0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (1,327)
  • R250 - R500 (574)
  • R500+ (4,435)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition): David L Cannon, Brian T. O'Hara, Allen... CISA Certified Information Systems Auditor Study Guide (Paperback, 4th Edition)
David L Cannon, Brian T. O'Hara, Allen Keele
R1,521 R995 Discovery Miles 9 950 Save R526 (35%) Ships in 10 - 15 working days

The ultimate CISA prep guide, with practice exams Sybex's CISA: Certified Information Systems Auditor Study Guide, Fourth Edition is the newest edition of industry-leading study guide for the Certified Information System Auditor exam, fully updated to align with the latest ISACA standards and changes in IS auditing. This new edition provides complete guidance toward all content areas, tasks, and knowledge areas of the exam and is illustrated with real-world examples. All CISA terminology has been revised to reflect the most recent interpretations, including 73 definition and nomenclature changes. Each chapter summary highlights the most important topics on which you'll be tested, and review questions help you gauge your understanding of the material. You also get access to electronic flashcards, practice exams, and the Sybex test engine for comprehensively thorough preparation. For those who audit, control, monitor, and assess enterprise IT and business systems, the CISA certification signals knowledge, skills, experience, and credibility that delivers value to a business. This study guide gives you the advantage of detailed explanations from a real-world perspective, so you can go into the exam fully prepared. * Discover how much you already know by beginning with an assessment test * Understand all content, knowledge, and tasks covered by the CISA exam * Get more in-depths explanation and demonstrations with an all-new training video * Test your knowledge with the electronic test engine, flashcards, review questions, and more The CISA certification has been a globally accepted standard of achievement among information systems audit, control, and security professionals since 1978. If you're looking to acquire one of the top IS security credentials, CISA is the comprehensive study guide you need.

Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback): Brad Smith, Carol Ann Browne Tools And Weapons - The Promise And The Peril Of The Digital Age (Paperback)
Brad Smith, Carol Ann Browne; Foreword by Bill Gates 1
R355 R284 Discovery Miles 2 840 Save R71 (20%) Ships in 5 - 10 working days

*THE INSTANT NEW YORK TIMES BESTSELLER AND WORLD ECONOMIC FORUM BOOK CLUB PICK*

'A clear, compelling guide to some of the most pressing debates in technology today.' Bill Gates, from the foreword

'The de facto ambassador for the technology industry at large.' The New York Times

'One of the few executives willing to speak openly about the industry's most vexing issues.' Sunday Times

Microsoft President Brad Smith operates by a simple core belief: when your technology changes the world, you bear a responsibility to help address the world you have helped create.

This might seem uncontroversial, but it flies in the face of a tech sector long obsessed with rapid growth and sometimes on disruption as an end in itself. While sweeping digital transformation holds great promise, we have reached an inflection point. The world has turned information technology into both a powerful tool and a formidable weapon, and new approaches are needed to manage an era defined by even more powerful inventions like artificial intelligence. Companies that create technology must accept greater responsibility for the future, and governments will need to regulate technology by moving faster and catching up with the pace of innovation.

In Tools and Weapons, Brad Smith and Carol Ann Browne bring us a captivating narrative from the cockpit of one of the world's largest and most powerful tech companies as it finds itself in the middle of some of the thorniest emerging issues of our time. These are challenges that come with no pre-existing playbook, including privacy, cybercrime and cyberwar, social media, the moral conundrums of artificial intelligence, big tech's relationship to inequality, and the challenges for democracy, far and near. While in no way a self-glorifying "Microsoft memoir," the book pulls back the curtain remarkably wide onto some of the company's most crucial recent decision points as it strives to protect the hopes technology offers against the very real threats it also presents. There are huge ramifications for communities and countries, and Brad Smith provides a thoughtful and urgent contribution to that effort.

From Microsoft's President and one of the tech industry's wisest thinkers, a frank and thoughtful reckoning with how to balance enormous promise and existential risk as the digitization of everything accelerates.

