0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (761)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

How to Destroy Surveillance Capitalism (Paperback): Cory Doctorow How to Destroy Surveillance Capitalism (Paperback)
Cory Doctorow
R291 R270 Discovery Miles 2 700 Save R21 (7%) Ships in 18 - 22 working days
Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated... Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition (Paperback, 4th Revised edition)
Shiva V.N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, …
R1,243 Discovery Miles 12 430 Ships in 18 - 22 working days

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is forThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,604 Discovery Miles 26 040 Ships in 18 - 22 working days
Cybersecurity essentials (Paperback): Pawel Winowicz Cybersecurity essentials (Paperback)
Pawel Winowicz
R136 Discovery Miles 1 360 Ships in 18 - 22 working days
Infinity Ethical Hacking - Learn basic to advance hacks (Paperback): Arthur S Sapp Infinity Ethical Hacking - Learn basic to advance hacks (Paperback)
Arthur S Sapp
R406 Discovery Miles 4 060 Ships in 18 - 22 working days
The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback): William Gamble The Cybersecurity Maturity Model Certification (CMMC) - A Pocket Guide (Paperback)
William Gamble
R446 Discovery Miles 4 460 Ships in 18 - 22 working days
The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology... The Personal Digital Resilience Handbook - An essential guide to safe, secure and robust use of everyday technology (Paperback)
David Wild
R299 R277 Discovery Miles 2 770 Save R22 (7%) Ships in 18 - 22 working days
Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R4,163 Discovery Miles 41 630 Ships in 18 - 22 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook,... Password Keeper - Keep Internet Passwords, Website Address and Usernames Information Logbook, Organizer Record Book, Notebook, Journal (Paperback)
Amy Newton
R511 Discovery Miles 5 110 Ships in 18 - 22 working days
AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,324 Discovery Miles 13 240 Ships in 18 - 22 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,025 Discovery Miles 10 250 Ships in 18 - 22 working days
Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback): Sandra Estok Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback)
Sandra Estok
R536 R491 Discovery Miles 4 910 Save R45 (8%) Ships in 18 - 22 working days
Unmasking the hacker - demystifying cybercrime (Paperback): Amanda-Jane Turner Unmasking the hacker - demystifying cybercrime (Paperback)
Amanda-Jane Turner
R292 Discovery Miles 2 920 Ships in 18 - 22 working days
The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The... The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The Digital Age...Guaranteed! (Paperback)
Jack Norton
R310 Discovery Miles 3 100 Ships in 18 - 22 working days
Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R508 Discovery Miles 5 080 Ships in 18 - 22 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback): Chris Capra, Eric... Digital Privacy - Internet Security to Stop Big Companies from Tracking and Selling Your Data (Paperback)
Chris Capra, Eric Faster
R484 Discovery Miles 4 840 Ships in 18 - 22 working days
Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback): Larry Bell Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback)
Larry Bell
R566 Discovery Miles 5 660 Ships in 18 - 22 working days
Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback): Bill Bunnell, Chuck Tomlinson, Chuck Brown Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback)
Bill Bunnell, Chuck Tomlinson, Chuck Brown
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Paperback)
Miguel Fernandez, Alan Millington, Mark Monday
R817 Discovery Miles 8 170 Ships in 18 - 22 working days
Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback): Elijah Lewis Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback)
Elijah Lewis
R487 Discovery Miles 4 870 Ships in 18 - 22 working days
Ethical Hacking - Advanced and Effective Measures of Ethical Hacking (Paperback): Elijah Lewis Ethical Hacking - Advanced and Effective Measures of Ethical Hacking (Paperback)
Elijah Lewis
R496 Discovery Miles 4 960 Ships in 18 - 22 working days
Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis... Adapt and Overcome - What Business Owners Need to Do to Keep Employees, Clients and Infrastructure Safe During a Time of Crisis (Paperback)
Bryan Hornung, Chee Lam, Jeri Morgan
R394 Discovery Miles 3 940 Ships in 18 - 22 working days
CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor,... CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems (Paperback)
Hemang Doshi
R1,877 Discovery Miles 18 770 Ships in 18 - 22 working days

This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questions Key Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You'll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you'll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you'll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world. What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization's security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.

Internet Password Organizer - Flowers (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Flowers (Password Log Book) (Paperback)
Peter Paker P K
R208 Discovery Miles 2 080 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bin-Picking - New Approaches for a…
Dirk Buchholz Hardcover R3,172 Discovery Miles 31 720
Visual Control of Wheeled Mobile Robots…
Hector M. Becerra, Carlos Sagues Hardcover R3,840 Discovery Miles 38 400
Proceedings of 2021 International…
Ruidan Su, Yudong Zhang, … Hardcover R8,205 Discovery Miles 82 050
AngelThink - The founder's guide to how…
Phil McSweeney Paperback R423 R382 Discovery Miles 3 820
Small Business Management - Launching…
Nkoana Radipere, Justin Longenecker Paperback R877 Discovery Miles 8 770
Forex Trading - Beginner's guide to the…
David Reese Hardcover R566 Discovery Miles 5 660
Authority - Strategic Concepts from 15…
John North, Christine Robinson, … Hardcover R570 R524 Discovery Miles 5 240
Language, Nation and Power - An…
R. Millar Hardcover R2,654 Discovery Miles 26 540
Wicca - A Beginner's Guide to Wiccan…
Cassandra Miller Hardcover R549 R504 Discovery Miles 5 040
A History of Bilingual Education in the…
Sarah C.K. Moore Paperback R1,562 R812 Discovery Miles 8 120

 

Partners