0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (61)
  • R250 - R500 (104)
  • R500+ (1,344)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

Guide to Network Defense and Countermeasures (Paperback, 3rd edition): Randy Weaver, Dean Farwood, Dawn Weaver Guide to Network Defense and Countermeasures (Paperback, 3rd edition)
Randy Weaver, Dean Farwood, Dawn Weaver
R1,157 R979 Discovery Miles 9 790 Save R178 (15%) Ships in 15 - 25 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Practical Cryptology and Web Security (Paperback): P.K. Yuen Practical Cryptology and Web Security (Paperback)
P.K. Yuen
R2,035 R1,422 Discovery Miles 14 220 Save R613 (30%) Ships in 10 - 15 working days

The transfer of information over the world wide web depends critically on secure communications. The need to protect the material we send and receive from cyberspace, from the largest of business transactions to the simplest of personal web-pages, is crucial in ensuring we can continue to use this incredible resource safely. Cryptology provides the most reliable tools for storing or transmitting digital information and is the gold standard for attaining the levels of security our online interactions demand. Taking a step-by-step approach, P. K. Yuen demonstrates how to master web-based security skills including: protecting websites from hackers and viruses; encrypting email; building a secure web-database; performing secure business transactions over the web. Working from a problem-solving perspective, he shows how to implement security solutions and looks from the attacker's point of view at possible challenges to that security. In short, Practical Cryptology and Web Security offers a practical and comprehensive guide to all aspects of web security. This book features over 120 worked examples, many from industry, demonstrate the key considerations in implementing web security. AES, this book examines the latest web technologies in terms of security, including XML Signatures and XML Digital Contracts. PK Yuen is a well known expert on Communications, Internet and the World Wide Web. He has over 13 years' experience working on web technologies including large scale application developments, engineer training and project leadership and working on the security system of the Shanghai Pu Dong airport, China. He also co-authored Practical Web Technologies, published by Addison-Wesley in 2003.

The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition): Michael J. Casey, Paul Vigna The Truth Machine - The Blockchain and the Future of Everything (Paperback, Epub Edition)
Michael J. Casey, Paul Vigna 1
R399 R304 Discovery Miles 3 040 Save R95 (24%) Ships in 10 - 15 working days

From the authors of the fascinating The Age of Cryptocurrency, comes the definitive work on the Internet's next big thing: the blockchain. Many of the `legacy systems' once designed to make our lives easier and our economy more efficient are no longer up to the task; big banks have grown more entrenched, privacy exists only until the next hack, and credit card fraud has become a fact of life. However, there is a way past all this-a new kind of operating system with the potential to revolutionise our economy: the blockchain. In The Truth Machine, Michael J. Casey and Paul Vigna demystify the blockchain and explain why it can restore personal control over our data, assets, and identities; grant billions of excluded people access to the global economy; and shift the balance of power to revive society's faith in itself. They reveal the empowerment possible when self-interested middlemen give way to the transparency of the blockchain, while highlighting the job losses, assertion of special interests, and threat to social cohesion that will accompany this shift. With a balanced perspective, Casey and Vigna show why we all must care about the path that blockchain technology takes-moving humanity forward, not backward.

Tribe of Hackers Blue Team - Tribal Knowledge from the Best in Defensive Cybersecurity (Paperback): Marcus J. Carey, Jennifer... Tribe of Hackers Blue Team - Tribal Knowledge from the Best in Defensive Cybersecurity (Paperback)
Marcus J. Carey, Jennifer Jin
R517 R419 Discovery Miles 4 190 Save R98 (19%) Ships in 7 - 11 working days

Blue Team defensive advice from the biggest names in cybersecurity The Tribe of Hackers team is back. This new guide is packed with insights on blue team issues from the biggest names in cybersecurity. Inside, dozens of the world's leading Blue Team security specialists show you how to harden systems against real and simulated breaches and attacks. You'll discover the latest strategies for blocking even the most advanced red-team attacks and preventing costly losses. The experts share their hard-earned wisdom, revealing what works and what doesn't in the real world of cybersecurity. Tribe of Hackers Blue Team goes beyond the bestselling, original Tribe of Hackers book and delves into detail on defensive and preventative techniques. Learn how to grapple with the issues that hands-on security experts and security managers are sure to build into their blue team exercises. Discover what it takes to get started building blue team skills Learn how you can defend against physical and technical penetration testing Understand the techniques that advanced red teamers use against high-value targets Identify the most important tools to master as a blue teamer Explore ways to harden systems against red team attacks Stand out from the competition as you work to advance your cybersecurity career Authored by leaders in cybersecurity attack and breach simulations, the Tribe of Hackers series is perfect for those new to blue team security, experienced practitioners, and cybersecurity team leaders. Tribe of Hackers Blue Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the blue team defense.