In Tools and Weapons, Brad Smith takes us behind the scenes on some of the biggest stories to hit the tech industry in the past decade and some of the biggest threats we face. From Edward Snowden's NSA leak to the NHS WannaCry ransomware attack, this book is essential reading to understand what's happening in the world around us.

If you watched Inside Bill's Brain: Decoding Bill Gates on Netflix, you will find Tools and Weapons equally fascinating.

'This is a colourful and insightful insiders' view of how technology is both empowering us and threatening us. From privacy to cyberattacks, this timely book is a useful guide for how to navigate the digital future.' Walter Isaacson, bestselling author of Steve Jobs

Guide to Network Defense and Countermeasures (Paperback, 3rd edition): Randy Weaver, Dean Farwood, Dawn Weaver Guide to Network Defense and Countermeasures (Paperback, 3rd edition)
Randy Weaver, Dean Farwood, Dawn Weaver
R1,237 R1,045 Discovery Miles 10 450 Save R192 (16%) Ships in 15 - 25 working days

GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES provides a thorough guide to perimeter defense fundamentals, including intrusion detection and firewalls. This trusted text also covers more advanced topics such as security policies, network address translation (NAT), packet filtering and analysis, proxy servers, virtual private networks (VPN), and network traffic signatures. Thoroughly updated, the new third edition reflects the latest technology, trends, and techniques including virtualization, VMware, IPv6, and ICMPv6 structure, making it easier for current and aspiring professionals to stay on the cutting edge and one step ahead of potential security threats. A clear writing style and numerous screenshots and illustrations make even complex technical material easier to understand, while tips, activities, and projects throughout the text allow you to hone your skills by applying what you learn. Perfect for students and professionals alike in this high-demand, fast-growing field, GUIDE TO NETWORK DEFENSE AND COUNTERMEASURES, Third Edition, is a must-have resource for success as a network security professional.

Dark Mirror - Edward Snowden and the American Surveillance State (Hardcover): Barton Gellman Dark Mirror - Edward Snowden and the American Surveillance State (Hardcover)
Barton Gellman
R708 R559 Discovery Miles 5 590 Save R149 (21%) Ships in 7 - 11 working days
Wtf Is My Password - Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to... Wtf Is My Password - Password Book, Password Log Book and Internet Password Organizer, Alphabetical Password Book, Logbook to Protect Usernames and Passwords, Password Notebook, Password Book Small 6 X 9 (Paperback)
Booki Nova
R132 Discovery Miles 1 320 Ships in 7 - 11 working days
Hacking Exposed Computer Forensics (Hardcover, 2nd ed.): Aaron Philipp Hacking Exposed Computer Forensics (Hardcover, 2nd ed.)
Aaron Philipp
R1,832 R1,383 Discovery Miles 13 830 Save R449 (25%) Ships in 7 - 11 working days
The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws (Paperback, 2nd Edition): Dafydd Stuttard,... The Web Application Hacker's Handbook - Finding and Exploiting Security Flaws (Paperback, 2nd Edition)
Dafydd Stuttard, Marcus Pinto
R1,245 R751 Discovery Miles 7 510 Save R494 (40%) Ships in 10 - 15 working days

The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. * Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition * Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more * Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws. Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

Password Book - Logbook to keep track of usernames, passwords and related details (Paperback): Imaginary Planet Publishing Password Book - Logbook to keep track of usernames, passwords and related details (Paperback)
Imaginary Planet Publishing
R180 Discovery Miles 1 800 Ships in 7 - 11 working days
Social Engineering - The Science of Human Hacking (Paperback, 2nd Edition): Christopher Hadnagy Social Engineering - The Science of Human Hacking (Paperback, 2nd Edition)
Christopher Hadnagy
R844 R507 Discovery Miles 5 070 Save R337 (40%) Ships in 10 - 15 working days

Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire--why hack into something when you could just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Intelligence-Driven Incident Response (Paperback): Scott Roberts, Rebekah Brown Intelligence-Driven Incident Response (Paperback)
Scott Roberts, Rebekah Brown
R1,482 R853 Discovery Miles 8 530 Save R629 (42%) Ships in 10 - 15 working days

Using a well-conceived incident response plan in the aftermath of an online security breach enables your team to identify attackers and learn how they operate. But, only when you approach incident response with a cyber threat intelligence mindset will you truly understand the value of that information. With this practical guide, you'll learn the fundamentals of intelligence analysis, as well as the best ways to incorporate these techniques into your incident response process. Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship. In three parts, this in-depth book includes: The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process-Find, Fix Finish, Exploit, Analyze, and Disseminate The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building

RTFM - Red Team Field Manual (Paperback): Ben Clark RTFM - Red Team Field Manual (Paperback)
Ben Clark
R227 Discovery Miles 2 270 Ships in 7 - 11 working days
Codes, Cryptology and Curves with Computer Algebra (Paperback): Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius Codes, Cryptology and Curves with Computer Algebra (Paperback)
Ruud Pellikaan, Xin-Wen Wu, Stanislav Bulygin, Relinde Jurrius
R1,321 Discovery Miles 13 210 Ships in 10 - 15 working days

This well-balanced text touches on theoretical and applied aspects of protecting digital data. The reader is provided with the basic theory and is then shown deeper fascinating detail, including the current state of the art. Readers will soon become familiar with methods of protecting digital data while it is transmitted, as well as while the data is being stored. Both basic and advanced error-correcting codes are introduced together with numerous results on their parameters and properties. The authors explain how to apply these codes to symmetric and public key cryptosystems and secret sharing. Interesting approaches based on polynomial systems solving are applied to cryptography and decoding codes. Computer algebra systems are also used to provide an understanding of how objects introduced in the book are constructed, and how their properties can be examined. This book is designed for Masters-level students studying mathematics, computer science, electrical engineering or physics.

Adversarial Machine Learning (Hardcover): Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar Adversarial Machine Learning (Hardcover)
Anthony D. Joseph, Blaine Nelson, Benjamin I. P. Rubinstein, J. D. Tygar
R2,001 R1,684 Discovery Miles 16 840 Save R317 (16%) Ships in 10 - 15 working days

Written by leading researchers, this complete introduction brings together all the theory and tools needed for building robust machine learning in adversarial environments. Discover how machine learning systems can adapt when an adversary actively poisons data to manipulate statistical inference, learn the latest practical techniques for investigating system security and performing robust data analysis, and gain insight into new approaches for designing effective countermeasures against the latest wave of cyber-attacks. Privacy-preserving mechanisms and the near-optimal evasion of classifiers are discussed in detail, and in-depth case studies on email spam and network security highlight successful attacks on traditional machine learning algorithms. Providing a thorough overview of the current state of the art in the field, and possible future directions, this groundbreaking work is essential reading for researchers, practitioners and students in computer security and machine learning, and those wanting to learn about the next stage of the cybersecurity arms race.

Linux Server Security - Hack and Defend (Paperback): Chris Binnie Linux Server Security - Hack and Defend (Paperback)
Chris Binnie
R1,024 R945 Discovery Miles 9 450 Save R79 (8%) Ships in 10 - 15 working days

Learn how to attack and defend the world s most popular web server platform Linux Server Security: Hack and Defend presents a detailed guide for experienced admins, aspiring hackers and other IT professionals seeking a more advanced understanding of Linux security. Written by a 20-year veteran of Linux server deployment this book provides the insight of experience along with highly practical instruction. The topics range from the theory of past, current, and future attacks, to the mitigation of a variety of online attacks, all the way to empowering you to perform numerous malicious attacks yourself (in the hope that you will learn how to defend against them). By increasing your understanding of a hacker s tools and mindset you're less likely to be confronted by the all-too-common reality faced by many admins these days: someone else has control of your systems. * Master hacking tools and launch sophisticated attacks: perform SQL injections, deploy multiple server exploits and crack complex passwords. * Defend systems and networks: make your servers invisible, be confident of your security with penetration testing and repel unwelcome attackers. * Increase your background knowledge of attacks on systems and networks and improve all-important practical skills required to secure any Linux server. The techniques presented apply to almost all Linux distributions including the many Debian and Red Hat derivatives and some other Unix-type systems. Further your career with this intriguing, deeply insightful, must-have technical book. Diverse, broadly-applicable and hands-on practical, Linux Server Security: Hack and Defend is an essential resource which will sit proudly on any techie's bookshelf.

