0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (193)
  • R250 - R500 (592)
  • R500+ (5,155)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

IT Security Governance Innovations - Theory and Research (Hardcover, New): Daniel Mellado, Luis Enrique Sanchez, Eduardo... IT Security Governance Innovations - Theory and Research (Hardcover, New)
Daniel Mellado, Luis Enrique Sanchez, Eduardo Fernandez-Medina, Mario Piattini
R4,948 Discovery Miles 49 480 Ships in 18 - 22 working days

IT Security Governance Innovations: Theory and Research provides extraordinary research which highlights the main contributions and characteristics of existing approaches, standards, best practices, and new trends in IT Security Governance. With theoretical and practical perspectives, the book aims to address IT Security Governance implementation in corporate organizations. This collection of works serves as a reference for CEOs and CIOs, security managers, systems specialists, computer science students, and much more.

Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback): Diane Barrett,... Virtualization and Forensics - A Digital Forensic Investigator's Guide to Virtual Environments (Paperback)
Diane Barrett, Gregory Kipper
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you the end-to-end knowledge needed to identify server, desktop, and portable virtual environments, including: VMware, Parallels, Microsoft, and Sun. It covers technological advances in virtualization tools, methods, and issues in digital forensic investigations, and explores trends and emerging technologies surrounding virtualization technology. This book consists of three parts. Part I explains the process of virtualization and the different types of virtualized environments. Part II details how virtualization interacts with the basic forensic process, describing the methods used to find virtualization artifacts in dead and live environments as well as identifying the virtual activities that affect the examination process. Part III addresses advanced virtualization issues, such as the challenges of virtualized environments, cloud computing, and the future of virtualization. This book will be a valuable resource for forensic investigators (corporate and law enforcement) and incident response professionals.

Digital Triage Forensics - Processing the Digital Crime Scene (Paperback): Stephen Pearson, Richard Watson Digital Triage Forensics - Processing the Digital Crime Scene (Paperback)
Stephen Pearson, Richard Watson
R1,204 Discovery Miles 12 040 Ships in 10 - 15 working days

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF is used by the U.S. Army and other traditional police agencies for current digital forensic applications. The tools, training, and techniques from this practice are being brought to the public in this book for the first time. Now corporations, law enforcement, and consultants can benefit from the unique perspectives of the experts who coined Digital Triage Forensics. The text covers the collection of digital media and data from cellular devices and SIM cards. It also presents outlines of pre- and post- blast investigations. This book is divided into six chapters that present an overview of the age of warfare, key concepts of digital triage and battlefield forensics, and methods of conducting pre/post-blast investigations. The first chapter considers how improvised explosive devices (IEDs) have changed from basic booby traps to the primary attack method of the insurgents in Iraq and Afghanistan. It also covers the emergence of a sustainable vehicle for prosecuting enemy combatants under the Rule of Law in Iraq as U.S. airmen, marines, sailors, and soldiers perform roles outside their normal military duties and responsibilities. The remaining chapters detail the benefits of DTF model, the roles and responsibilities of the weapons intelligence team (WIT), and the challenges and issues of collecting digital media in battlefield situations. Moreover, data collection and processing as well as debates on the changing role of digital forensics investigators are explored. This book will be helpful to forensic scientists, investigators, and military personnel, as well as to students and beginners in forensics.

Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback): Naomi Alpern Eleventh Hour Network+ - Exam N10-004 Study Guide (Paperback)
Naomi Alpern
R486 R411 Discovery Miles 4 110 Save R75 (15%) Ships in 10 - 15 working days

The "11th Hour Network+ Study Guide" is keyed to theN10-004 revision of the CompTIA Network+ exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentalsExam Warnings highlight particularly tough sections of the examCrunch Time sidebars point out key concepts to rememberDid You Know? sidebars cover sometimes forgotten detailsTop Five Toughest Questions and answers help you to prepare

The 11th Hour Study Guide Series focuses on just the essentials needed to pass your certification exam and make the most of the last days before the test
The only book keyed to the new 2009 objectives that has beencrafted for last minute cramming
Easy to find, essential material with no fluff this book does not talk about security in general, just how it applies to the test
Includesreview of five toughest questions by topic- sure to improve your score"

