0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (16)
  • R250 - R500 (91)
  • R500+ (1,401)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Applications of computing > Databases > Data security & data encryption

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,394 R1,305 Discovery Miles 13 050 Save R89 (6%) Ships in 12 - 17 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

The Best Damn Cybercrime and Digital Forensics Book Period (Paperback): Jack Wiles, Anthony Reyes The Best Damn Cybercrime and Digital Forensics Book Period (Paperback)
Jack Wiles, Anthony Reyes
R1,379 R1,298 Discovery Miles 12 980 Save R81 (6%) Ships in 12 - 17 working days

Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an investigation to find out exactly what happened on a computer and who was responsible. IDC estimates that the U.S. market for computer forensics will be grow from $252 million in 2004 to $630 million by 2009. Business is strong outside the United States, as well. By 2011, the estimated international market will be $1.8 billion dollars. The Techno Forensics Conference has increased in size by almost 50% in its second year; another example of the rapid growth in the market.
This book is the first to combine cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. Everything needed for analyzing forensic data and recovering digital evidence can be found in one place, including instructions for building a digital forensics lab.
* Digital investigation and forensics is a growing industry
* Corporate I.T. departments needing to investigate incidents related to corporate espionage or other criminal activities are learning as they go and need a comprehensive step-by-step guide to e-discovery
* Appeals to law enforcement agencies with limited budgets

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,240 R1,169 Discovery Miles 11 690 Save R71 (6%) Ships in 12 - 17 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback): M. J. Carey Tribe of Hackers Red Team - Tribal Knowledge from The best in Offensive Cybersecurity (Paperback)
M. J. Carey
R576 R445 Discovery Miles 4 450 Save R131 (23%) Ships in 12 - 17 working days

Want Red Team offensive advice from the biggest cybersecurity names in the industry? Join our tribe. The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world's leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more Learn what it takes to secure a Red Team job and to stand out from other candidates Discover how to hone your hacking skills while staying on the right side of the law Get tips for collaborating on documentation and reporting Explore ways to garner support from leadership on your security proposals Identify the most important control to prevent compromising your network Uncover the latest tools for Red Team offensive security Whether you're new to Red Team security, an experienced practitioner, or ready to lead your own team, Tribe of Hackers Red Team has the real-world advice and practical guidance you need to advance your information security career and ready yourself for the Red Team offensive.

The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e (Paperback, 2nd Edition): C Anley The Shellcoder's Handbook - Discovering and Exploiting Security Holes 2e (Paperback, 2nd Edition)
C Anley
R1,121 R796 Discovery Miles 7 960 Save R325 (29%) Ships in 12 - 17 working days

* This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application * New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista * Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored * The companion Web site features downloadable code files

How to Cheat at Windows System Administration Using Command Line Scripts (Paperback): Pawan K. Bhardwaj How to Cheat at Windows System Administration Using Command Line Scripts (Paperback)
Pawan K. Bhardwaj
R956 Discovery Miles 9 560 Ships in 12 - 17 working days

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts.
With every new version of Windows, Microsoft is trying to ease the administration jobs by adding more and more layers of graphical user interface (GUI) or configuration wizards (dialog boxes). While these wizards are interactive and make the administrator s job easier, they are not always the most convenient and efficient way to accomplish the everyday administration tasks. These wizards are time consuming and, at times, may seem a bit confusing. The purpose of the book is to teach administrators how to use command-line scripts to complete everyday administration jobs, solve recurring network problems and at the same time improve their efficiency.
*Provides system administrators with hundreds of tips, tricks, and scripts to complete administration tasks more quickly and efficiently.
*No direct competition for a core tool for Windows administrators.
*Builds on success of other books in the series including How to Cheat at Managing Windows Small Business Server 2003 and How to Cheat at Managing Microsoft Operations Manager 2005."