(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd... (ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd Edition)
Mike Chapple, David Seidl, James Michael. Stewart, Darril Gibson
R2,036 R1,355 Discovery Miles 13 550 Save R681 (33%) Ships in 10 - 15 working days

This value-packed packed set for the serious CISSP certification candidate combines the bestselling (ISC)(2) CISSP Certified Information Systems Security Professional Official Study Guide, 8th Edition with an all new collection of Practice Exams to give you the best preparation ever for the high-stakes CISSP Exam. (ISC)(2) CISSP Study Guide, 8th Edition has been completely updated for the latest 2018 CISSP Body of Knowledge. This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes four unique 250 question practice exams to help you identify where you need to study more, more than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam, a searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Add to that the all-new (ISC)(2) CISSP Certified Information Systems Security Professional Official Practice Tests, 2nd edition with 2 more complete 250-question exams and another 100 questions for each of the 8 domains and you'll be as ready as you can be for the CISSP exam. Coverage of all of the exam topics in each book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Hardcover): Keith Martin Cryptography - The Key to Digital Security, How It Works, and Why It Matters (Hardcover)
Keith Martin
R660 R523 Discovery Miles 5 230 Save R137 (21%) Ships in 7 - 11 working days

Though often invisible, cryptography plays a critical role in our everyday lives. Broadly defined as a set of tools for establishing security in cyberspace, cryptography enables us to protect our information and share it securely. It underpins the security of mobile phone calls, card payments, web connections, internet messaging, Bitcoin transactions-in short, everything we do online. Clearly and concisely, Keith Martin reveals the many crucial ways we all rely on cryptographic technology and demystifies its controversial applications and the nuances behind alarming headlines about data breaches or Edward Snowden. Essential reading for anyone with a password, Cryptography offers a profound perspective on personal security, online and off.

Dark Mirror - Edward Snowden and the American Surveillance State (Large print, Paperback, Large type / large print edition):... Dark Mirror - Edward Snowden and the American Surveillance State (Large print, Paperback, Large type / large print edition)
Barton Gellman
R758 R597 Discovery Miles 5 970 Save R161 (21%) Ships in 7 - 11 working days
Online Security for the Older Generation (Paperback): Jim Gatenby Online Security for the Older Generation (Paperback)
Jim Gatenby
R286 R187 Discovery Miles 1 870 Save R99 (35%) Ships in 10 - 15 working days
Information Theoretic Security and Privacy of Information Systems (Hardcover): Holger Boche, H. Vincent Poor Information Theoretic Security and Privacy of Information Systems (Hardcover)
Holger Boche, H. Vincent Poor
R2,733 R2,563 Discovery Miles 25 630 Save R170 (6%) Ships in 10 - 15 working days

Gain a solid understanding of how information theoretic approaches can inform the design of more secure information systems and networks with this authoritative text. With a particular focus on theoretical models and analytical results, leading researchers show how techniques derived from the principles of source and channel coding can provide new ways of addressing issues of data security, embedded security, privacy, and authentication in modern information systems. A wide range of wireless and cyber-physical systems is considered, including 5G cellular networks, the Tactile Internet, biometric identification systems, online data repositories, and smart electricity grids. This is an invaluable guide for both researchers and graduate students working in communications engineering, and industry practitioners and regulators interested in improving security in the next generation of information systems.

