0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,156)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Blockchain: Empowering Digital Economy (Hardcover): Yang Yan, Bin Wang, Jun Zou Blockchain: Empowering Digital Economy (Hardcover)
Yang Yan, Bin Wang, Jun Zou
R2,148 Discovery Miles 21 480 Ships in 18 - 22 working days

Big data has been upgraded to our national strategy and has become a catalyst for national and local economic development. With the further promotion of big data and artificial intelligence (AI), the new business model needs to optimize and upgrade. The integration of the blockchain industry will fully implement the digital China strategy and promote the application of big data in China.This unique compendium gives a comprehensive understanding of the blockchain content through the path of technological innovation. It enables readers to fully understand the role of blockchain in promoting the digital economy.The volume will be a useful reference guide for relevant personnel in state ministries and commissions, state-owned enterprises, big data, AI, as well as teachers, researchers and students in higher education institutions.

Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso Management... Cyber Warfare and Terrorism - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,327 Discovery Miles 103 270 Ships in 18 - 22 working days
Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Hardcover)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R5,529 Discovery Miles 55 290 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

HCI Challenges and Privacy Preservation in Big Data Security (Hardcover): Daphne Lopez, M.A. Saleem Durai HCI Challenges and Privacy Preservation in Big Data Security (Hardcover)
Daphne Lopez, M.A. Saleem Durai
R5,287 Discovery Miles 52 870 Ships in 18 - 22 working days

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover): Victor Lobo, Anacleto Correia Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity (Hardcover)
Victor Lobo, Anacleto Correia
R6,167 Discovery Miles 61 670 Ships in 18 - 22 working days

The growth of innovative cyber threats, many based on metamorphosing techniques, has led to security breaches and the exposure of critical information in sites that were thought to be impenetrable. The consequences of these hacking actions were, inevitably, privacy violation, data corruption, or information leaking. Machine learning and data mining techniques have significant applications in the domains of privacy protection and cybersecurity, including intrusion detection, authentication, and website defacement detection, that can help to combat these breaches. Applications of Machine Learning and Deep Learning for Privacy and Cybersecurity provides machine and deep learning methods for analysis and characterization of events regarding privacy and anomaly detection as well as for establishing predictive models for cyber attacks or privacy violations. It provides case studies of the use of these techniques and discusses the expected future developments on privacy and cybersecurity applications. Covering topics such as behavior-based authentication, machine learning attacks, and privacy preservation, this book is a crucial resource for IT specialists, computer engineers, industry professionals, privacy specialists, security professionals, consultants, researchers, academicians, and students and educators of higher education.

Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover): Suhasini Verma, Vidhisha Vyas, Keshav Kaushik Cybersecurity Issues, Challenges, and Solutions in the Business World (Hardcover)
Suhasini Verma, Vidhisha Vyas, Keshav Kaushik
R6,597 Discovery Miles 65 970 Ships in 18 - 22 working days

Cybersecurity threats have become ubiquitous and continue to topple every facet of the digital realm as they are a problem for anyone with a gadget or hardware device. However, there are some actions and safeguards that can assist in avoiding these threats and challenges; further study must be done to ensure businesses and users are aware of the current best practices. Cybersecurity Issues, Challenges, and Solutions in the Business World considers cybersecurity innovation alongside the methods and strategies for its joining with the business industry and discusses pertinent application zones such as smart city, e-social insurance, shrewd travel, and more. Covering key topics such as blockchain, data mining, privacy, security issues, and social media, this reference work is ideal for security analysts, forensics experts, business owners, computer scientists, policymakers, industry professionals, researchers, scholars, academicians, practitioners, instructors, and students.

CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition): M. Chapple CompTIA Security+ Practice Tests - Exam SY0-601 (Paperback, 2nd Edition)
M. Chapple
R960 R828 Discovery Miles 8 280 Save R132 (14%) Ships in 18 - 22 working days

Get ready for a career in IT security and efficiently prepare for the SY0-601 exam with a single, comprehensive resource CompTIA Security+ Practice Tests: Exam SY0-601, Second Edition efficiently prepares you for the CompTIA Security+ SY0-601 Exam with one practice exam and domain-by-domain questions. With a total of 1,000 practice questions, you'll be as prepared as possible to take Exam SY0-601. Written by accomplished author and IT security expert David Seidl, the 2nd Edition of CompTIA Security+ Practice Tests includes questions covering all five crucial domains and objectives on the SY0-601 exam: Attacks, Threats, and Vulnerabilities Architecture and Design Implementation Operations and Incident Response Governance, Risk, and Compliance Perfect for anyone looking to prepare for the SY0-601 Exam, upgrade their skills by earning a high-level security certification (like CASP+, CISSP, or CISA), as well as anyone hoping to get into the IT security field, CompTIA Security+ Practice Tests allows for efficient and comprehensive preparation and study.

