0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (124)
  • R250 - R500 (223)
  • R500+ (769)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,324 Discovery Miles 13 240 Ships in 18 - 22 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback): Danielle Mead Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback)
Danielle Mead
R242 Discovery Miles 2 420 Ships in 18 - 22 working days
I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral... I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif (Paperback)
Sam Secure
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,025 Discovery Miles 10 250 Ships in 18 - 22 working days
Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback): Sandra Estok Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback)
Sandra Estok
R536 R491 Discovery Miles 4 910 Save R45 (8%) Ships in 18 - 22 working days
CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor,... CISA - Certified Information Systems Auditor Study Guide - Aligned with the CISA Review Manual 2019 to help you audit, monitor, and assess information systems (Paperback)
Hemang Doshi
R1,877 Discovery Miles 18 770 Ships in 18 - 22 working days

This CISA study guide is for those interested in achieving CISA certification and provides complete coverage of ISACA's latest CISA Review Manual (2019) with practical examples and over 850 exam-oriented practice questions Key Features Gain tactical skills in auditing, control, and security to pass the CISA examination Get up to speed with auditing business IT systems Increase your value to organizations and be at the forefront of an evolving business landscape by achieving CISA certification Book DescriptionAre you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor? The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep. This book covers all the five CISA domains in detail to help you pass the exam. You'll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you'll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you'll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards. By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world. What you will learn Understand the information systems auditing process Get to grips with IT governance and management Gain knowledge of information systems acquisition Assist your organization in protecting and controlling information systems with IT audit standards Understand information systems operations and how to ensure business resilience Evaluate your organization's security policies, standards, and procedures to meet its objectives Who this book is forThis CISA exam study guide is designed for those with a non-technical background who are interested in achieving CISA certification and are currently employed or looking to gain employment in IT audit and security management positions.

Unmasking the hacker - demystifying cybercrime (Paperback): Amanda-Jane Turner Unmasking the hacker - demystifying cybercrime (Paperback)
Amanda-Jane Turner
R292 Discovery Miles 2 920 Ships in 18 - 22 working days
The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The... The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The Digital Age...Guaranteed! (Paperback)
Jack Norton
R310 Discovery Miles 3 100 Ships in 18 - 22 working days
Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R508 Discovery Miles 5 080 Ships in 18 - 22 working days
Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback): Ajay... Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback)
Ajay Singh Chauhan
R1,082 Discovery Miles 10 820 Ships in 18 - 22 working days

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Is the OPM Data Breach the Tip of the Iceberg? (Paperback): Subcommittee on Oversight & Subcommittee Is the OPM Data Breach the Tip of the Iceberg? (Paperback)
Subcommittee on Oversight & Subcommittee
R494 Discovery Miles 4 940 Ships in 18 - 22 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback): Larry Bell Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback)
Larry Bell
R566 Discovery Miles 5 660 Ships in 18 - 22 working days
Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback): Bill Bunnell, Chuck Tomlinson, Chuck Brown Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback)
Bill Bunnell, Chuck Tomlinson, Chuck Brown
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Paperback)
Miguel Fernandez, Alan Millington, Mark Monday
R817 Discovery Miles 8 170 Ships in 18 - 22 working days
Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback): Elijah Lewis Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback)
Elijah Lewis
R487 Discovery Miles 4 870 Ships in 18 - 22 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R442 R410 Discovery Miles 4 100 Save R32 (7%) Ships in 18 - 22 working days
Ethical Hacking - Advanced and Effective Measures of Ethical Hacking (Paperback): Elijah Lewis Ethical Hacking - Advanced and Effective Measures of Ethical Hacking (Paperback)
Elijah Lewis
R496 Discovery Miles 4 960 Ships in 18 - 22 working days
Internet Password Organizer - Flowers (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Flowers (Password Log Book) (Paperback)
Peter Paker P K
R208 Discovery Miles 2 080 Ships in 18 - 22 working days
Ethical Hacking - Best Tips and Tricks of Ethical Hacking (Paperback): Elijah Lewis Ethical Hacking - Best Tips and Tricks of Ethical Hacking (Paperback)
Elijah Lewis
R487 Discovery Miles 4 870 Ships in 18 - 22 working days
I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and... I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Cross Site Scripting - XSS Defense Made Easy (Paperback): Harvey Berman Cross Site Scripting - XSS Defense Made Easy (Paperback)
Harvey Berman
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback): Amir... You Can't Afford to Get Hacked - The must-have practical guide to keeping your household safe online (Paperback)
Amir Roknifard, Amjad Pirotti
R373 Discovery Miles 3 730 Ships in 18 - 22 working days
Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Hawaiian Mythology
Martha Warren Beckwith Paperback R945 R874 Discovery Miles 8 740
Ghosts of the Queen Mary
Brian Clune Paperback R496 R463 Discovery Miles 4 630
Marblehead Myths, Legends and Lore
Pam Matthias Peterson Paperback R492 R458 Discovery Miles 4 580
Dune: Part 1
Timothee Chalamet, Rebecca Ferguson, … Blu-ray disc  (4)
R346 Discovery Miles 3 460
Batman: The Doom That Came To Gotham
DVD R299 R227 Discovery Miles 2 270
Folklore, Culture, and Aging - A…
David P. Shuldiner Hardcover R2,448 R2,222 Discovery Miles 22 220
Roald Dahl's The Witches
Anne Hathaway, Octavia Spencer, … DVD  (1)
R511 R227 Discovery Miles 2 270
The Timely Pearl
Luc Kwanten Hardcover R4,915 Discovery Miles 49 150
Clifford The Big Red Dog
Jack Whitehall, John Cleese, … DVD R176 Discovery Miles 1 760
Fantastic Beasts 3 - The Secrets Of…
Eddie Redmayne, Jude Law, … DVD  (1)
R271 Discovery Miles 2 710

 

Partners