Cloud Computing Solutions - Architecture, Data Storage, Implementation, and Security (Hardcover): Souvik Pal, Dac-Nhuong Le,... Cloud Computing Solutions - Architecture, Data Storage, Implementation, and Security (Hardcover)
Souvik Pal, Dac-Nhuong Le, Prasant Kumar Pattnaik
R4,780 Discovery Miles 47 800 Ships in 12 - 17 working days

CLOUD COMPUTING SOLUTIONS The main purpose of this book is to include all the cloud-related technologies in a single platform, so that researchers, academicians, postgraduate students, and those in the industry can easily understand the cloud-based ecosystems. This book discusses the evolution of cloud computing through grid computing and cluster computing. It will help researchers and practitioners to understand grid and distributed computing cloud infrastructure, virtual machines, virtualization, live migration, scheduling techniques, auditing concept, security and privacy, business models, and case studies through the state-of-the-art cloud computing countermeasures. This book covers the spectrum of cloud computing-related technologies and the wide-ranging contents will differentiate this book from others. The topics treated in the book include: The evolution of cloud computing from grid computing, cluster computing, and distributed systems; Covers cloud computing and virtualization environments; Discusses live migration, database, auditing, and applications as part of the materials related to cloud computing; Provides concepts of cloud storage, cloud strategy planning, and management, cloud security, and privacy issues; Explains complex concepts clearly and covers information for advanced users and beginners. Audience The primary audience for the book includes IT, computer science specialists, researchers, graduate students, designers, experts, and engineers who are occupied with research.

Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover): Michael... Physical Security Systems Handbook - The Design and Implementation of Electronic Security Systems (Hardcover)
Michael Khairallah
R1,433 Discovery Miles 14 330 Ships in 12 - 17 working days

A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment. All of the elements necessary to conduct a detailed survey of a facility and the methods used to document the findings of that survey are covered. Once the required systems are determined, the chapters following present how to assemble and evaluate bids for the acquisition of the required systems in a manner that will meet the most rigorous standards established for competitive bidding. The book also provides recommended approaches for system/user implementation, giving checklists and examples for developing management controls using the installed systems. This book was developed after a careful examination of the approved reference material available from the American Society for Industrial Security (ASIS International) for the certification of Physical Security Professionals (PSP). It is intended to fill voids left by the currently approved reference material to perform implementation of systems suggested in the existing reference texts. This book is an excellent "How To" for the aspiring security professional who wishes to take on the responsibilities of security system implementation, or the security manager who wants to do a professional job of system acquisition without hiring a professional consultant.
* Offers a step-by-step approach to identifying the application, acquiring the product and implementing the recommended system.
* Builds upon well-known, widely adopted concepts prevalent among security professionals.
* Offers seasoned advice on the competitive biddingprocess as well as on legal issues involved in the selection of applied products.

Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover): Jian Gong, Wei Xu Cryptoeconomics - Igniting a New Era of Blockchain (Hardcover)
Jian Gong, Wei Xu
R1,859 Discovery Miles 18 590 Ships in 12 - 17 working days

"A systematic review of the structure and context of the blockchain-derived economic model... (the book) describes cryptoeconomics in connection with the game theory, behavioral economics and others in simple understandable language."-Wang Feng, founder of Linekong Interactive Group and Mars Finance, partner in Geekbang Venture Capital Blockchain technology has subverted existing perceptions and is the start of an economic revolution, called, cryptoeconomics. Blockchain is a key component of cryptoeconomics. Vlad Zamfir, a developer of Ethereum, defines this term as "a formal discipline that studies protocols that governs the production, distribution, and consumption of goods and services in a decentralized digital economy. Cryptoeconomics is a practical science that focuses on the design and characterization of these protocols". This book explains the structures of blockchain-derived economic models, their history, and their application. It uses real-world cases to illustrate the relationship between cryptoeconomics and blockchain. Blockchain technology solves trust issues. A blockchain application can restrict behavior on the blockchain through a reward and punishment system that enables consensus in an innovative way. The greatest significance of cryptoeconomics lies in guaranteeing safety, stability, activity, and order in a decentralized consensus system. Security and stability are achieved mainly by cryptographical mechanisms. Activity and order are achieved through economic mechanisms. Cryptoeconomics and Blockchain: Ignighting a New Era of Blockchain discusses the most popular consensus algorithms and optimization mechanisms. With examples explained in clear and simple terms that are easy to understand, the book also explores economic mechanisms of blockchain such as game theory and behavioral economics.