System Assurance - Beyond Detecting Vulnerabilities (Paperback): Nikolai Mansourov, Djenana Campara System Assurance - Beyond Detecting Vulnerabilities (Paperback)
Nikolai Mansourov, Djenana Campara
R1,452 Discovery Miles 14 520 Ships in 10 - 15 working days

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion.

System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance, the book teaches you how to use the Object Management Group s (OMG) expertise and unique standards to obtain accurate knowledge about your existing software and compose objective metrics for system assurance. OMG s Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about your existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, you will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect your system.
Provides end-to-end methodology for systematic, repeatable, and affordable System Assurance.Includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture and code analysis guided by the assurance argument.Case Study illustrating the steps of the System Assurance Methodology using automated tools."

Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover): Kavita Sharma, Mitsunori Makino,... Forensic Investigations and Risk Management in Mobile and Wireless Communications (Hardcover)
Kavita Sharma, Mitsunori Makino, Gulshan Shrivastava, Basant Agarwal
R5,331 Discovery Miles 53 310 Ships in 18 - 22 working days

Mobile forensics has grown from a relatively obscure tradecraft to a crucial part of many criminal investigations, and is now used daily by examiners and analysts within local, state, and federal law enforcement as well as within the military, US government organizations, and the private "e-Discovery" industry. Developments in forensic research, tools, and processes over the past decade have been very successful and continue to change at a rapid pace. Forensic Investigations and Risk Management in Mobile and Wireless Communications is a collection of innovative research on the methods and applications of analyzing mobile devices and data for collection of information pertaining to the legal evidence related to various security breaches and intrusion detection. While highlighting topics including cybercrime, neural networks, and smartphone security, this book is ideally designed for security analysts, IT professionals, researchers, practitioners, academicians, and students currently investigating the up-and-coming aspects surrounding network security, computer science, and security engineering.

Advanced Security and Privacy for RFID Technologies (Hardcover, New): Ali Miri Advanced Security and Privacy for RFID Technologies (Hardcover, New)
Ali Miri
R4,898 Discovery Miles 48 980 Ships in 18 - 22 working days

While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for RFID Technologies addresses these concerns with its comprehensive coverage on current issues with security models and everyday threats and vulnerabilities. This informative publication not only addresses the security risks involved with RFID technologies, but also gives insight on some possible solutions and preventions. Researchers, professionals, and practitioners aiming to better understand the risks involved with these developing technologies will benefit from this book s expansive coverage on the topic.

Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the... Blockchain - An Essential Beginner's Guide to Understanding Blockchain Technology, Cryptocurrencies, Bitcoin and the Future of Money (Hardcover)
Herbert Jones
R656 R585 Discovery Miles 5 850 Save R71 (11%) Ships in 18 - 22 working days
Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback): Diane Barrett,... Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback)
Diane Barrett, Gregory Kipper
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.

Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover): Anargyros Chryssanthou,... Certification and Security in Health-Related Web Applications - Concepts and Solutions (Hardcover)
Anargyros Chryssanthou, Ioannis Apostolakis, Iraklis Varlamis
R6,136 Discovery Miles 61 360 Ships in 18 - 22 working days

Certification and Security in Health-Related Web Applications: Concepts and Solutions aims to bridge the worlds of healthcare and information technology, increase the security awareness of professionals, students and users and highlight the recent advances in certification and security in health-related Web applications.

Seven Deadliest Network Attacks (Paperback): Stacy Prowell, Rob Kraus, Mike Borkin Seven Deadliest Network Attacks (Paperback)
Stacy Prowell, Rob Kraus, Mike Borkin
R576 Discovery Miles 5 760 Ships in 10 - 15 working days

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. The book consists of seven chapters that deal with the following attacks: denial of service; war dialing; penetration testing; protocol tunneling; spanning tree attacks; man-in-the-middle; and password replay. These attacks are not mutually exclusive and were chosen because they help illustrate different aspects of network security. The principles on which they rely are unlikely to vanish any time soon, and they allow for the possibility of gaining something of interest to the attacker, from money to high-value data. This book is intended to provide practical, usable information. However, the world of network security is evolving very rapidly, and the attack that works today may (hopefully) not work tomorrow. It is more important, then, to understand the principles on which the attacks and exploits are based in order to properly plan either a network attack or a network defense. Seven Deadliest Network Attacks will appeal to information security professionals of all levels, network admins, and recreational hackers.

