis and Detection Engineering is a one-stop guide to malware analysis that simplifies the topic by teaching you undocumented tricks used by analysts in the industry. You will be able to extend your expertise to analyze and reverse the challenges that malicious software throws at you. The book starts with an introduction to malware analysis and reverse engineering to provide insight on the different types of malware and also the terminology used in the anti-malware industry. You will know how to set up an isolated lab environment to safely execute and analyze malware. You will learn about malware packing, code injection, and process hollowing plus how to analyze, reverse, classify, and categorize malware using static and dynamic tools. You will be able to automate your malware analysis process by exploring detection tools to modify and trace malware programs, including sandboxes, IDS/IPS, anti-virus, and Windows binary instrumentation. The book provides comprehensive content in combination with hands-on exercises to help you dig into the details of malware dissection, giving you the confidence to tackle malware that enters your environment. What You Will Learn Analyze, dissect, reverse engineer, and classify malware Effectively handle malware with custom packers and compilers Unpack complex malware to locate vital malware components and decipher their intent Use various static and dynamic malware analysis tools Leverage the internals of various detection engineering tools to improve your workflow Write Snort rules and learn to use them with Suricata IDS Who This Book Is For Security professionals, malware analysts, SOC analysts, incident responders, detection engineers, reverse engineers, and network security engineers "This book is a beast! If you're looking to master the ever-widening field of malware analysis, look no further. This is the definitive guide for you." Pedram Amini, CTO Inquest; Founder OpenRCE.org and ZeroDayInitiative

The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback): Ken May The Art of Hacking - Ancient Wisdom for Cybersecurity Defense (Paperback)
Ken May
R455 R425 Discovery Miles 4 250 Save R30 (7%) Ships in 18 - 22 working days
Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020): Anatoly Belous, Vitali Saladukha Viruses, Hardware and Software Trojans - Attacks and Countermeasures (Paperback, 1st ed. 2020)
Anatoly Belous, Vitali Saladukha
R3,028 Discovery Miles 30 280 Ships in 18 - 22 working days

This book provides readers with a valuable reference on cyber weapons and, in particular, viruses, software and hardware Trojans. The authors discuss in detail the most dangerous computer viruses, software Trojans and spyware, models of computer Trojans affecting computers, methods of implementation and mechanisms of their interaction with an attacker - a hacker, an intruder or an intelligence agent. Coverage includes Trojans in electronic equipment such as telecommunication systems, computers, mobile communication systems, cars and even consumer electronics. The evolutionary path of development of hardware Trojans from "cabinets", "crates" and "boxes" to the microcircuits (IC) is also discussed. Readers will benefit from the detailed review of the major known types of hardware Trojans in chips, principles of their design, mechanisms of their functioning, methods of their introduction, means of camouflaging and detecting, as well as methods of protection and counteraction.

Cyberdefense - Domain Name Systems as the Next Public Utility (Paperback): Craig Mackinder Cyberdefense - Domain Name Systems as the Next Public Utility (Paperback)
Craig Mackinder; Edited by Michael Carroll; Designed by Crack
R388 R364 Discovery Miles 3 640 Save R24 (6%) Ships in 18 - 22 working days
Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian,... Detection of Intrusions and Malware, and Vulnerability Assessment - 13th International Conference, DIMVA 2016, San Sebastian, Spain, July 7-8, 2016, Proceedings (Paperback, 1st ed. 2016)
Juan Caballero, Urko Zurutuza, Ricardo J. Rodriguez
R2,565 Discovery Miles 25 650 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastian, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration... Kali Linux Hacking - A Complete Step by Step Guide to Learn the Fundamentals of Cyber Security, Hacking, and Penetration Testing. Includes Valuable Basic Networking Concepts. (Paperback)
Ethem Mining
R476 Discovery Miles 4 760 Ships in 18 - 22 working days
Internet Security - A Hands-on Approach (Paperback, 2nd ed.): Wenliang Du Internet Security - A Hands-on Approach (Paperback, 2nd ed.)
Wenliang Du
R1,146 Discovery Miles 11 460 Ships in 18 - 22 working days
Ransomware Protection Playbook (Paperback): RA Grimes Ransomware Protection Playbook (Paperback)
RA Grimes
R625 R552 Discovery Miles 5 520 Save R73 (12%) Ships in 9 - 17 working days

