0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (12)
  • R250 - R500 (79)
  • R500+ (124)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer viruses

Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response... Digital Forensics and Incident Response - Incident response tools and techniques for effective cyber threat response (Paperback, 3rd Revised edition)
Gerard Johansen
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively applying digital forensics, incident management, and investigation techniques to real-world cyber threats Key Features Create a solid incident response framework and manage cyber incidents effectively Learn to apply digital forensics tools and techniques to investigate cyber threats Explore the real-world threat of ransomware and apply proper incident response techniques for investigation and recovery Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated third edition will help you perform cutting-edge digital forensic activities and incident response with a new focus on responding to ransomware attacks. After covering the fundamentals of incident response that are critical to any information security team, you'll explore incident response frameworks. From understanding their importance to creating a swift and effective response to security incidents, the book will guide you using examples. Later, you'll cover digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. You'll be able to apply these techniques to the current threat of ransomware. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll be able to investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Integrate digital forensic techniques and procedures into the overall incident response process Understand different techniques for threat hunting Write incident reports that document the key findings of your analysis Apply incident response practices to ransomware attacks Leverage cyber threat intelligence to augment digital forensics findings Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organizations. You'll also find the book helpful if you're new to the concept of digital forensics and looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Unhackable - Workbook (Paperback): George Mansour Unhackable - Workbook (Paperback)
George Mansour
R311 Discovery Miles 3 110 Ships in 18 - 22 working days
CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback): Glen Mitchell CompTIA Security+ - All-in-One Exam Practice Questions (JK0-018) (Paperback)
Glen Mitchell
R486 Discovery Miles 4 860 Ships in 18 - 22 working days
Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback): Robert M Peterson Certified Cyber Incident Response Manager - Exam Prep Guide (Paperback)
Robert M Peterson; Michael I. Kaplan
R1,382 Discovery Miles 13 820 Ships in 18 - 22 working days
Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third... Accelerated Windows Malware Analysis with Memory Dumps - Training Course Transcript and WinDbg Practice Exercises, Third Edition (Paperback, 3rd ed.)
Dmitry Vostokov, Software Diagnostics Services
R2,263 Discovery Miles 22 630 Ships in 18 - 22 working days
Mum's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Mum's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Memory Dump Analysis Anthology, Volume 5, Revised Edition (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 5, Revised Edition (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R990 Discovery Miles 9 900 Ships in 18 - 22 working days
Memory Dump Analysis Anthology, Volume 2, Revised Edition (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 2, Revised Edition (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R997 Discovery Miles 9 970 Ships in 18 - 22 working days
7 Rules To Become Exceptional At Cyber Security - A Practical, Real-world Perspective For Cyber Security Leaders and... 7 Rules To Become Exceptional At Cyber Security - A Practical, Real-world Perspective For Cyber Security Leaders and Professionals (Paperback)
Chirag D Joshi
R463 Discovery Miles 4 630 Ships in 18 - 22 working days
Purple Team Strategies - Enhancing global security posture through uniting red and blue teams with adversary emulation... Purple Team Strategies - Enhancing global security posture through uniting red and blue teams with adversary emulation (Paperback)
David Routin, Simon Thoores, Samuel Rossier
R962 Discovery Miles 9 620 Ships in 18 - 22 working days