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback):... Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals (Paperback)
James C Foster
R1,158 Discovery Miles 11 580 Ships in 12 - 17 working days

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
2. Sockets The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same communication over TCP and UDP, sockets are implemented differently in nearly ever language.
3. Shellcode Shellcode, commonly defined as bytecode converted from Assembly, is utilized to execute commands on remote systems via direct memory access.
4. Porting Due to the differences between operating platforms and language implementations on those platforms, it is a common practice to modify an original body of code to work on a different platforms. This technique is known as porting and is incredible useful in the real world environments since it allows you to not recreate the wheel.
5. Coding Tools The culmination of the previous four sections, coding tools brings all of the techniques that you have learned to the forefront. With the background technologies and techniques you will now be able to code quick utilities that will not only make you more productive, they will arm you with an extremely valuable skill that will remain with you as long as you make the proper time and effort dedications.
*Contains never before seen chapters on writing and automating exploits on windows systems with all-new exploits.
*Perform zero-day exploit forensics by reverse engineering malicious code.
*Provides working code and scripts in all of the most common programming languages for readers to use TODAY to defend their networks."

Information Security Architecture - An Integrated Approach to Security in the Organization (Hardcover, 2Rev ed): Jan Killmeyer Information Security Architecture - An Integrated Approach to Security in the Organization (Hardcover, 2Rev ed)
Jan Killmeyer
R3,635 Discovery Miles 36 350 Ships in 12 - 17 working days

Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available. In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization. The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.

Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New): Michael... Trojans, Worms, and Spyware - A Computer Security Professional's Guide to Malicious Code (Paperback, New)
Michael Erbschloe
R1,295 R1,215 Discovery Miles 12 150 Save R80 (6%) Ships in 12 - 17 working days

Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one of the more in-demand professions in the world today. With the widespread use of the Internet as a business tool, more emphasis is being placed on information security than ever before. To successfully deal with this increase in dependence and the ever growing threat of virus and worm attacks, Information security and information assurance (IA) professionals need a jargon-free book that addresses the practical aspects of meeting new security requirements.
This book provides a comprehensive list of threats, an explanation of what they are and how they wreak havoc with systems, as well as a set of rules-to-live-by along with a system to develop procedures and implement security training. It is a daunting task to combat the new generation of computer security threats - new and advanced variants of Trojans, as well as spyware (both hardware and software) and "bombs" - and Trojans, Worms, and Spyware will be a handy must-have reference for the computer security professional to battle and prevent financial and operational harm from system attacks.
*Provides step-by-step instructions to follow in the event of an attack
*Case studies illustrate the "do's," "don'ts," and lessons learned from infamous attacks
*Illustrates to managers and their staffs the importance of having protocols and a response plan in place

The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program... The Manager's Handbook for Corporate Security - Establishing and Managing a Successful Assets Protection Program (Hardcover)
Gerald L. Kovacich, Edward Halibozek
R1,705 Discovery Miles 17 050 Ships in 12 - 17 working days

Kovacich and Halibozek offer you the benefit of more than 55 years of combined experience in government and corporate security. Throughout the book, the authors use a fictional global corporation as a model to provide continual real-world challenges and solutions. New and experienced managers alike will find a wealth of information and practical advice to help you develop strategic and tactical plans and manage your daily operations.
* Contains real case examples to illustrate practical application of concepts
* Thoroughly covers the integration of physical, computer and information security goals for complete security awareness
* A handy reference for managers to quickly find and implement the security solutions they need

