0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (201)
  • R500+ (860)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part II (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R3,184 Discovery Miles 31 840 Ships in 10 - 15 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun,... Smart and Innovative Trends in Next Generation Computing Technologies - Third International Conference, NGCT 2017, Dehradun, India, October 30-31, 2017, Revised Selected Papers, Part I (Paperback, 1st ed. 2018)
Pushpak Bhattacharyya, Hanumat G. Sastry, Venkatadri Marriboyina, Rashmi Sharma
R3,641 Discovery Miles 36 410 Ships in 10 - 15 working days

The two-volume set CCIS 827 and 828 constitutes the thoroughly refereed proceedings of the Third International Conference on Next Generation Computing Technologies, NGCT 2017, held in Dehradun, India, in October 2017. The 135 full papers presented were carefully reviewed and selected from 948 submissions. There were organized in topical sections named: Smart and Innovative Trends in Communication Protocols and Standards; Smart and Innovative Trends in Computational Intelligence and Data Science; Smart and Innovative Trends in Image Processing and Machine Vision; Smart Innovative Trends in Natural Language Processing for Indian Languages; Smart Innovative Trends in Security and Privacy.

EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS (Paperback): Brian P Major Zeitz EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS (Paperback)
Brian P Major Zeitz; Edited by Penny Hill Press; Air Force Institute of Technology
R352 Discovery Miles 3 520 Ships in 10 - 15 working days
Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,211 Discovery Miles 12 110 Ships in 10 - 15 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,157 Discovery Miles 11 570 Ships in 10 - 15 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback): Simple Start Guides Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback)
Simple Start Guides
R189 Discovery Miles 1 890 Ships in 10 - 15 working days
The Human Firewall - Cybersecurity is not just an IT problem (Paperback): Rob May The Human Firewall - Cybersecurity is not just an IT problem (Paperback)
Rob May
R242 Discovery Miles 2 420 Ships in 10 - 15 working days
Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated... Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition (Paperback, 4th Revised edition)
Shiva V.N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, …
R1,376 Discovery Miles 13 760 Ships in 10 - 15 working days

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is forThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,330 Discovery Miles 13 300 Ships in 10 - 15 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made... Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux (Paperback)
Kevin White
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
PAM Mastery (Hardcover): Michael W Lucas PAM Mastery (Hardcover)
Michael W Lucas
R1,028 R869 Discovery Miles 8 690 Save R159 (15%) Ships in 10 - 15 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R361 Discovery Miles 3 610 Ships in 10 - 15 working days
Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017): Keith Mayes, Konstantinos Markantonakis Smart Cards, Tokens, Security and Applications (Hardcover, 2nd ed. 2017)
Keith Mayes, Konstantinos Markantonakis
R4,409 Discovery Miles 44 090 Ships in 10 - 15 working days

This book provides a broad overview of the many card systems and solutions that are in practical use today. This new edition adds content on RFIDs, embedded security, attacks and countermeasures, security evaluation, javacards, banking or payment cards, identity cards and passports, mobile systems security, and security management. A step-by-step approach educates the reader in card types, production, operating systems, commercial applications, new technologies, security design, attacks, application development, deployment and lifecycle management. By the end of the book the reader should be able to play an educated role in a smart card related project, even to programming a card application. This book is designed as a textbook for graduate level students in computer science. It is also as an invaluable post-graduate level reference for professionals and researchers. This volume offers insight into benefits and pitfalls of diverse industry, government, financial and logistics aspects while providing a sufficient level of technical detail to support technologists, information security specialists, engineers and researchers.

Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback): Danielle Mead Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback)
Danielle Mead
R251 Discovery Miles 2 510 Ships in 10 - 15 working days
Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in... Personal Analytics and Privacy. An Individual and Collective Perspective - First International Workshop, PAP 2017, Held in Conjunction with ECML PKDD 2017, Skopje, Macedonia, September 18, 2017, Revised Selected Papers (Paperback, 1st ed. 2017)
Riccardo Guidotti, Anna Monreale, Dino Pedreschi, Serge Abiteboul
R2,071 Discovery Miles 20 710 Ships in 10 - 15 working days

This book constitutes the thoroughly refereed post-conference proceedings of the First International Workshop on Personal Analytics and Privacy, PAP 2017, held in Skopje, Macedonia, in September 2017. The 14 papers presented together with 2 invited talks in this volume were carefully reviewed and selected for inclusion in this book and handle topics such as personal analytics, personal data mining and privacy in the context where real individual data are used for developing a data-driven service, for realizing a social study aimed at understanding nowadays society, and for publication purposes.