Leverage cyber threat intelligence and the MITRE framework to enhance your prevention mechanisms, detection capabilities, and learn top adversarial simulation and emulation techniques Key Features Apply real-world strategies to strengthen the capabilities of your organization's security system Learn to not only defend your system but also think from an attacker's perspective Ensure the ultimate effectiveness of an organization's red and blue teams with practical tips Book DescriptionWith small to large companies focusing on hardening their security systems, the term "purple team" has gained a lot of traction over the last couple of years. Purple teams represent a group of individuals responsible for securing an organization's environment using both red team and blue team testing and integration - if you're ready to join or advance their ranks, then this book is for you. Purple Team Strategies will get you up and running with the exact strategies and techniques used by purple teamers to implement and then maintain a robust environment. You'll start with planning and prioritizing adversary emulation, and explore concepts around building a purple team infrastructure as well as simulating and defending against the most trendy ATT&CK tactics. You'll also dive into performing assessments and continuous testing with breach and attack simulations. Once you've covered the fundamentals, you'll also learn tips and tricks to improve the overall maturity of your purple teaming capabilities along with measuring success with KPIs and reporting. With the help of real-world use cases and examples, by the end of this book, you'll be able to integrate the best of both sides: red team tactics and blue team security measures. What you will learn Learn and implement the generic purple teaming process Use cloud environments for assessment and automation Integrate cyber threat intelligence as a process Configure traps inside the network to detect attackers Improve red and blue team collaboration with existing and new tools Perform assessments of your existing security controls Who this book is forIf you're a cybersecurity analyst, SOC engineer, security leader or strategist, or simply interested in learning about cyber attack and defense strategies, then this book is for you. Purple team members and chief information security officers (CISOs) looking at securing their organizations from adversaries will also benefit from this book. You'll need some basic knowledge of Windows and Linux operating systems along with a fair understanding of networking concepts before you can jump in, while ethical hacking and penetration testing know-how will help you get the most out of this book.

Memory Dump Analysis Anthology, Volume 1, Revised Edition (Paperback): Dmitry Vostokov, Software Diagnostics Institute Memory Dump Analysis Anthology, Volume 1, Revised Edition (Paperback)
Dmitry Vostokov, Software Diagnostics Institute
R1,155 Discovery Miles 11 550 Ships in 18 - 22 working days
Computer Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,173 Discovery Miles 11 730 Ships in 18 - 22 working days
Cyber Resilience A Global Challenge (Paperback): Virginia A. Greiman, Emmanuelle Bernardin Cyber Resilience A Global Challenge (Paperback)
Virginia A. Greiman, Emmanuelle Bernardin
R849 Discovery Miles 8 490 Ships in 18 - 22 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

The Executive's Cybersecurity Advisor - Gain Critical Business Insight in Minutes (Paperback): Michael Gable The Executive's Cybersecurity Advisor - Gain Critical Business Insight in Minutes (Paperback)
Michael Gable
R430 R395 Discovery Miles 3 950 Save R35 (8%) Ships in 18 - 22 working days
Privilege Escalation Techniques - Learn the art of exploiting Windows and Linux systems (Paperback): Alexis Ahmed Privilege Escalation Techniques - Learn the art of exploiting Windows and Linux systems (Paperback)
Alexis Ahmed
R1,223 Discovery Miles 12 230 Ships in 18 - 22 working days

Escalate your privileges on Windows and Linux platforms with step-by-step instructions and deepen your theoretical foundations Key Features Discover a range of techniques to escalate privileges on Windows and Linux systems Understand the key differences between Windows and Linux privilege escalation Explore unique exploitation challenges in each chapter provided in the form of pre-built VMs Book DescriptionPrivilege Escalation Techniques is a detailed guide to privilege escalation techniques and tools for both Windows and Linux systems. This is a one-of-a-kind resource that will deepen your understanding of both platforms and provide detailed, easy-to-follow instructions for your first foray into privilege escalation. The book uses virtual environments that you can download to test and run tools and techniques. After a refresher on gaining access and surveying systems, each chapter will feature an exploitation challenge in the form of pre-built virtual machines (VMs). As you progress, you will learn how to enumerate and exploit a target Linux or Windows system. You'll then get a demonstration on how you can escalate your privileges to the highest level. By the end of this book, you will have gained all the knowledge and skills you need to be able to perform local kernel exploits, escalate privileges through vulnerabilities in services, maintain persistence, and enumerate information from the target such as passwords and password hashes. What you will learn Understand the privilege escalation process and set up a pentesting lab Gain an initial foothold on the system Perform local enumeration on target systems Exploit kernel vulnerabilities on Windows and Linux systems Perform privilege escalation through password looting and finding stored credentials Get to grips with performing impersonation attacks Exploit Windows services such as the secondary logon handle service to escalate Windows privileges Escalate Linux privileges by exploiting scheduled tasks and SUID binaries Who this book is forIf you're a pentester or a cybersecurity student interested in learning how to perform various privilege escalation techniques on Windows and Linux systems - including exploiting bugs and design flaws - then this book is for you. You'll need a solid grasp on how Windows and Linux systems work along with fundamental cybersecurity knowledge before you get started.