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): RA Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
RA Grimes
R580 R493 Discovery Miles 4 930 Save R87 (15%) Ships in 12 - 17 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition): Ge Clarke CompTIA A+(r) Certification All-in-One For Dummies (r), 5th Edition (Paperback, 5th Edition)
Ge Clarke
R1,198 R859 Discovery Miles 8 590 Save R339 (28%) Ships in 9 - 15 working days

Fully updated to cover the 2019 exam release! CompTIA's A+ certification is an essential certification to building a successful IT career. Test takers must pass both 90-question exams to be certified, and this book--plus online test bank--will help you reach your certification goal. The 9 minibooks map to the exam's objectives, and include new content on Windows 10, Scripting, Linux, and mobile devices. You'll learn about how computers work, networking, computer repair and troubleshooting, security, permissions, and customer service. You'll also find test-taking advice and a review of the types of questions you'll see on the exam. Use the online test bank to test your knowledge and prepare for the exam Get up to speed on operating system basics Find out how to manage the operating system Discover maintenance and troubleshooting tips Inside is all the knowledge you need to pass the new A+ exam!

A Practical Guide to Security Engineering and Information Assurance (Hardcover): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Hardcover)
Debra S. Herrmann
R3,650 Discovery Miles 36 500 Ships in 12 - 17 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.
A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise.
The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.
The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals... The Lure - The True Story of How the Department of Justice Brought Down Two of The World's Most Dangerous Cyber Criminals (Paperback, International Edition)
Stephen Schroeder
R756 Discovery Miles 7 560 Ships in 12 - 17 working days

Beginning in the fall of 1999, a number of Internet-related businesses and financial institutions in the United States suffered computer intrusions or "hacks" that originated from Russia. The hackers gained control of the victims' computers, copied and stole private data that included credit card information, and threatened to publish or use the stolen credit cards or inflict damage on the compromised computers unless the victims paid money or gave the hackers a job. Some of the companies gave in and paid off the hackers. Some decided not to. The hackers responded by shutting down parts of their networks and using stolen credit card numbers to order thousands of dollars' worth of computer equipment. THE LURE is the true, riveting story of how these Russian hackers, who bragged that the laws in their country offered them no threat, and who mocked the inability of the FBI to catch them, were caught by an FBI lure designed to appeal to their egos and their greed. The story of the sting operation and subsequent trial is told for the first time here by the Department of Justice's attorney for the prosecution. This fascinating story reads like a crime thriller, but also offers a wealth of information that can be used by IT professionals, business managers, lawyers and academics who wish to learn how to protect systems from abuse, and who want to respond appropriately to network incidents. They also provide insight into the hacker's world and explain how their own words and actions were used against them in a court of law - the evidence provided is in the raw, uncensored words of the hackers themselves. This is a multi-layered true crime story, a real-life law and order story that explains how hackers and computer thieves operate, how the FBI takes them down, and how the Department of Justice prosecutes them in the courtroom.

Cyber Security and Digital Forensics (Hardcover): MM Ghonge Cyber Security and Digital Forensics (Hardcover)
MM Ghonge
R5,233 Discovery Miles 52 330 Ships in 12 - 17 working days

CYBER SECURITY AND DIGITAL FORENSICS Cyber security is an incredibly important issue that is constantly changing, with new methods, processes, and technologies coming online all the time. Books like this are invaluable to professionals working in this area, to stay abreast of all of these changes. Current cyber threats are getting more complicated and advanced with the rapid evolution of adversarial techniques. Networked computing and portable electronic devices have broadened the role of digital forensics beyond traditional investigations into computer crime. The overall increase in the use of computers as a way of storing and retrieving high-security information requires appropriate security measures to protect the entire computing and communication scenario worldwide. Further, with the introduction of the internet and its underlying technology, facets of information security are becoming a primary concern to protect networks and cyber infrastructures from various threats. This groundbreaking new volume, written and edited by a wide range of professionals in this area, covers broad technical and socio-economic perspectives for the utilization of information and communication technologies and the development of practical solutions in cyber security and digital forensics. Not just for the professional working in the field, but also for the student or academic on the university level, this is a must-have for any library. Audience: Practitioners, consultants, engineers, academics, and other professionals working in the areas of cyber analysis, cyber security, homeland security, national defense, the protection of national critical infrastructures, cyber-crime, cyber vulnerabilities, cyber-attacks related to network systems, cyber threat reduction planning, and those who provide leadership in cyber security management both in public and private sectors