Developing and Evaluating Security-Aware Software Systems (Hardcover): Khaled M Khan Developing and Evaluating Security-Aware Software Systems (Hardcover)
Khaled M Khan
R4,947 Discovery Miles 49 470 Ships in 18 - 22 working days

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field. Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Security-Aware Systems Applications and Software Development Methods (Hardcover, New): Khaled M Khan Security-Aware Systems Applications and Software Development Methods (Hardcover, New)
Khaled M Khan
R4,967 Discovery Miles 49 670 Ships in 18 - 22 working days

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Edge Computing - Models, Technologies and Applications (Hardcover): Javid Taheri, Shuiguang Deng Edge Computing - Models, Technologies and Applications (Hardcover)
Javid Taheri, Shuiguang Deng
R3,687 R3,326 Discovery Miles 33 260 Save R361 (10%) Ships in 18 - 22 working days
Enabling Blockchain Technology for Secure Networking and Communications (Hardcover): Adel Ben Mnaouer, Lamia Chaari Fourati Enabling Blockchain Technology for Secure Networking and Communications (Hardcover)
Adel Ben Mnaouer, Lamia Chaari Fourati
R5,931 Discovery Miles 59 310 Ships in 18 - 22 working days

In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains.

Quantum Cryptography in Advanced Networks (Hardcover): Oleg G. Morozov Quantum Cryptography in Advanced Networks (Hardcover)
Oleg G. Morozov
R2,550 Discovery Miles 25 500 Ships in 18 - 22 working days
Coding Theory (Hardcover): Sudhakar Radhakrishnan, Muhammad Sarfraz Coding Theory (Hardcover)
Sudhakar Radhakrishnan, Muhammad Sarfraz
R3,093 Discovery Miles 30 930 Ships in 18 - 22 working days
Virtualization for Security - Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting... Virtualization for Security - Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting (Paperback)
John Hoopes
R1,219 Discovery Miles 12 190 Ships in 10 - 15 working days

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.
Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives.
Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.
About the Technologies
A sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.
Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.
A honeypot is a system that looks and acts like a production environment but is actually a monitored trap, deployed in a network with enough interesting data to attract hackers, but created to log their activity and keep them from causing damage to the actual production environment. A honeypot exposes new threats, tools, and techniques used by hackers before they can attack the real systems, which security managers patch based on the information gathered. Before virtualization became mainstream, setting up a machine or a whole network (a honeynet) for research purposes only was prohibitive in both cost and time management. Virtualization makes this technique more viable as a realistic approach for companies large and small.
* The first book to collect a comprehensive set of all virtualization security tools and strategies in a single volume
* Covers all major virtualization platforms, including market leader VMware, Xen, and Microsoft's Hyper-V virtualization platform, a new part of Windows Server 2008 releasing in June 2008
* Breadth of coverage appeals to a wide range of security professionals, including administrators, researchers, consultants, and forensic

Nokia Firewall, VPN, and IPSO Configuration Guide (Paperback): Andrew Hay, Keli Hay, Peter Giannoulis Nokia Firewall, VPN, and IPSO Configuration Guide (Paperback)
Andrew Hay, Keli Hay, Peter Giannoulis
R1,297 Discovery Miles 12 970 Ships in 10 - 15 working days

