0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (226)
  • R500+ (758)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

WTF Is My Password - Internet Password Logbook- Purple (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Purple (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
What the Heck Is My Password? (Paperback): Beth Casey What the Heck Is My Password? (Paperback)
Beth Casey
R224 Discovery Miles 2 240 Ships in 18 - 22 working days
Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback):... Codaspy'19 - Proceedings of the 2019 International Symposium on Data and Application Security and Privacy (Paperback)
Codaspy'19
R2,604 Discovery Miles 26 040 Ships in 18 - 22 working days
Happy 21st Birthday - Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better... Happy 21st Birthday - Discreet Website Password Book with Beautiful Lion Design Makes the Perfect Birthday Gift! Way Better Than a Birthday Card! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R191 Discovery Miles 1 910 Ships in 18 - 22 working days
Protect Your Identity - Step-by-Step Guide and Workbook (Paperback): Carrie Kerskie Protect Your Identity - Step-by-Step Guide and Workbook (Paperback)
Carrie Kerskie
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral... I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif (Paperback)
Sam Secure
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS... AWS Security Cookbook - Practical solutions for managing security policies, monitoring, auditing, and compliance with AWS (Paperback)
Heartin Kanikathottu
R1,384 Discovery Miles 13 840 Ships in 18 - 22 working days

Secure your Amazon Web Services (AWS) infrastructure with permission policies, key management, and network security, along with following cloud security best practices Key Features Explore useful recipes for implementing robust cloud security solutions on AWS Monitor your AWS infrastructure and workloads using CloudWatch, CloudTrail, config, GuardDuty, and Macie Prepare for the AWS Certified Security-Specialty exam by exploring various security models and compliance offerings Book DescriptionAs a security consultant, securing your infrastructure by implementing policies and following best practices is critical. This cookbook discusses practical solutions to the most common problems related to safeguarding infrastructure, covering services and features within AWS that can help you implement security models such as the CIA triad (confidentiality, integrity, and availability), and the AAA triad (authentication, authorization, and availability), along with non-repudiation. The book begins with IAM and S3 policies and later gets you up to speed with data security, application security, monitoring, and compliance. This includes everything from using firewalls and load balancers to secure endpoints, to leveraging Cognito for managing users and authentication. Over the course of this book, you'll learn to use AWS security services such as Config for monitoring, as well as maintain compliance with GuardDuty, Macie, and Inspector. Finally, the book covers cloud security best practices and demonstrates how you can integrate additional security services such as Glacier Vault Lock and Security Hub to further strengthen your infrastructure. By the end of this book, you'll be well versed in the techniques required for securing AWS deployments, along with having the knowledge to prepare for the AWS Certified Security - Specialty certification. What you will learn Create and manage users, groups, roles, and policies across accounts Use AWS Managed Services for logging, monitoring, and auditing Check compliance with AWS Managed Services that use machine learning Provide security and availability for EC2 instances and applications Secure data using symmetric and asymmetric encryption Manage user pools and identity pools with federated login Who this book is forIf you are an IT security professional, cloud security architect, or a cloud application developer working on security-related roles and are interested in using AWS infrastructure for secure application deployments, then this Amazon Web Services book is for you. You will also find this book useful if you're looking to achieve AWS certification. Prior knowledge of AWS and cloud computing is required to get the most out of this book.

Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An... Cybersecurity - What You Need to Know About Computer and Cyber Security, Social Engineering, The Internet of Things + An Essential Guide to Ethical Hacking for Beginners (Hardcover)
Lester Evans
R846 R582 Discovery Miles 5 820 Save R264 (31%) Ships in 9 - 17 working days
Cyber Security - Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (Paperback): Brian... Cyber Security - Comprehensive Beginners Guide to Learn the Basics and Effective Methods of Cyber Security (Paperback)
Brian Walker
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location -Red Cover (Paperback):... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location -Red Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,483 Discovery Miles 14 830 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Olive Green Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Olive Green Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Pond of Scams (Paperback): Tolu Ayoade Pond of Scams (Paperback)
Tolu Ayoade
R232 Discovery Miles 2 320 Ships in 18 - 22 working days
Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit... Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit (Paperback)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
R1,512 Discovery Miles 15 120 Ships in 18 - 22 working days

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is forThis Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback):... Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback)
Family's Books
R174 Discovery Miles 1 740 Ships in 18 - 22 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
My Personal's Helper, Where's My Password - Password Log Password Reminder Collect Password Into the Same Book... My Personal's Helper, Where's My Password - Password Log Password Reminder Collect Password Into the Same Book (Paperback)
Jo Bora
R149 Discovery Miles 1 490 Ships in 18 - 22 working days
Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance... Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life (Two Book Bundle) (Paperback)
Trust Genics
R473 Discovery Miles 4 730 Ships in 18 - 22 working days
Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy &... Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and... I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,137 Discovery Miles 71 370
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R401 Discovery Miles 4 010
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,099 Discovery Miles 10 990
The Online World, What You Think You…
Rania Mankarious Hardcover R827 Discovery Miles 8 270
Permanent Record
Edward Snowden Paperback R299 R271 Discovery Miles 2 710
Using Computational Intelligence for the…
Romil Rawat, Upinder Kaur, … Hardcover R6,212 Discovery Miles 62 120
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Intelligent Data Analysis for e-Learning…
Jorge Miguel, Santi Caballe, … Paperback R2,520 R2,325 Discovery Miles 23 250
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R8,027 Discovery Miles 80 270

 

Partners