Ethical Hacking for Beginners - A Step by Step Guide for you to Learn the Fundamentals of CyberSecurity and Hacking... Ethical Hacking for Beginners - A Step by Step Guide for you to Learn the Fundamentals of CyberSecurity and Hacking (Paperback)
Ramon Adrian Nastase
R295 R275 Discovery Miles 2 750 Save R20 (7%) Ships in 18 - 22 working days
Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.): Wenliang Du Computer & Internet Security - A Hands-on Approach (Paperback, 3rd ed.)
Wenliang Du
R1,630 Discovery Miles 16 300 Ships in 18 - 22 working days
Grandad's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback): Dubreck World Publishing Grandad's Secret Password Book - Protect Your Internet Usernames and Passwords (Paperback)
Dubreck World Publishing
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Hackers Exposed - Discover the secret world of cybercrime (Paperback): Fernando Uilherme Barbosa de Azevedo Hackers Exposed - Discover the secret world of cybercrime (Paperback)
Fernando Uilherme Barbosa de Azevedo
R336 Discovery Miles 3 360 Ships in 18 - 22 working days
Ptfm - Purple Team Field Manual (Paperback): Tim Bryant Ptfm - Purple Team Field Manual (Paperback)
Tim Bryant
R485 Discovery Miles 4 850 Ships in 18 - 22 working days
Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing... Remove Malware, Spyware and Viruses From Your PC - Guide to increase your computer's security and speed by removing malicious viruses, malware, and spyware. (Paperback)
Hugh Mendoza
R207 Discovery Miles 2 070 Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
Intrusion Detection Honeypots (Paperback): Chris Sanders Intrusion Detection Honeypots (Paperback)
Chris Sanders
R881 R800 Discovery Miles 8 000 Save R81 (9%) Ships in 18 - 22 working days
Incident Response in the Age of Cloud - Techniques and best practices to effectively respond to cybersecurity incidents... Incident Response in the Age of Cloud - Techniques and best practices to effectively respond to cybersecurity incidents (Paperback)
Dr. Erdal Ozkaya
R1,002 Discovery Miles 10 020 Ships in 18 - 22 working days

Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences Key Features Discover Incident Response (IR), from its evolution to implementation Understand cybersecurity essentials and IR best practices through real-world phishing incident scenarios Explore the current challenges in IR through the perspectives of leading experts Book DescriptionCybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK (R) and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an "Ask the Experts" chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learn Understand IR and its significance Organize an IR team Explore best practices for managing attack situations with your IR team Form, organize, and operate a product security team to deal with product vulnerabilities and assess their severity Organize all the entities involved in product security response Respond to security vulnerabilities using tools developed by Keepnet Labs and Binalyze Adapt all the above learnings for the cloud Who this book is forThis book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book. The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn't mandatory.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Malware Forensics - Investigating and…
Cameron H. Malin, Eoghan Casey, … Paperback R1,539 Discovery Miles 15 390
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710
Unmasking the Hacker - Demystifying…
Amanda-Jane Turner Hardcover R754 Discovery Miles 7 540
Linux Command - A Comprehensive…
William Vance Hardcover R581 R536 Discovery Miles 5 360
Digital Earth - Cyber Threats, Privacy…
It Governance Publishing Paperback R631 Discovery Miles 6 310
Cyber Crime and Cyber Terrorism…
Babak Akhgar, Andrew Staniforth, … Paperback R1,110 Discovery Miles 11 100
A Hacker I Am Vol 2
Craig Ford Hardcover R886 R715 Discovery Miles 7 150
Cult of the Dead Cow - How the Original…
Joseph Menn Paperback R449 R418 Discovery Miles 4 180
Cyber Weapons of Mass Psychological…
Vikram Sethi Hardcover R1,092 R920 Discovery Miles 9 200
Computer Networking and Cybersecurity
Quinn Kiser Paperback R794 R698 Discovery Miles 6 980

 

Partners