"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its customers requirements."
--Chris Christiansen, Vice President, Internet Infrastructure and Security Software, IDC.
Syngress has a long history of publishing market-leading books for system administrators and security professionals on commercial security products, particularly Firewall and Virtual Private Network (VPN) appliances from Cisco, Check Point, Juniper, SonicWall, and Nokia (see related titles for sales histories). The Nokia Firewall, VPN, and IPSO Configuration Guide will be the only book on the market covering the all-new Nokia Firewall/VPN Appliance suite. Nokia Firewall/VPN appliances are designed to protect and extend the network perimeter.
According to IDC research, Nokia Firewall/VPN Appliances hold the #3 worldwide market-share position in this space behind Cisco and Juniper/NetScreen. IDC estimated the total Firewall/VPN market at $6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's primary customers for security appliances are Mid-size to Large enterprises who need site-to-site connectivity and Mid-size to Large enterprises who need remote access connectivity through enterprise-deployed mobile devices. Nokia appliances for this market are priced form $1,000 for the simplest devices (Nokia IP60) up to $60,0000 for large enterprise- and service-provider class devices (like the Nokia IP2450 released in Q4 2007). While the feature set of such a broad product range obviously varies greatly, all of the appliances run on the same operating system: Nokia IPSO (IPSO refers to Ipsilon Networks, a company specializing in IP switching acquired by Nokia in 1997. The definition of the acronym has little to no meaning for customers.) As a result of this common operating system across the product line, The Nokia Firewall, VPN, and IPSO Configuration Guide will be an essential reference to users of any of these products. Users manage the Nokia IPSO (which is a Linux variant, specifically designed for these appliances) through a Web interface called Nokia Network Voyager or via a powerful Command Line Interface (CLI). Coverage within the book becomes increasingly complex relative to the product line.
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion Web site will provide seasoned network administrators and security professionals with the in-depth coverage and step-by-step walkthroughs they require to properly secure their network perimeters and ensure safe connectivity for remote users. The book contains special chapters devoted to mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface. In addition, the companion Web site offers downloadable video walkthroughs on various installation and troubleshooting tips from the authors.

* Only book on the market covering Nokia Firewall/VPN appliances, which hold 6.6% of a $6 billion market
* Companion website offers video walkthroughs on various installation and troubleshooting tips from the authors
* Special chapters detail mastering the complex Nokia IPSO command line, as well as tips and tricks for taking advantage of the new "ease of use" features in the Nokia Network Voyager Web interface

E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation... E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support (Paperback)
Karen A. Schuler
R1,530 Discovery Miles 15 300 Ships in 10 - 15 working days

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2 billion industry, a 60% increase from 2004, projected to double by 2009. The core reason for the explosion of e-discovery is sheer volume; evidence is digital and 75% of modern day lawsuits entail e-discovery.
A recent survey reports that U.S. companies face an average of 305 pending lawsuits internationally. For large U.S. companies ($1 billion or more in revenue)that number has soared to 556 on average, with an average of 50 new disputes emerging each year for nearly half of them. To properly manage the role of digital information in an investigative or legal setting, an enterprise--whether it is a Fortune 500 company, a small accounting firm or a vast government agency--must develop an effective electronic discovery program. Since the amendments to the Federal Rules of Civil Procedure, which took effect in December 2006, it is even more vital that the lifecycle of electronically stored information be understood and properly managed to avoid risks and costly mistakes.
This books holds the keys to success for systems administrators, information security and other IT department personnel who are charged with aiding the e-discovery process.
*Comprehensive resource for corporate technologists, records managers, consultants, and legal team members to the e-discovery process, with information unavailable anywhere else
*Offers a detailed understanding of key industry trends, especially the Federal Rules of Civil Procedure, that are driving the adoption of e-discovery programs
*Includes vital project management metrics to help monitor workflow, gauge costs and speed the process
*Companion Website offers e-discovery tools, checklists, forms, workflow examples, and other tools to be used when conducting e-discovery strategy

No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback): Johnny Long No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
Johnny Long; Series edited by Kevin D. Mitnick
R994 R833 Discovery Miles 8 330 Save R161 (16%) Ships in 10 - 15 working days

As the cliche reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
As you browse this book, you'll hear old familiar terms like "dumpster diving," "social engineering," and "shoulder surfing." Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big boldletters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Wireless Security: Know It All (Paperback): Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A.... Wireless Security: Know It All (Paperback)
Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A. Rackley, …
R1,589 Discovery Miles 15 890 Ships in 10 - 15 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf
Communications engineers need to master a wide area of topics to excel. The "Wireless Security Know It All" covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume"

GFI Network Security and PCI Compliance Power Tools (Paperback, New): Brien Posey GFI Network Security and PCI Compliance Power Tools (Paperback, New)
Brien Posey
R1,296 Discovery Miles 12 960 Ships in 10 - 15 working days