Avoid becoming the next ransomware victim by taking practical steps today Colonial Pipeline. CWT Global. Brenntag. Travelex. The list of ransomware victims is long, distinguished, and sophisticated. And it's growing longer every day. In Ransomware Protection Playbook, computer security veteran and expert penetration tester Roger A. Grimes delivers an actionable blueprint for organizations seeking a robust defense against one of the most insidious and destructive IT threats currently in the wild. You'll learn about concrete steps you can take now to protect yourself or your organization from ransomware attacks. In addition to walking you through the necessary technical preventative measures, this critical book will show you how to: Quickly detect an attack, limit the damage, and decide whether to pay the ransom Implement a pre-set game plan in the event of a game-changing security breach to help limit the reputational and financial damage Lay down a secure foundation of cybersecurity insurance and legal protection to mitigate the disruption to your life and business A must-read for cyber and information security professionals, privacy leaders, risk managers, and CTOs, Ransomware Protection Playbook is an irreplaceable and timely resource for anyone concerned about the security of their, or their organization's, data.

Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples... Hacking with Python - The Complete Beginner's Guide to Learning Ethical Hacking with Python Along with Practical Examples (Paperback)
Miles Price
R390 Discovery Miles 3 900 Ships in 18 - 22 working days
Secret Key Cryptography (Paperback): Frank Rubin Secret Key Cryptography (Paperback)
Frank Rubin
R1,059 Discovery Miles 10 590 Ships in 10 - 15 working days

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes-including 30 unbreakable methods. In Secret Key Cryptography: Ciphers, from simple to unbreakable you will: Measure the strength of your ciphers and learn how to guarantee their security Construct and incorporate data-compression codes Generate true random numbers in bulk Construct huge primes and safe primes Add an undetectable backdoor to a cipher Defeat hypothetical ultracomputers that could be developed decades from now Construct 30 unbreakable ciphers Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book's simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You'll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you'll explore both historic ciphers and groundbreaking new approaches-including a never-before-seen way to implement the uncrackable One-Time Pad algorithm. about the technology Secret Key cryptography is the backbone of all modern computing infrastructure. Secret Key ciphers use the same key to encrypt and decrypt messages. Properly designed, these algorithms are efficient and practical. Some Secret Key approaches are uncrackable, even under attacks backed by supercomputers or quantum technology! about the book Secret Key Cryptography teaches anyone how to create a wide range of ciphers-even if you have no background in math or creating codes. You'll combine Secret Key techniques to achieve ciphers that are effectively uncrackable and avoid common pitfalls that result in strong-looking but weak ciphers. The book reveals scores of different cipher methods, including both historic examples and current innovations in the field. RETAIL SELLING POINTS * Measure the strength of your ciphers and learn how to guarantee their security * Construct and incorporate data-compression codes * Generate true random numbers in bulk * Construct huge primes and safe primes * Add an undetectable backdoor to a cipher * Defeat hypothetical ultra computers that could be developed decades from now * Construct 30 unbreakable ciphers AUDIENCE For professional engineers, computer scientists, and cryptography hobbyists. No advanced math knowledge is required

Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R887 Discovery Miles 8 870 Ships in 9 - 17 working days
Ransomware (Paperback): Allan Liska, Timothy Gallo Ransomware (Paperback)
Allan Liska, Timothy Gallo
R867 R746 Discovery Miles 7 460 Save R121 (14%) Ships in 18 - 22 working days

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you'll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network. Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they're delivered to targets. You'll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place. Learn how ransomware enters your system and encrypts your files Understand why ransomware use has grown, especially in recent years Examine the organizations behind ransomware and the victims they target Learn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaigns Understand how ransom is paid-and the pros and cons of paying Use methods to protect your organization's workstations and servers

Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed): Roger A. Grimes Malicious Mobile Code - Virus Protection for Windows (Paperback, 1st ed)
Roger A. Grimes
R1,049 R902 Discovery Miles 9 020 Save R147 (14%) Ships in 18 - 22 working days

"Malicious mobile code" is a new term to describe all sorts of destructive programs: viruses, worms, trojans, and rogue Internet content. Malicious mobile code is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. Malicious Mobile Code reveals what such code can and can't do and how to recognize, remove, and prevent it. Readers learn effective strategies, tips, and tricks for securing any system.