The Official (ISC)2 Guide to the CISSP CBK Reference (Hardcover, 5th Edition): John Warsinske, Mark Graff, Kevin Henry,... The Official (ISC)2 Guide to the CISSP CBK Reference (Hardcover, 5th Edition)
John Warsinske, Mark Graff, Kevin Henry, Christopher Hoover, Ben Malisow, …
R1,971 R1,790 Discovery Miles 17 900 Save R181 (9%) Ships in 10 - 15 working days

The only official, comprehensive reference guide to the CISSP All new for 2019 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the new eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Written by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether youve earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.

#deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD): Allum Bokhari #deleted - Big Tech's Battle to Erase the Trump Movement and Steal the Election (Standard format, CD)
Allum Bokhari
R899 R637 Discovery Miles 6 370 Save R262 (29%) Ships in 7 - 11 working days
Network Attacks and Exploitation - A Framework (Paperback): Matthew Monte Network Attacks and Exploitation - A Framework (Paperback)
Matthew Monte
R956 R887 Discovery Miles 8 870 Save R69 (7%) Ships in 10 - 15 working days

Incorporate offense and defense for a more effective network security strategy Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate vulnerability and security operations, this guide helps you understand the principles of the space and look beyond the individual technologies of the moment to develop durable comprehensive solutions. Numerous real-world examples illustrate the offensive and defensive concepts at work, including Conficker, Stuxnet, the Target compromise, and more. You will find clear guidance toward strategy, tools, and implementation, with practical advice on blocking systematic computer espionage and the theft of information from governments, companies, and individuals. Assaults and manipulation of computer networks are rampant around the world. One of the biggest challenges is fitting the ever-increasing amount of information into a whole plan or framework to develop the right strategies to thwart these attacks. This book clears the confusion by outlining the approaches that work, the tools that work, and resources needed to apply them. * Understand the fundamental concepts of computer network exploitation * Learn the nature and tools of systematic attacks * Examine offensive strategy and how attackers will seek to maintain their advantage * Understand defensive strategy, and how current approaches fail to change the strategic balance Governments, criminals, companies, and individuals are all operating in a world without boundaries, where the laws, customs, and norms previously established over centuries are only beginning to take shape. Meanwhile computer espionage continues to grow in both frequency and impact. This book will help you mount a robust offense or a strategically sound defense against attacks and exploitation. For a clear roadmap to better network security, Network Attacks and Exploitation is your complete and practical guide.

CompTIA CySA+ Practice Tests - Exam CS0-001 (Paperback): Mike Chapple, David Seidl CompTIA CySA+ Practice Tests - Exam CS0-001 (Paperback)
Mike Chapple, David Seidl
R998 R588 Discovery Miles 5 880 Save R410 (41%) Ships in 10 - 15 working days

1,000 practice questions for smart CompTIA CySA+ preparation CompTIA CySA+ Practice Tests provides invaluable preparation for the Cybersecurity Analyst exam CS0-001. With 1,000 questions covering 100% of the exam objectives, this book offers a multitude of opportunities for the savvy CySA+ candidate. Prepare more efficiently by working through questions before you begin studying, to find out what you already knowand focus study time only on what you don't. Test yourself periodically to gauge your progress along the way, and finish up with a 'dry-run' of the exam to avoid surprises on the big day. These questions are organized into four full-length tests, plus two bonus practice exams that show you what to expect and help you develop your personal test-taking strategy. Each question includes full explanations to help you understand the reasoning and approach, and reduces the chance of making the same error twice. The CySA+ exam tests your knowledge and skills related to threat management, vulnerability management, cyber incident response, and security architecture and tools. You may think you're prepared, but are you absolutely positive? This book gives you an idea of how you are likely to perform on the actual examwhile there's still time to review. Test your understanding of all CySA+ exam domains Pinpoint weak areas in need of review Assess your level of knowledge before planning your study time Learn what to expect on exam day The CompTIA CySA+ certification validates your skill set in the cybersecurity arena. As security becomes more and more critical, the demand for qualified professionals will only rise. CompTIA CySA+ Practice Tests is an invaluable tool for the comprehensive Cybersecurity Analyst preparation that helps you earn that career-making certification.