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning how to set up sophisticated products is time-consuming, and can be confusing. GFI's LANguard Network Security Scanner reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. To take advantage of the best things that GFI's LANguard Network Security Scanner has to offer, you'll want to configure it on your network so that it captures key events and alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively. His straightforward, no nonsense writing style is devoid of difficult to understand technical jargon. His descriptive examples explain how GFI's security tools enhance the security controls that are already built into your server's operating system.
* Secure Your Network Master the various components that make up the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports and schedule reports. See how filters allow you to control the information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use GFI to do your inventories and perform audits. See how to blacklist and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch, perform a scan comparison, uninstall a patch, and deploy custom software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for users trying to install unauthorized software, copy sensitive data onto removable media, or perform other actions to try and circumvent your network's security.
* Create Protection Policies Control the level of device access allowed on a system and create separate protection policies; one for servers, one for workstations, and one for laptops. Learn how to deploy agents.
* Regulate Specific Devices Master some of the advanced features of GFI: locking device categories, blacklisting and whitelisting devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging options, setting alerting options, and generating end point security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device Access
* Master Advanced Features of GFI: Locking Device Categories, Blacklisting and Whitelisting Devices, Using File Type Restrictions and More

Mobile Malware Attacks and Defense (Paperback): Ken Dunham Mobile Malware Attacks and Defense (Paperback)
Ken Dunham
R1,233 Discovery Miles 12 330 Ships in 10 - 15 working days

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code in past, current, and future risks, protect your banking, auctioning, and other activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing (SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use "MobileSandbox" to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats

Applied Approach to Privacy and Security for the Internet of Things (Hardcover): Parag Chatterjee, Emmanuel Benoist, Asoke Nath Applied Approach to Privacy and Security for the Internet of Things (Hardcover)
Parag Chatterjee, Emmanuel Benoist, Asoke Nath
R6,406 Discovery Miles 64 060 Ships in 18 - 22 working days

From transportation to healthcare, IoT has been heavily implemented into practically every professional industry, making these systems highly susceptible to security breaches. Because IoT connects not just devices but also people and other entities, every component of an IoT system remains vulnerable to attacks from hackers and other unauthorized units. This clearly portrays the importance of security and privacy in IoT, which should be strong enough to keep the entire platform and stakeholders secure and smooth enough to not disrupt the lucid flow of communication among IoT entities. Applied Approach to Privacy and Security for the Internet of Things is a collection of innovative research on the methods and applied aspects of security in IoT-based systems by discussing core concepts and studying real-life scenarios. While highlighting topics including malware propagation, smart home vulnerabilities, and bio-sensor safety, this book is ideally designed for security analysts, software security engineers, researchers, computer engineers, data scientists, security professionals, practitioners, academicians, and students seeking current research on the various aspects of privacy and security within IoT.

Online Banking Security Measures and Data Protection (Hardcover): Shadi A. Aljawarneh Online Banking Security Measures and Data Protection (Hardcover)
Shadi A. Aljawarneh
R5,365 Discovery Miles 53 650 Ships in 18 - 22 working days

Technological innovations in the banking sector have provided numerous benefits to customers and banks alike; however, the use of e-banking increases vulnerability to system attacks and threats, making effective security measures more vital than ever. Online Banking Security Measures and Data Protection is an authoritative reference source for the latest scholarly material on the challenges presented by the implementation of e-banking in contemporary financial systems. Presenting emerging techniques to secure these systems against potential threats and highlighting theoretical foundations and real-world case studies, this book is ideally designed for professionals, practitioners, upper-level students, and technology developers interested in the latest developments in e-banking security.

Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover): Information R Management Association Research Anthology on Securing Medical Systems and Records, VOL 2 (Hardcover)
Information R Management Association
R11,344 Discovery Miles 113 440 Ships in 18 - 22 working days
Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure... Techno Security's Guide to Securing SCADA - A Comprehensive Handbook On Protecting The Critical Infrastructure (Paperback)
Jack Wiles, Ted Claypoole, Phil Drake, Paul A. Henry, Lester J. Johnson Jr., …
R1,361 Discovery Miles 13 610 Ships in 10 - 15 working days

