0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (198)
  • R500+ (857)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,552 Discovery Miles 15 520 Ships in 10 - 15 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX... Hacking! - This book includes: A Guide to Ethical Hacking, Penetration Testing and Wireless Penetration with KALI LINUX (Paperback)
Grzegorz Nowak
R636 Discovery Miles 6 360 Ships in 10 - 15 working days
The Personal Internet and Password Log (Paperback): Gary Wittmann The Personal Internet and Password Log (Paperback)
Gary Wittmann
R187 Discovery Miles 1 870 Ships in 10 - 15 working days
The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act... The PIPA - The Path to Compliance; The Exercise of Rights - A Practical Guide to the 'Personal Information Protection Act 2016' (Paperback)
Quissumus
R1,341 Discovery Miles 13 410 Ships in 10 - 15 working days

The PIPA provides a new right to individuals in Bermuda and brings the country in line with international standards of privacy protection. The PIPA "The path to compliance; the exercise of rights" provides the reader with a practical guide to the Act both from the perspective of organisations that must comply with its requirements and individuals who might benefit for its protection. It has been written in plain English with examples and suggestions where relevant

Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback): Chris Capra, Eric... Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback)
Chris Capra, Eric Faster
R501 Discovery Miles 5 010 Ships in 10 - 15 working days
I Can't Remember My Password - Password and Username Keeper (Paperback): Smw Publishing I Can't Remember My Password - Password and Username Keeper (Paperback)
Smw Publishing
R206 Discovery Miles 2 060 Ships in 10 - 15 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R518 R424 Discovery Miles 4 240 Save R94 (18%) Ships in 10 - 15 working days
Instagram User Guide - The Complete Secrets, Tips, Step by Step Reference to Using Instagram Like a Pro (Paperback): David Jones Instagram User Guide - The Complete Secrets, Tips, Step by Step Reference to Using Instagram Like a Pro (Paperback)
David Jones
R325 R263 Discovery Miles 2 630 Save R62 (19%) Ships in 10 - 15 working days
Perceived Privacy in Location-Based Mobile System (Hardcover, 1st ed. 2020): Maija Elina Poikela Perceived Privacy in Location-Based Mobile System (Hardcover, 1st ed. 2020)
Maija Elina Poikela
R1,560 Discovery Miles 15 600 Ships in 10 - 15 working days

This work aims at understanding behavior around location information, including why users share such information, why they protect the data, and what kind of other factors influence the decision to behave in a certain way. This book explores privacy in the context of location data, and answers questions such as what are the privacy related behaviors in this context, and what are the factors influencing such behaviors. The book gives an overview to what privacy means for users in terms of understandings, attitudes and valuations. This book discusses reasons for why research around this topic is challenging, and presents various methods for diving into the topic through empirical studies. The work is relevant for professionals, researchers, and users of technology.

Protect Your Identity - Step-by-Step Guide and Workbook (Paperback): Carrie Kerskie Protect Your Identity - Step-by-Step Guide and Workbook (Paperback)
Carrie Kerskie
R482 Discovery Miles 4 820 Ships in 10 - 15 working days
Developing Cyber Resilient Systems - A Systems Security Engineering Approach: NIST SP 800-160 Volume 2 (Paperback): National... Developing Cyber Resilient Systems - A Systems Security Engineering Approach: NIST SP 800-160 Volume 2 (Paperback)
National Institute of Standards and Tech
R751 Discovery Miles 7 510 Ships in 10 - 15 working days
Oops! I Forgot Password (Paperback): Dorothy J Hall Oops! I Forgot Password (Paperback)
Dorothy J Hall
R168 Discovery Miles 1 680 Ships in 10 - 15 working days
Infinity Ethical Hacking - Learn basic to advance hacks (Paperback): Arthur S Sapp Infinity Ethical Hacking - Learn basic to advance hacks (Paperback)
Arthur S Sapp
R420 Discovery Miles 4 200 Ships in 10 - 15 working days
Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback): Sandra Estok Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback)
Sandra Estok
R628 R510 Discovery Miles 5 100 Save R118 (19%) Ships in 10 - 15 working days
AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Paperback): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Paperback)
Scott N Schober, Craig W Schober
R554 R464 Discovery Miles 4 640 Save R90 (16%) Ships in 10 - 15 working days
The Cyber Path - The Infrastructure Supporting the Internet Data Flow (Paperback): Lou Giannelli The Cyber Path - The Infrastructure Supporting the Internet Data Flow (Paperback)
Lou Giannelli
R547 R456 Discovery Miles 4 560 Save R91 (17%) Ships in 10 - 15 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 1 (Hardcover)
Information Reso Management Association
R10,603 Discovery Miles 106 030 Ships in 10 - 15 working days
Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover): Information Reso... Cyber Law, Privacy, and Security - Concepts, Methodologies, Tools, and Applications, VOL 2 (Hardcover)
Information Reso Management Association
R10,597 Discovery Miles 105 970 Ships in 10 - 15 working days
Security Rights in Intellectual Property (Hardcover, 1st ed. 2020): Eva-Maria Kieninger Security Rights in Intellectual Property (Hardcover, 1st ed. 2020)
Eva-Maria Kieninger
R6,691 Discovery Miles 66 910 Ships in 10 - 15 working days