Cyber Attack (Hardcover): Paul Day Cyber Attack (Hardcover)
Paul Day
R488 R319 Discovery Miles 3 190 Save R169 (35%) Ships in 10 - 15 working days

There are an estimated 8.7 billion devices currently connected to the Internet - and each one is a threat to its owner. Computers and computer systems rule our lives, and it is impossible to imagine life without them. But as society has become evermore dependent, both economically and politically, on the electronic flow of information, it has made us vulnerable to the real and destabilizing threat of cyber attack - the extremes of which could see us having to exist without power, vital resources and communications. Confronting this terrifying reality, Cyber Attack explores the digital dangers we face and examines the extremes they could reach. The book also investigates who is responsible and what can be done to protect us. Cyber Attack is written by bestselling author Paul Day, a former hacker turned leading computer security expert, and covers all areas of digital menace. What you learn in this book will make you think again next time you make an online transaction or send sensitive information from your smart phone. "The extent of what is going on is astonishing - with industrial size processes involving many thousands of people lying behind state-sponsored cyber espionage and organised cyber crime" Jonathan Evans, former Director General of MI5.

Tribe of Hackers - Cybersecurity Advice from the Best Hackers in the World (Paperback): Marcus J. Carey, Jennifer Jin Tribe of Hackers - Cybersecurity Advice from the Best Hackers in the World (Paperback)
Marcus J. Carey, Jennifer Jin
R532 R379 Discovery Miles 3 790 Save R153 (29%) Ships in 10 - 15 working days

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781119643371) was previously published as Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World (9781793464187). While this version features a new cover design and introduction, the remaining content is the same as the prior release and should not be considered a new or updated product. Looking for real-world advice from leading cybersecurity experts? You've found your tribe. Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you're just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street. Get the scoop on the biggest cybersecurity myths and misconceptions about security Learn what qualities and credentials you need to advance in the cybersecurity field Uncover which life hacks are worth your while Understand how social media and the Internet of Things has changed cybersecurity Discover what it takes to make the move from the corporate world to your own cybersecurity venture Find your favorite hackers online and continue the conversation Tribe of Hackers is a must-have resource for security professionals who are looking to advance their careers, gain a fresh perspective, and get serious about cybersecurity with thought-provoking insights from the world's most noteworthy hackers and influential security specialists.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Art of Deception - Controlling the…
Kevin D. Mitnick, William L Simon Paperback R341 R222 Discovery Miles 2 220
Advanced Penetration Testing - Hacking…
Wil Allsopp Paperback R1,173 R691 Discovery Miles 6 910
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R142 Discovery Miles 1 420
Cybersecurity Essentials
Charles J. Brooks, Christopher Grow, … Paperback R1,012 R616 Discovery Miles 6 160
SAP HANA 2.0 Security Guide
Jonathan Haun Hardcover R2,048 R1,532 Discovery Miles 15 320
How to Measure Anything in Cybersecurity…
Douglas W Hubbard, Richard Seiersen Hardcover R1,309 R1,068 Discovery Miles 10 680
CASP+ CompTIA Advanced Security…
Jeff T Parker, Michael Gregg Paperback R1,343 R894 Discovery Miles 8 940
Handbook on Data Centers
Samee U. Khan, Albert Y. Zomaya Hardcover R6,752 R5,296 Discovery Miles 52 960
Computer Networking for LANS to WANS…
James Antonakos, Kenneth Mansfield, Jr. Paperback R1,081 R925 Discovery Miles 9 250
Critical Infrastructure Protection VIII…
Jonathan Butts, Sujeet Shenoi Hardcover R2,257 R2,077 Discovery Miles 20 770

 

Partners