Managing Cybersecurity in the Process Industries: A Risk-based Approach (Hardcover): Ccps Managing Cybersecurity in the Process Industries: A Risk-based Approach (Hardcover)
Ccps
R3,874 Discovery Miles 38 740 Ships in 12 - 17 working days

The chemical process industry is a rich target for cyber attackers who are intent on causing harm. Current risk management techniques are based on the premise that events are initiated by a single failure and the succeeding sequence of events is predictable. A cyberattack on the Safety, Controls, Alarms, and Interlocks (SCAI) undermines this basic assumption. Each facility should have a Cybersecurity Policy, Implementation Plan and Threat Response Plan in place. The response plan should address how to bring the process to a safe state when controls and safety systems are compromised. The emergency response plan should be updated to reflect different actions that may be appropriate in a sabotage situation. IT professionals, even those working at chemical facilities are primarily focused on the risk to business systems. This book contains guidelines for companies on how to improve their process safety performance by applying Risk Based Process Safety (RBPS) concepts and techniques to the problem of cybersecurity.

Digital Forensics (Paperback): A Arnes Digital Forensics (Paperback)
A Arnes
R1,910 Discovery Miles 19 100 Ships in 12 - 17 working days

The definitive text for students of digital forensics, as well as professionals looking to deepen their understanding of an increasingly critical field Written by faculty members and associates of the world-renowned Norwegian Information Security Laboratory (NisLab) at the Norwegian University of Science and Technology (NTNU), this textbook takes a scientific approach to digital forensics ideally suited for university courses in digital forensics and information security. Each chapter was written by an accomplished expert in his or her field, many of them with extensive experience in law enforcement and industry. The author team comprises experts in digital forensics, cybercrime law, information security and related areas. Digital forensics is a key competency in meeting the growing risks of cybercrime, as well as for criminal investigation generally. Considering the astonishing pace at which new information technology and new ways of exploiting information technology is brought on line, researchers and practitioners regularly face new technical challenges, forcing them to continuously upgrade their investigatory skills. Designed to prepare the next generation to rise to those challenges, the material contained in Digital Forensics has been tested and refined by use in both graduate and undergraduate programs and subjected to formal evaluations for more than ten years. * Encompasses all aspects of the field, including methodological, scientific, technical and legal matters * Based on the latest research, it provides novel insights for students, including an informed look at the future of digital forensics * Includes test questions from actual exam sets, multiple choice questions suitable for online use and numerous visuals, illustrations and case example images * Features real-word examples and scenarios, including court cases and technical problems, as well as a rich library of academic references and references to online media Digital Forensics is an excellent introductory text for programs in computer science and computer engineering and for master degree programs in military and police education. It is also a valuable reference for legal practitioners, police officers, investigators, and forensic practitioners seeking to gain a deeper understanding of digital forensics and cybercrime.

Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.): David Sutton Cyber Security - The complete guide to cyber threats and protection (Paperback, 2nd ed.)
David Sutton
R899 Discovery Miles 8 990 Ships in 9 - 15 working days
Introduction to Cryptography (Hardcover): Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat Introduction to Cryptography (Hardcover)
Sahadeo Padhye, Rajeev A. Sahu, Vishal Saraswat
R4,503 Discovery Miles 45 030 Ships in 12 - 17 working days

Electronic communication and financial transactions have assumed massive proportions today. But they come with high risks. Achieving cyber security has become a top priority, and has become one of the most crucial areas of study and research in IT. This book introduces readers to perhaps the most effective tool in achieving a secure environment, i.e. cryptography. This book offers more solved examples than most books on the subject, it includes state of the art topics and discusses the scope of future research.