Safety and Security Engineering VIII (Hardcover): M Guarascio, G. Passerini, F. Garzia, M. Lombardi Safety and Security Engineering VIII (Hardcover)
M Guarascio, G. Passerini, F. Garzia, M. Lombardi
R2,117 Discovery Miles 21 170 Ships in 18 - 22 working days

In its 8th edition the SAFE conference continues to publish important research contributing to the development of the field. The papers included in this volume are the work of engineers, scientists, field researchers, managers and other specialists involved in one or more of the theoretical and practical aspects of safety and security. Safety and Security Engineering, due to its special nature, is an interdisciplinary area of research and application that brings together in a systematic way, many disciplines of engineering, from the traditional to the most technologically advanced. This volume covers topics such as crisis management, security engineering, natural and man-made disasters and emergencies, risk management, and control, protection and mitigation issues. Specific themes include: Risk analysis, assessment and management; System safety engineering; Incident monitoring; Information and communication security; Disaster management; Emergency response; Critical infrastructure protection; Counter terrorism issues; Human factors; Transportation safety and security; Modelling and experiments; Security surveillance systems; Loss prevention; BIM in Safety and Security.

Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Digital Triage Forensics - Processing the Digital Crime Scene (Paperback): Stephen Pearson, Richard Watson Digital Triage Forensics - Processing the Digital Crime Scene (Paperback)
Stephen Pearson, Richard Watson
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.

Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover): Mahmoud Eid Exchanging Terrorism Oxygen for Media Airwaves - The Age of Terroredia (Hardcover)
Mahmoud Eid
R4,959 Discovery Miles 49 590 Ships in 18 - 22 working days

Terroredia is a newly coined term by the editor, Dr. Mahmoud Eid, to explain the phenomenal, yet under-researched relationship between terrorists and media professionals in which acts of terrorism and media coverage are exchanged, influenced, and fueled by one another. Exchanging Terrorism Oxygen for Media Airwaves: The Age of Terroredia provides a timely and thorough discussion on a wide range of issues surrounding terrorism in relation to both traditional and new media. Comprised of insights and research from leading experts in the fields of terrorism and media studies, this publication presents various topics relating to Terroredia: understanding of terrorism and the role of the media, terrorism manifestations and media representations of terrorism, types of terrorism and media stereotypes of terrorism, terrorism tactics and media strategies, the war on terrorism, the function of terrorism and the employment of the media, new terrorism and new media, contemporary cases of terrorist-media interactions, the rationality behind terrorism and counterterrorism, as well as the responsibility of the media. This publication is of interest to government officials, media professionals, researchers, and upper-level students interested in learning more about the complex relationship between terrorism and the media.

Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R486 R411 Discovery Miles 4 110 Save R75 (15%) Ships in 10 - 15 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management... Security in Virtual Worlds, 3D Webs, and Immersive Environments - Models for Development, Interaction, and Management (Hardcover, New)
Alan Rea
R4,584 Discovery Miles 45 840 Ships in 18 - 22 working days

Security in Virtual Worlds, 3D Webs, and Immersive Environments: Models for Development, Interaction, and Management brings together the issues that managers, practitioners, and researchers must consider when planning, implementing, working within, and managing these promising virtual technologies for secure processes and initiatives. This publication discusses the uses and potential of these virtual technologies and examines secure policy formation and practices that can be applied specifically to each.

IT Security Governance Innovations - Theory and Research (Hardcover, New): Daniel Mellado, Luis Enrique Sanchez, Eduardo... IT Security Governance Innovations - Theory and Research (Hardcover, New)
Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.

Quantum Cryptography in Advanced Networks (Hardcover): Oleg G. Morozov Quantum Cryptography in Advanced Networks (Hardcover)
Oleg G. Morozov
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
GFI Network Security and PCI Compliance Power Tools (Paperback, New): Brien Posey GFI Network Security and PCI Compliance Power Tools (Paperback, New)
Brien Posey
R1,296 Discovery Miles 12 960 Ships in 10 - 15 working days

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.
* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.
* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.
* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More

Kismet Hacking (Paperback): Frank Thornton, Michael J. Schearer, Brad Haines Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
R1,154 Discovery Miles 11 540 Ships in 10 - 15 working days

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Coding Theory (Hardcover): Sudhakar Radhakrishnan, Muhammad Sarfraz Coding Theory (Hardcover)
Sudhakar Radhakrishnan, Muhammad Sarfraz
R3,093 Discovery Miles 30 930 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Research Anthology on Business Aspects…
Information Resources Management Association Hardcover R11,427 Discovery Miles 114 270
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Advancements in Security and Privacy…
Ashwani Kumar, Seelam Sai Satyanarayana Reddy Hardcover R5,924 Discovery Miles 59 240
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Biometric Security and Privacy…
Richard Jiang, Somaya Al-Maadeed, … Hardcover R4,834 Discovery Miles 48 340
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070

 

Partners