2019 Standard Catalog of Cryptocurrencies (Hardcover): Mateo Marin 2019 Standard Catalog of Cryptocurrencies (Hardcover)
Mateo Marin
R903 R638 Discovery Miles 6 380 Save R265 (29%) Ships in 10 - 15 working days
The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback): Joshua Holden The Mathematics of Secrets - Cryptography from Caesar Ciphers to Digital Encryption (Paperback)
Joshua Holden
R464 R379 Discovery Miles 3 790 Save R85 (18%) Ships in 10 - 15 working days

Explaining the mathematics of cryptography The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography-the science of sending secret messages. Using a wide range of historical anecdotes and real-world examples, Joshua Holden shows how mathematical principles underpin the ways that different codes and ciphers work. He focuses on both code making and code breaking and discusses most of the ancient and modern ciphers that are currently known. He begins by looking at substitution ciphers, and then discusses how to introduce flexibility and additional notation. Holden goes on to explore polyalphabetic substitution ciphers, transposition ciphers, connections between ciphers and computer encryption, stream ciphers, public-key ciphers, and ciphers involving exponentiation. He concludes by looking at the future of ciphers and where cryptography might be headed. The Mathematics of Secrets reveals the mathematics working stealthily in the science of coded messages. A blog describing new developments and historical discoveries in cryptography related to the material in this book is accessible at http://press.princeton.edu/titles/10826.html.

The Shellcoder's Handbook - Discovering and Exploiting Security Holes (Paperback, 2nd Edition): Chris Anley, John Heasman,... The Shellcoder's Handbook - Discovering and Exploiting Security Holes (Paperback, 2nd Edition)
Chris Anley, John Heasman, Felix Lindner, Gerardo Richarte
R964 R627 Discovery Miles 6 270 Save R337 (35%) Ships in 10 - 15 working days

* This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application * New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista * Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored * The companion Web site features downloadable code files

The Art of Deception - Controlling the Human Element of Security (Paperback, New ed): Kevin D. Mitnick, William L Simon The Art of Deception - Controlling the Human Element of Security (Paperback, New ed)
Kevin D. Mitnick, William L Simon; Foreword by Steve Wozniak
R319 R217 Discovery Miles 2 170 Save R102 (32%) Ships in 10 - 15 working days

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Mastering Blockchain - Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (Paperback):... Mastering Blockchain - Unlocking the Power of Cryptocurrencies, Smart Contracts, and Decentralized Applications (Paperback)
Lorne Lantz, Daniel Cawrey
R1,372 R1,035 Discovery Miles 10 350 Save R337 (25%) Ships in 7 - 11 working days

The future will become increasingly distributed. As the publicity surrounding Bitcoin and blockchain has shown, distributed technology and business models are gaining popularity. Yet the disruptive potential of this technology is often obscured by hype and misconception. In this detailed guide, Lorne Lantz and Daniel Cawrey distill the complex ideas behind blockchain into an easily digestible reference manual, showing what's really going on under the hood. Finance and technology professionals will learn how a blockchain works as they explore the evolution and current state of blockchain technology, including the function of cryptocurrencies and smart contracts. This book is for anyone evaluating whether or not to invest time in the cryptocurrency and blockchain industry. Go beyond buzzwords and discover what the technology really has to offer. Learn why Bitcoin was fundamentally important in blockchain's birth Explore altcoin and alternative blockchain projects to understand what's possible Understand the challenges of scaling a blockchain and forking a blockchain Learn what Ethereum and other blockchains offer beyond Bitcoin Examine how the money flows in crypto markets Discover where the future lies in this exciting new technology

Kryptowahrungen fur Dummies (German, Paperback): Krijn Soeteman Kryptowahrungen fur Dummies (German, Paperback)
Krijn Soeteman
R378 Discovery Miles 3 780 Ships in 10 - 15 working days
Tribe of Hackers Red Team - Tribal Knowledge from the Best in Offensive Cybersecurity (Paperback): Marcus J. Carey, Jennifer Jin Tribe of Hackers Red Team - Tribal Knowledge from the Best in Offensive Cybersecurity (Paperback)
Marcus J. Carey, Jennifer Jin
R496 R371 Discovery Miles 3 710 Save R125 (25%) Ships in 10 - 15 working days