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are at increasing risk due to the move from proprietary systems to more standard platforms and protocols and the interconnection to other networks. Because there has been limited attention paid to security, these systems are seen as largely unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues affecting SCADA systems and overall critical infrastructure protection. The respective co-authors are among the leading experts in the world capable of addressing these related-but-independent concerns of SCADA security. Headline-making threats and countermeasures like malware, sidejacking, biometric applications, emergency communications, security awareness llanning, personnel & workplace preparedness and bomb threat planning will be addressed in detail in this one of a kind book-of-books dealing with the threats to critical infrastructure protection. They collectivly have over a century of expertise in their respective fields of infrastructure protection. Included among the contributing authors are Paul Henry, VP of Technology Evangelism, Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone Technologies, Phil Drake, Telecommunications Director, The Charlotte Observer, Patrice Bourgeois, Tenable Network Security, Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of the complexities of SCADA security and its impact on critical infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat planning, emergency communications, employee safety and much more
* Companion Website featuring video interviews with subject matter experts offer a "sit-down" with the leaders in the field

Kismet Hacking (Paperback): Frank Thornton, Michael J. Schearer, Brad Haines Kismet Hacking (Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
R1,154 Discovery Miles 11 540 Ships in 10 - 15 working days

Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in recent years that geared towards Windows users, Kismet Hacking is geared to those individuals that use the Linux operating system. People who use Linux and want to use wireless tools need to use Kismet. Now with the introduction of Kismet NewCore, they have a book that will answer all their questions about using this great tool. This book continues in the successful vein of books for wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive

Securing Citrix XenApp Server in the Enterprise (Paperback): Tariq Azad Securing Citrix XenApp Server in the Enterprise (Paperback)
Tariq Azad
R1,318 Discovery Miles 13 180 Ships in 10 - 15 working days

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious hackers. To compromise a server running Citrix Presentation Server, a hacker need not penetrate a heavily defended corporate or government server. They can simply compromise the far more vulnerable laptop, remote office, or home office of any computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target for malicious hackers. And although it is a high-value target, Citrix Presentation Servers and remote workstations are often relatively easily hacked, because they are often times deployed by overworked system administrators who haven't even configured the most basic security features offered by Citrix. "The problem, in other words, isn't a lack of options for securing Citrix instances; the problem is that administrators aren't using them." (eWeek, October 2007). In support of this assertion Security researcher Petko D. Petkov, aka "pdp," said in an Oct. 4 posting that his recent testing of Citrix gateways led him to "tons" of "wide-open" Citrix instances, including 10 on government domains and four on military domains.
* The most comprehensive book published for system administrators providing step-by-step instructions for a secure Citrix Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp detailing tactics used by malicious hackers to compromise Citrix Presentation Servers.
* Companion Web site contains custom Citrix scripts for administrators to install, configure, and troubleshoot Citrix Presentation Server.

Network Security: Know It All (Hardcover): James Joshi Network Security: Know It All (Hardcover)
James Joshi
R1,626 Discovery Miles 16 260 Ships in 10 - 15 working days

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.
Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the field's leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover theory and practice of network security technology, allowing the reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates learning and lets the reader remain current and fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques, enhancing the reader's grasp of the material and ability to implement practical solutions.
* Examples illustrate core security concepts for enhanced comprehension

Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback): Constantine Photopoulos Managing Catastrophic Loss of Sensitive Data - A Guide for IT and Security Professionals (Paperback)
Constantine Photopoulos
R1,265 Discovery Miles 12 650 Ships in 10 - 15 working days

Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the appropriate recovery and notification steps when calamity strikes.
*Addresses a very topical subject of great concern to security, general IT and business management
*Provides a step-by-step approach to managing the consequences of and recovering from the loss of sensitive data.
*Gathers in a single place all information about this critical issue, including legal, public relations and regulatory issues

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
CISA - Certified Information Systems…
Cannon Paperback R1,635 R1,311 Discovery Miles 13 110
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
System of Controls - I.T.'s Guide to…
William D Reed Hardcover R947 R826 Discovery Miles 8 260
PCI Dss: A Pocket Guide
IT Governance Paperback R392 Discovery Miles 3 920
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
Advances in Malware and Data-Driven…
Brij B. Gupta Hardcover R5,333 Discovery Miles 53 330
Cybersecurity Issues and Challenges for…
Saqib Saeed, Abdullah M. Almuhaideb, … Hardcover R7,752 Discovery Miles 77 520

 

Partners