Grokking Bitcoin (Paperback): Kalle Rosenbaum Grokking Bitcoin (Paperback)
Kalle Rosenbaum; Foreword by David A. Harding
R988 R905 Discovery Miles 9 050 Save R83 (8%) Ships in 12 - 17 working days

If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership.

With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain.

Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.

Blockchain and the Law - The Rule of Code (Paperback): Primavera de Filippi, Aaron Wright Blockchain and the Law - The Rule of Code (Paperback)
Primavera de Filippi, Aaron Wright
R555 R510 Discovery Miles 5 100 Save R45 (8%) Ships in 12 - 17 working days

"Blockchains will matter crucially; this book, beautifully and clearly written for a wide audience, powerfully demonstrates how." -Lawrence Lessig "Attempts to do for blockchain what the likes of Lawrence Lessig and Tim Wu did for the Internet and cyberspace-explain how a new technology will upend the current legal and social order... Blockchain and the Law is not just a theoretical guide. It's also a moral one." -Fortune Bitcoin has been hailed as an Internet marvel and decried as the preferred transaction vehicle for criminals. It has left nearly everyone without a computer science degree confused: how do you "mine" money from ones and zeros? The answer lies in a technology called blockchain. A general-purpose tool for creating secure, decentralized, peer-to-peer applications, blockchain technology has been compared to the Internet in both form and impact. Blockchains are being used to create "smart contracts," to expedite payments, to make financial instruments, to organize the exchange of data and information, and to facilitate interactions between humans and machines. But by cutting out the middlemen, they run the risk of undermining governmental authorities' ability to supervise activities in banking, commerce, and the law. As this essential book makes clear, the technology cannot be harnessed productively without new rules and new approaches to legal thinking. "If you...don't 'get' crypto, this is the book-length treatment for you." -Tyler Cowen, Marginal Revolution "De Filippi and Wright stress that because blockchain is essentially autonomous, it is inflexible, which leaves it vulnerable, once it has been set in motion, to the sort of unforeseen consequences that laws and regulations are best able to address." -James Ryerson, New York Times Book Review

Advances of DNA Computing in Cryptography (Hardcover): Suyel Namasudra, Ganesh Chandra Deka Advances of DNA Computing in Cryptography (Hardcover)
Suyel Namasudra, Ganesh Chandra Deka
R3,917 Discovery Miles 39 170 Ships in 12 - 17 working days

This book discusses the current technologies of cryptography using DNA computing. Various chapters of the book will discuss the basic concepts of cryptography, steganography, basic concepts of DNA and DNA computing, approaches of DNA computing in cryptography, security attacks, practical implementaion of DNA computing, applications of DNA computing in the cloud computing environment, applications of DNA computing for big data, etc. It provides a judicious mix of concepts, solved examples and real life case studies.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cryptography - Theory and Practice
Douglas Robert Stinson, Maura Paterson Paperback R1,410 Discovery Miles 14 100
Threat Hunting in the Cloud - Defending…
C Peiris Paperback R879 Discovery Miles 8 790
Rethinking the Regulation of…
Syren Johnstone Hardcover R3,296 Discovery Miles 32 960
Cybersecurity Law, Third Edition
J Kosseff Hardcover R2,618 Discovery Miles 26 180
Official (ISC)2 (R) Guide to the CISSP…
Susan Hansche Hardcover R2,663 Discovery Miles 26 630
CSS in easy steps
Mike McGrath Paperback R420 R336 Discovery Miles 3 360
Heterogeneous Cyber Physical Systems of…
Ioannis Papaefstathiou, Alkis Hatzopoulos Hardcover R2,842 Discovery Miles 28 420
The Political Economy and Feasibility of…
Spencer J. Pack Hardcover R2,851 Discovery Miles 28 510
Information Warfare
William Hutchinson, Matthew Warren Paperback R1,649 Discovery Miles 16 490
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,190 R1,070 Discovery Miles 10 700

 

Partners