The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback): Patrick Wardle The Art Of Mac Malware - The Guide to Analyzing Malicious Software (Paperback)
Patrick Wardle
R1,099 R840 Discovery Miles 8 400 Save R259 (24%) Ships in 10 - 15 working days

Written by leading macOS threat analyst Patrick Wardle, The Art of Mac Malware Analysis covers the knowledge and hands-on skills required to analyze Mac malware. Using real-world examples and references to original research, Part 1 surveys the malware's various infection methods, persistence mechanisms, and capabilities. In Part 2, you'll learn about the static and dynamic analysis tools and techniques needed to examine malware you may find in the wild. Finally, you'll put these lessons into practice by walking through a comprehensive analysis of a complex Mac malware specimen (Part 3).

Cyber-Risk Management (Paperback, 1st ed. 2015): Atle Refsdal, Bjornar Solhaug, Ketil Stolen Cyber-Risk Management (Paperback, 1st ed. 2015)
Atle Refsdal, Bjornar Solhaug, Ketil Stolen
R2,462 Discovery Miles 24 620 Ships in 18 - 22 working days

This book provides a brief and general introduction to cybersecurity and cyber-risk assessment. Not limited to a specific approach or technique, its focus is highly pragmatic and is based on established international standards (including ISO 31000) as well as industrial best practices. It explains how cyber-risk assessment should be conducted, which techniques should be used when, what the typical challenges and problems are, and how they should be addressed. The content is divided into three parts. First, part I provides a conceptual introduction to the topic of risk management in general and to cybersecurity and cyber-risk management in particular. Next, part II presents the main stages of cyber-risk assessment from context establishment to risk treatment and acceptance, each illustrated by a running example. Finally, part III details four important challenges and how to reasonably deal with them in practice: risk measurement, risk scales, uncertainty, and low-frequency risks with high consequence. The target audience is mainly practitioners and students who are interested in the fundamentals and basic principles and techniques of security risk assessment, as well as lecturers seeking teaching material. The book provides an overview of the cyber-risk assessment process, the tasks involved, and how to complete them in practice.

Practical Memory Forensics - Jumpstart effective forensic analysis of volatile memory (Paperback): Svetlana Ostrovskaya, Oleg... Practical Memory Forensics - Jumpstart effective forensic analysis of volatile memory (Paperback)
Svetlana Ostrovskaya, Oleg Skulkin
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

A practical guide to enhancing your digital investigations with cutting-edge memory forensics techniques Key Features Explore memory forensics, one of the vital branches of digital investigation Learn the art of user activities reconstruction and malware detection using volatile memory Get acquainted with a range of open-source tools and techniques for memory forensics Book DescriptionMemory Forensics is a powerful analysis technique that can be used in different areas, from incident response to malware analysis. With memory forensics, you can not only gain key insights into the user's context but also look for unique traces of malware, in some cases, to piece together the puzzle of a sophisticated targeted attack. Starting with an introduction to memory forensics, this book will gradually take you through more modern concepts of hunting and investigating advanced malware using free tools and memory analysis frameworks. This book takes a practical approach and uses memory images from real incidents to help you gain a better understanding of the subject and develop the skills required to investigate and respond to malware-related incidents and complex targeted attacks. You'll cover Windows, Linux, and macOS internals and explore techniques and tools to detect, investigate, and hunt threats using memory forensics. Equipped with this knowledge, you'll be able to create and analyze memory dumps on your own, examine user activity, detect traces of fileless and memory-based malware, and reconstruct the actions taken by threat actors. By the end of this book, you'll be well-versed in memory forensics and have gained hands-on experience of using various tools associated with it. What you will learn Understand the fundamental concepts of memory organization Discover how to perform a forensic investigation of random access memory Create full memory dumps as well as dumps of individual processes in Windows, Linux, and macOS Analyze hibernation files, swap files, and crash dumps Apply various methods to analyze user activities Use multiple approaches to search for traces of malicious activity Reconstruct threat actor tactics and techniques using random access memory analysis Who this book is forThis book is for incident responders, digital forensic specialists, cybersecurity analysts, system administrators, malware analysts, students, and curious security professionals new to this field and interested in learning memory forensics. A basic understanding of malware and its working is expected. Although not mandatory, knowledge of operating systems internals will be helpful. For those new to this field, the book covers all the necessary concepts.

EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback): Robert Karamagi EC-Council Certified Ethical Hacker - (Practice Exams) (Paperback)
Robert Karamagi
R752 Discovery Miles 7 520 Ships in 18 - 22 working days
Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and... Python for Security and Networking - Third Edition - Leverage Python modules and tools in securing your network and applications (Paperback, 3rd Revised edition)
Jose Manuel Ortega
R1,123 Discovery Miles 11 230 Ships in 18 - 22 working days

Gain a firm, practical understanding of securing your network and utilize Python's packages to detect vulnerabilities in your application Key Features * Discover security techniques to protect your network and systems using Python 3.10 * Create scripts in Python to automate security and pentesting tasks * Analyze network traffic in a network and extract information using Python 3.10 Book Description Python's latest updates add numerous libraries that can be used to perform critical security-related missions, including detecting vulnerabilities in web applications, taking care of attacks, and helping to build secure and robust networks that are resilient to them. This fully updated third edition will show you how to make the most of them and improve your security posture. The first part of this book will walk you through Python scripts and libraries that you'll use throughout the book. Next, you'll dive deep into the core networking tasks where you will learn how to check a network's vulnerability using Python security scripting and understand how to check for vulnerabilities in your network - including tasks related to packet sniffing. You'll also learn how to achieve endpoint protection by leveraging Python packages along with writing forensics scripts. The next part of the book will show you a variety of modern techniques, libraries, and frameworks from the Python ecosystem that will help you extract data from servers and analyze the security in web applications. You'll take your first steps in extracting data from a domain using OSINT tools and using Python tools to perform forensics tasks. By the end of this book, you will be able to make the most of Python to test the security of your network and applications. What you will learn * Create scripts in Python to automate security and pentesting tasks * Program your own tools in Python that can be used in a Network Security process * Automate tasks of analysis and extraction of information from servers * Detect Server Vulnerabilities and analyze security in web applications * Utilize the ssh-audit tool to check the security in SSH servers * Explore WriteHat as a pentesting reports tool written in Python * Automate the process of detecting vulnerabilities in applications with tools like Fuxploider Who This Book Is For This Python book is for network engineers, system administrators, and other security professionals looking to overcome common networking and security issues using Python. You will also find this book useful if you're an experienced programmer looking to explore Python's full range of capabilities. A basic understanding of general programming structures as well as familiarity with the Python programming language is a prerequisite.

Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback): John... Machine Learning Security Principles - Keep data, networks, users, and applications safe from prying eyes (Paperback)
John Paul Mueller, Anshul Bhatnagar, Sarthak Sarbahi
R1,062 Discovery Miles 10 620 Ships in 18 - 22 working days

Thwart hackers by preventing, detecting, and misdirecting access before they can plant malware, obtain credentials, engage in fraud, modify data, poison models, corrupt users, eavesdrop, and otherwise ruin your day Key Features Discover how hackers rely on misdirection and deep fakes to fool even the best security systems Retain the usefulness of your data by detecting unwanted and invalid modifications Develop application code to meet the security requirements related to machine learning Book DescriptionBusinesses are leveraging the power of AI to make undertakings that used to be complicated and pricy much easier, faster, and cheaper. The first part of this book will explore these processes in more depth, which will help you in understanding the role security plays in machine learning. As you progress to the second part, you'll learn more about the environments where ML is commonly used and dive into the security threats that plague them using code, graphics, and real-world references. The next part of the book will guide you through the process of detecting hacker behaviors in the modern computing environment, where fraud takes many forms in ML, from gaining sales through fake reviews to destroying an adversary's reputation. Once you've understood hacker goals and detection techniques, you'll learn about the ramifications of deep fakes, followed by mitigation strategies. This book also takes you through best practices for embracing ethical data sourcing, which reduces the security risk associated with data. You'll see how the simple act of removing personally identifiable information (PII) from a dataset lowers the risk of social engineering attacks. By the end of this machine learning book, you'll have an increased awareness of the various attacks and the techniques to secure your ML systems effectively. What you will learn Explore methods to detect and prevent illegal access to your system Implement detection techniques when access does occur Employ machine learning techniques to determine motivations Mitigate hacker access once security is breached Perform statistical measurement and behavior analysis Repair damage to your data and applications Use ethical data collection methods to reduce security risks Who this book is forWhether you're a data scientist, researcher, or manager working with machine learning techniques in any aspect, this security book is a must-have. While most resources available on this topic are written in a language more suitable for experts, this guide presents security in an easy-to-understand way, employing a host of diagrams to explain concepts to visual learners. While familiarity with machine learning concepts is assumed, knowledge of Python and programming in general will be useful.

