0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (123)
  • R250 - R500 (226)
  • R500+ (757)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R358 R339 Discovery Miles 3 390 Save R19 (5%) Ships in 18 - 22 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R249 Discovery Miles 2 490 Ships in 18 - 22 working days
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback): David Tracey The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback)
David Tracey
R339 Discovery Miles 3 390 Ships in 18 - 22 working days
Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback): Shamrock Logbook Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback)
Shamrock Logbook
R197 Discovery Miles 1 970 Ships in 18 - 22 working days
The Language of Cybersecurity (Paperback): Maria Antonieta Flores The Language of Cybersecurity (Paperback)
Maria Antonieta Flores
R643 Discovery Miles 6 430 Ships in 18 - 22 working days
Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback)
Harris Schwartz
R546 Discovery Miles 5 460 Ships in 18 - 22 working days
I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback): Fletcher Press I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback)
Fletcher Press
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,143 Discovery Miles 11 430 Ships in 18 - 22 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- White (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- White (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design... All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design Gift (Paperback)
The Yellow Brush
R283 Discovery Miles 2 830 Ships in 18 - 22 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,462 Discovery Miles 14 620 Ships in 18 - 22 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

The Modern Parent - Raising a great kid in the digital world (Paperback): Martine Oglethorpe The Modern Parent - Raising a great kid in the digital world (Paperback)
Martine Oglethorpe
R449 Discovery Miles 4 490 Ships in 18 - 22 working days
The Implant (Paperback): Robert L. Ivey The Implant (Paperback)
Robert L. Ivey
R166 R157 Discovery Miles 1 570 Save R9 (5%) Ships in 18 - 22 working days
Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback): Richard... Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback)
Richard Diver, Gary Bushey; Foreword by Jason S. Rader
R941 Discovery Miles 9 410 Ships in 18 - 22 working days

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is forThis book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R333 Discovery Miles 3 330 Ships in 18 - 22 working days
I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Purple (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Purple (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
What the Heck Is My Password? (Paperback): Beth Casey What the Heck Is My Password? (Paperback)
Beth Casey
R224 Discovery Miles 2 240 Ships in 18 - 22 working days
Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,604 Discovery Miles 26 040 Ships in 18 - 22 working days
Happy 21st Birthday - Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better... Happy 21st Birthday - Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better Than a Birthday Card! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R191 Discovery Miles 1 910 Ships in 18 - 22 working days
Protect Your Identity - Step-by-Step Guide and Workbook (Paperback): Carrie Kerskie Protect Your Identity - Step-by-Step Guide and Workbook (Paperback)
Carrie Kerskie
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
UAG Essential Armor Tablet Case - Apple…
R999 R929 Discovery Miles 9 290
Die Verevrou
Jan van Tonder Paperback R350 R312 Discovery Miles 3 120
Samsung Original Smart Book Case…
R1,999 R1,809 Discovery Miles 18 090
Book Lovers
Emily Henry Paperback  (4)
R275 R254 Discovery Miles 2 540
A Mother's Love
Danielle Steel Paperback R385 R349 Discovery Miles 3 490
Written in the Wind
Kathryn Kaleigh Hardcover R603 R552 Discovery Miles 5 520
Hauntings
Niq Mhlongo Paperback R280 R259 Discovery Miles 2 590
Unnatural Death
Patricia Cornwell Paperback R452 Discovery Miles 4 520
Needlework and Crafts - Every Woman's…
Irene Davison Hardcover R1,142 Discovery Miles 11 420
Children and Young People's Worlds…
Heather Montgomery, Mary Kellett Hardcover R2,766 Discovery Miles 27 660

 

Partners