This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law. In the context of business financing, intellectual property rights are still only reluctantly used as collateral, and on a small scale. If they are used at all, it is mostly done in the form of a floating charge or some other "all-asset" security right. The only sector in which security rights in intellectual property play a major role, at least in some jurisdictions, is the financing of movies. On the other hand, it is virtually undisputed that security rights in intellectual property could be economically valuable, or even crucial, for small and medium-sized enterprises - especially for start-ups, which are often very innovative and creative, but have limited access to corporate financing and must rely on capital markets (securitization, capital market). Therefore, they need to secure bank loans, yet lack their own traditional collateral, such as land.

Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R4,658 Discovery Miles 46 580 Ships in 10 - 15 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Privacy in Dynamical Systems (Hardcover, 1st ed. 2020): Farhad Farokhi Privacy in Dynamical Systems (Hardcover, 1st ed. 2020)
Farhad Farokhi
R2,993 Discovery Miles 29 930 Ships in 10 - 15 working days

This book addresses privacy in dynamical systems, with applications to smart metering, traffic estimation, and building management. In the first part, the book explores statistical methods for privacy preservation from the areas of differential privacy and information-theoretic privacy (e.g., using privacy metrics motivated by mutual information, relative entropy, and Fisher information) with provable guarantees. In the second part, it investigates the use of homomorphic encryption for the implementation of control laws over encrypted numbers to support the development of fully secure remote estimation and control. Chiefly intended for graduate students and researchers, the book provides an essential overview of the latest developments in privacy-aware design for dynamical systems.

Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most... Hacking - Beginners Guide, Wireless Hacking, 17 Must Tools every Hacker should have, 17 Most Dangerous Hacking Attacks, 10 Most Dangerous Cyber Gangs (Hardcover)
Alex Wagner
R1,733 R1,364 Discovery Miles 13 640 Save R369 (21%) Ships in 10 - 15 working days
Security, Privacy, and Forensics Issues in Big Data (Hardcover): Ramesh C. Joshi, Brij B. Gupta Security, Privacy, and Forensics Issues in Big Data (Hardcover)
Ramesh C. Joshi, Brij B. Gupta
R7,280 Discovery Miles 72 800 Ships in 10 - 15 working days

With the proliferation of devices connected to the internet and connected to each other, the volume of data collected, stored, and processed is increasing every day, which brings new challenges in terms of information security. As big data expands with the help of public clouds, traditional security solutions tailored to private computing infrastructures and confined to a well-defined security perimeter, such as firewalls and demilitarized zones (DMZs), are no longer effective. New security functions are required to work over the heterogenous composition of diverse hardware, operating systems, and network domains. Security, Privacy, and Forensics Issues in Big Data is an essential research book that examines recent advancements in big data and the impact that these advancements have on information security and privacy measures needed for these networks. Highlighting a range of topics including cryptography, data analytics, and threat detection, this is an excellent reference source for students, software developers and engineers, security analysts, IT consultants, academicians, researchers, and professionals.

The Ultimate GDPR Practitioner Guide (2nd Edition) - Demystifying Privacy & Data Protection (Paperback, 2nd New edition):... The Ultimate GDPR Practitioner Guide (2nd Edition) - Demystifying Privacy & Data Protection (Paperback, 2nd New edition)
Stephen Massey
R816 R697 Discovery Miles 6 970 Save R119 (15%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
The Little Black Book of Data and…
Kyle Taylor Paperback R276 Discovery Miles 2 760
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Software Security - Concepts & Practices
Suhel Ahmad Khan, Rajeev Kumar, … Hardcover R3,640 Discovery Miles 36 400
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
Information And Communications…
Dana van der Merwe Paperback R1,119 R1,000 Discovery Miles 10 000
Botnets - Architectures…
Georgios Kambourakis, Marios Anagnostopoulos, … Paperback R1,438 Discovery Miles 14 380
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
PCI Compliance - Understand and…
Branden Williams, James Adamson Paperback R1,370 Discovery Miles 13 700
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540

 

Partners