Hacking and Pen Testing - Become an Expert in Computer Hacking and Security (Paperback): James Smith Hacking and Pen Testing - Become an Expert in Computer Hacking and Security (Paperback)
James Smith
R261 Discovery Miles 2 610 Ships in 10 - 15 working days
Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback): Ajay... Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback)
Ajay Singh Chauhan
R1,192 Discovery Miles 11 920 Ships in 10 - 15 working days

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Don't Step in the Trap - How to Recognize and Avoid Email Phishing Scams (Paperback): Brett W Smith Don't Step in the Trap - How to Recognize and Avoid Email Phishing Scams (Paperback)
Brett W Smith; Illustrated by Antonia R Hughes
R148 Discovery Miles 1 480 Ships in 10 - 15 working days
Is the OPM Data Breach the Tip of the Iceberg? (Paperback): Subcommittee on Oversight & Subcommittee Is the OPM Data Breach the Tip of the Iceberg? (Paperback)
Subcommittee on Oversight & Subcommittee
R515 Discovery Miles 5 150 Ships in 10 - 15 working days
The GnuTLS 3.6.1 Manual (Paperback): Nikos Mavrogiannopoulos, Simon Josefsson The GnuTLS 3.6.1 Manual (Paperback)
Nikos Mavrogiannopoulos, Simon Josefsson
R677 Discovery Miles 6 770 Ships in 10 - 15 working days
GNU SASL 1.8 Reference Manual (Paperback): Simon Josefsson GNU SASL 1.8 Reference Manual (Paperback)
Simon Josefsson
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
Cybersecurity Exposed - The Cyber House Rules (Hardcover): Raef Meeuwisse Cybersecurity Exposed - The Cyber House Rules (Hardcover)
Raef Meeuwisse
R712 Discovery Miles 7 120 Ships in 10 - 15 working days
Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,290 Discovery Miles 12 900 Ships in 10 - 15 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover): Sunita Vikrant Dhavale Advanced Image-Based Spam Detection and Filtering Techniques (Hardcover)
Sunita Vikrant Dhavale
R4,894 Discovery Miles 48 940 Ships in 10 - 15 working days
Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018):... Humans and Machines at Work - Monitoring, Surveillance and Automation in Contemporary Capitalism (Hardcover, 1st ed. 2018)
Phoebe Moore, Martin Upchurch, Xanthe Whittaker
R4,346 Discovery Miles 43 460 Ships in 10 - 15 working days

This edited collection provides a series of accounts of workers' local experiences that reflect the ubiquity of work's digitalisation. Precarious gig economy workers ride bikes and drive taxis in China and Britain; call centre workers in India experience invasive tracking; warehouse workers discover that hidden data has been used for layoffs; and academic researchers see their labour obscured by a 'data foam' that does not benefit them. These cases are couched in historical accounts of identity and selfhood experiments seen in the Hawthorne experiments and the lineage of automation. This book will appeal to scholars in the Sociology of Work and Digital Labour Studies and anyone interested in learning about monitoring and surveillance, automation, the gig economy and the quantified self in the workplace.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R241 Discovery Miles 2 410
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R420 R328 Discovery Miles 3 280
Social Engineering - The Science of…
C Hadnagy Paperback R936 R674 Discovery Miles 6 740
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540
What To Do When You Get Hacked - A…
Shimon Brathwaite Paperback R1,202 Discovery Miles 12 020
Cybersecurity For Dummies, 2nd Edition
J. Steinberg Paperback R795 R572 Discovery Miles 5 720
PCI Compliance - Understand and…
Branden Williams, James Adamson Paperback R1,370 Discovery Miles 13 700
Containing Big Tech - How To Protect Our…
Tom Kemp Hardcover R768 R625 Discovery Miles 6 250
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110

 

Partners