Web Penetration Testing - Hack Your Way (Paperback): Shubham Mishra Web Penetration Testing - Hack Your Way (Paperback)
Shubham Mishra
R325 Discovery Miles 3 250 Ships in 18 - 22 working days
Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large... Scam! - How to Avoid the Scams That Cost Victims Billions of Dollars Every Year (Large Print) (Large print, Paperback, Large type / large print edition)
Hope Oje
R616 R570 Discovery Miles 5 700 Save R46 (7%) Ships in 18 - 22 working days
Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback): Michael I. Kaplan Certified Cyber Security Operations Manager - Exam Prep Guide (Paperback)
Michael I. Kaplan
R1,399 Discovery Miles 13 990 Ships in 18 - 22 working days
Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on... Windows Ransomware Protection and Detection - Countermeasures using practical approaches to reducing the risks of attacks on your infrastructure (Paperback)
Marius Sandbu
R921 Discovery Miles 9 210 Ships in 18 - 22 working days

Protecting your end-users and IT infrastructure against the common ransomware attack vectors and efficiently monitoring future threats. Key Features * Learn to build security monitoring solutions based on Microsoft 365 and Sentinel * Understand how Zero-Trust access and SASE services can help in reducing and mitigating risks * Build a secure foundation for Windows Endpoints, email, infrastructure, and cloud services Book Description Looking for an effective way to secure your environment from ransomware attacks? Grab this book to learn how to monitor security threats, security monitoring, and how to establish countermeasures to protect against ransomware attacks. This book starts with understanding how ransomware attacks work, identifying different attack vectors, and how to build a secure network foundation and Windows environment. Then this book will guide you through ransomware countermeasures in different segments such as Identity Management Access, Networking, Endpoint Manager, Cloud, and Infrastructure by which you will learn how to protect against attacks. As you move forward, you will get your hands into forensics about important considerations if you got attacked or compromised with ransomware, what you should do, and how you can monitor the threat landscape for future threats by exploring different online data sources and building processes. By the end of this book, you will learn how configuration settings and scripts can be used to protect Windows from ransomware attacks with 50 tips on security settings to secure your Windows workload. What you will learn * Understand how ransomware has evolved into the larger threat * Secure identity-based access using services like MFA * Enrich data with threat intelligence and other external data sources * Protect devices with Microsoft Defender and Network Protection * Learn how to secure users in Active Directory and Azure Active Directory * Secure your Windows Endpoints using Endpoint Manager * Design network architecture in Azure to reduce the risk of lateral movement Who This Book Is For This book is for Windows administrators, Cloud administrators, CISOs, and Blue Team members, who want to understand the ransomware problem, how attackers execute the intrusions, and how one can use the techniques to counteract the attacks. This book is also for Security administrators who want more insight into how they can secure their environment. Basic experience is needed across Windows and Cloud.

Deadly Odds 5.0 (Paperback): Allen Wyler Deadly Odds 5.0 (Paperback)
Allen Wyler
R497 Discovery Miles 4 970 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Securing Cloud Services - A Pragmatic…
IT Governance Paperback R1,386 Discovery Miles 13 860
GRU Cybervillains - The DOJ Indictment…
Department of Justice Hardcover R563 Discovery Miles 5 630
The Ransomware Threat Landscape…
IT Governance Paperback R626 Discovery Miles 6 260
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710
Cybersecurity - A Simple Beginner's…
Quinn Kiser Hardcover R667 R596 Discovery Miles 5 960
Linux Command - A Comprehensive…
William Vance Hardcover R581 R536 Discovery Miles 5 360
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,092 R920 Discovery Miles 9 200
Cult of the Dead Cow - How the Original…
Joseph Menn Paperback R449 R418 Discovery Miles 4 180
Malware Forensics - Investigating and…
Cameron H. Malin, Eoghan Casey, … Paperback R1,539 Discovery Miles 15 390
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, … Paperback R1,110 Discovery Miles 11 100

 

Partners