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover): Sean P. Gorman Networks, Security and Complexity - The Role of Public Policy in Critical Infrastructure Protection (Hardcover)
Sean P. Gorman
R2,465 Discovery Miles 24 650 Ships in 10 - 15 working days

The end of the 20th century witnessed an information revolution that introduced a host of new economic efficiencies. This economic change was underpinned by rapidly growing networks of infrastructure that have become increasingly complex. In this new era of global security we are now forced to ask whether our private efficiencies have led to public vulnerabilities, and if so, how do we make ourselves secure without hampering the economy. In order to answer these questions, Sean Gorman provides a framework for how vulnerabilities are identified and cost-effectively mitigated, as well as how resiliency and continuity of infrastructures can be increased. Networks, Security and Complexity goes on to address specific concerns such as determining criticality and interdependency, the most effective means of allocating scarce resources for defense, and whether diversity is a viable strategy. The author provides the economic, policy, and physics background to the issues of infrastructure security, along with tools for taking first steps in tackling these security dilemmas. He includes case studies of infrastructure failures and vulnerabilities, an analysis of threats to US infrastructure, and a review of the economics and geography of agglomeration and efficiency. This critical and controversial book will garner much attention and spark an important dialogue. Policymakers, security professionals, infrastructure operators, academics, and readers following homeland security issues will find this volume of great interest.

Implementing Cryptography Using Python (Paperback): Shannon W. Bray Implementing Cryptography Using Python (Paperback)
Shannon W. Bray
R990 R759 Discovery Miles 7 590 Save R231 (23%) Ships in 7 - 11 working days

Learn to deploy proven cryptographic tools in your applications and services Cryptography is, quite simply, what makes security and privacy in the digital world possible. Tech professionals, including programmers, IT admins, and security analysts, need to understand how cryptography works to protect users, data, and assets. Implementing Cryptography Using Python will teach you the essentials, so you can apply proven cryptographic tools to secure your applications and systems. Because this book uses Python, an easily accessible language that has become one of the standards for cryptography implementation, you'll be able to quickly learn how to secure applications and data of all kinds. In this easy-to-read guide, well-known cybersecurity expert Shannon Bray walks you through creating secure communications in public channels using public-key cryptography. You'll also explore methods of authenticating messages to ensure that they haven't been tampered with in transit. Finally, you'll learn how to use digital signatures to let others verify the messages sent through your services. Learn how to implement proven cryptographic tools, using easy-to-understand examples written in Python Discover the history of cryptography and understand its critical importance in today's digital communication systems Work through real-world examples to understand the pros and cons of various authentication methods Protect your end-users and ensure that your applications and systems are using up-to-date cryptography

Security Awareness - Applying Practical Security in Your World (Paperback, 4th edition): Mark Ciampa Security Awareness - Applying Practical Security in Your World (Paperback, 4th edition)
Mark Ciampa
R746 R641 Discovery Miles 6 410 Save R105 (14%) Ships in 15 - 25 working days

Designed to provide you with the knowledge needed to protect computers and networks from increasingly sophisticated attacks, SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fourth Edition continues to present the same straightforward, practical information that has made previous editions so popular. For most computer users, practical computer security poses some daunting challenges: What type of attacks will antivirus software prevent? How do I set up a firewall? How can I test my computer to be sure that attackers cannot reach it through the Internet? When and how should I install Windows patches? This text is designed to help you understand the answers to these questions through a series of real-life user experiences. In addition, hands-on projects and case projects give you the opportunity to test your knowledge and apply what you have learned. SECURITY AWARENESS: APPLYING PRACTICE SECURITY IN YOUR WORLD, Fourth Edition contains up-to-date information on relevant topics such as protecting mobile devices and wireless local area networks.

Mastering Corda - Blockchain for Java Developers (Paperback): Jamiel Sheikh Mastering Corda - Blockchain for Java Developers (Paperback)
Jamiel Sheikh
R1,392 R1,055 Discovery Miles 10 550 Save R337 (24%) Ships in 7 - 11 working days

Get a consistent, linear pathway for learning Corda and building CorDapps. With

The Design of Rijndael - The Advanced Encryption Standard (AES) (Hardcover, 2nd ed. 2020): Joan Daemen, Vincent Rijmen The Design of Rijndael - The Advanced Encryption Standard (AES) (Hardcover, 2nd ed. 2020)
Joan Daemen, Vincent Rijmen
R3,158 Discovery Miles 31 580 Ships in 7 - 11 working days

An authoritative and comprehensive guide to the Rijndael algorithm and Advanced Encryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology. This book, written by the designers of the block cipher, presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.

IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover): Fred Cohen IT Security Governance Guidebook with Security Program Metrics on CD-ROM (Hardcover)
Fred Cohen
R3,051 Discovery Miles 30 510 Ships in 10 - 15 working days

The IT Security Governance Guidebook with Security Program Metrics on CD-ROM provides clear and concise explanations of key issues in information protection, describing the basic structure of information protection and enterprise protection programs. Including graphics to support the information in the text, this book includes both an overview of material as well as detailed explanations of specific issues. The accompanying CD-ROM offers a collection of metrics, formed from repeatable and comparable measurement, that are designed to correspond to the enterprise security governance model provided in the text, allowing an enterprise to measure its overall information protection program.

Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers... Fast Software Encryption - 21st International Workshop, FSE 2014, London, UK, March 3-5, 2014. Revised Selected Papers (Paperback, 2015 ed.)
Carlos Cid, Christian Rechberger
R2,145 R1,717 Discovery Miles 17 170 Save R428 (20%) Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theory; stream ciphers; hash functions; advanced constructions.

Selected Areas in Cryptography -- SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised... Selected Areas in Cryptography -- SAC 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers (Paperback, 2014 ed.)
Antoine Joux, Amr Youssef
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

This book constitutes the proceedings of the 21st International Conference on Selected Areas in Cryptography, SAC 2014, held in Montreal, QC, Canada, in August 2014. The 22 papers presented in this volume were carefully reviewed and selected from 103 submissions. There are four areas covered at each SAC conference. The three permanent areas are: design and analysis of symmetric key primitives and cryptosystems, including block and stream ciphers, hash function, MAC algorithms, cryptographic permutations, and authenticated encryption schemes; efficient implementations of symmetric and public key algorithms; mathematical and algorithmic aspects of applied cryptology. This year, the fourth area for SAC 2014 is: algorithms for cryptography, cryptanalysis and their complexity analysis.

Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback,... Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings (Paperback, 2014 ed.)
Sherman S.M. Chow, Joseph K. Liu, Lucas C.K. Hui, Siu Ming Yiu
R1,567 Discovery Miles 15 670 Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 8th International Conference on Provable Security, ProvSec 2012, held in Chengdu, China, in September 2012. The 20 full papers and 7 short papers presented together with 2 invited talks were carefully reviewed and selected from 68 submissions. The papers are grouped in topical sections on fundamental, symmetric key encryption, authentication, signatures, protocol, public key encryption, proxy re-encryption, predicate encryption, and attribute-based cryptosystem.

The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated... The Total CISSP Exam Prep Book - Practice Questions, Answers, and Test Taking Tips and Techniques (Paperback, annotated edition)
Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
R2,434 Discovery Miles 24 340 Ships in 10 - 15 working days

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their current knowledge in each of the ten security domains that make up the Common Body of Knowledge (CBK) from which the CISSP examination is based on. The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques provides an outline of the subjects, topics, and sub-topics contained within each domain in the CBK, and with it you can readily identify terms and concepts that you will need to know for the exam.

The book starts with a review of each of the ten domains and provides 25 sample questions with answers and references for each. It discusses successful approaches for preparing for the exam based on experiences of those who have recently passed the exam. It then provides a complete 250-question practice exam with answers. Explanations are provided to clarify why the correct answers are correct, and why the incorrect answers are incorrect. With a total of 500 sample questions, The Total CISSP Exam Prep Book gives you a full flavor of what it will take to pass the exam.

Tribe of Hackers Security Leaders - Tribal Knowledge from the Best in Cybersecurity Leadership (Paperback): Marcus J. Carey,... Tribe of Hackers Security Leaders - Tribal Knowledge from the Best in Cybersecurity Leadership (Paperback)
Marcus J. Carey, Jennifer Jin
R509 R411 Discovery Miles 4 110 Save R98 (19%) Ships in 7 - 11 working days

Tribal Knowledge from the Best in Cybersecurity Leadership The Tribe of Hackers series continues, sharing what CISSPs, CISOs, and other security leaders need to know to build solid cybersecurity teams and keep organizations secure. Dozens of experts and influential security specialists reveal their best strategies for building, leading, and managing information security within organizations. Tribe of Hackers Security Leaders follows the same bestselling format as the original Tribe of Hackers, but with a detailed focus on how information security leaders impact organizational security. Information security is becoming more important and more valuable all the time. Security breaches can be costly, even shutting businessesand governments down, so security leadership is a high-stakes game. Leading teams of hackers is not always easy, but the future of your organization may depend on it. In this book, the world's top security experts answer the questions that Chief Information Security Officers and other security leaders are asking, including: What's the most important decision you've made or action you've taken to enable a business risk? How do you lead your team to execute and get results? Do you have a workforce philosophy or unique approach to talent acquisition? Have you created a cohesive strategy for your information security program or business unit? Anyone in or aspiring to an information security leadership role, whether at a team level or organization-wide, needs to read this book. Tribe of Hackers Security Leaders has the real-world advice and practical guidance you need to advance your cybersecurity leadership career.

Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback): Nick Furneaux Investigating Cryptocurrencies - Understanding, Extracting, and Analyzing Blockchain Evidence (Paperback)
Nick Furneaux
R1,205 R829 Discovery Miles 8 290 Save R376 (31%) Ships in 10 - 15 working days

Investigate crimes involving cryptocurrencies and other blockchain technologies Bitcoin has traditionally been the payment system of choice for a criminal trading on the Dark Web, and now many other blockchain cryptocurrencies are entering the mainstream as traders are accepting them from low-end investors putting their money into the market. Worse still, the blockchain can even be used to hide information and covert messaging, unknown to most investigators. Investigating Cryptocurrencies is the first book to help corporate, law enforcement, and other investigators understand the technical concepts and the techniques for investigating crimes utilizing the blockchain and related digital currencies such as Bitcoin and Ethereum. Understand blockchain and transaction technologies Set up and run cryptocurrency accounts Build information about specific addresses Access raw data on blockchain ledgers Identify users of cryptocurrencies Extracting cryptocurrency data from live and imaged computers Following the money With nearly $150 billion in cryptocurrency circulating and $3 billion changing hands daily, crimes committed with or paid for with digital cash are a serious business. Luckily, Investigating Cryptocurrencies Forensics shows you how to detect it and, more importantly, stop it in its tracks.

CompTIA CySA+ Practice Tests - Exam CS0-002 (Paperback, 2nd Edition): Mike Chapple, David Seidl CompTIA CySA+ Practice Tests - Exam CS0-002 (Paperback, 2nd Edition)
Mike Chapple, David Seidl
R830 R652 Discovery Miles 6 520 Save R178 (21%) Ships in 7 - 11 working days

Efficiently prepare yourself for the demanding CompTIA CySA+ exam CompTIA CySA+ Practice Tests: Exam CS0-002, 2nd Edition offers readers the fastest and best way to prepare for the CompTIA Cybersecurity Analyst exam. With five unique chapter tests and two additional practice exams for a total of 1000 practice questions, this book covers topics including: Threat and Vulnerability Management Software and Systems Security Security Operations and Monitoring Incident Response Compliance and Assessment The new edition of CompTIA CySA+ Practice Tests is designed to equip the reader to tackle the qualification test for one of the most sought-after and in-demand certifications in the information technology field today. The authors are seasoned cybersecurity professionals and leaders who guide readers through the broad spectrum of security concepts and technologies they will be required to master before they can achieve success on the CompTIA CySA exam. The book also tests and develops the critical thinking skills and judgment the reader will need to demonstrate on the exam.

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): Roger A. Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
Roger A. Grimes
R499 R375 Discovery Miles 3 750 Save R124 (25%) Ships in 10 - 15 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
(ISC)2 SSCP Study Guide and SSCP…
Mike Wills Paperback R1,696 R1,166 Discovery Miles 11 660
Studies in Complexity and Cryptography…
Oded Goldreich Paperback R2,153 Discovery Miles 21 530
Decentralized Applications
Siraj Raval Paperback R893 R551 Discovery Miles 5 510
The Official (ISC)2 Guide to the CCSP…
Adam Gordon Hardcover R1,608 Discovery Miles 16 080
Fast Software Encryption - 22nd…
Gregor Leander Paperback R2,835 R2,490 Discovery Miles 24 900
Everyday Cryptography - Fundamental…
Keith Martin Paperback R1,106 Discovery Miles 11 060
Solving Cyber Risk - Protecting Your…
Andrew Coburn, Eireann Leverett, … Hardcover R986 R721 Discovery Miles 7 210
Digital Forensics
Andre Arnes Paperback R1,526 Discovery Miles 15 260
A Cryptography Primer - Secrets and…
Philip N. Klein Paperback R689 Discovery Miles 6 890
Cryptology Transmitted Message…
Igor Izmailov, Boris Poizner, … Hardcover R3,880 Discovery Miles 38 800

 

Partners