0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (243)
  • R500+ (795)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,025 Discovery Miles 10 250 Ships in 18 - 22 working days
Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback): Sandra Estok Happily Ever Cyber! - Protect Yourself Against Hackers, Scammers, and Cybermonsters (Paperback)
Sandra Estok
R536 R491 Discovery Miles 4 910 Save R45 (8%) Ships in 18 - 22 working days
Unmasking the hacker - demystifying cybercrime (Paperback): Amanda-Jane Turner Unmasking the hacker - demystifying cybercrime (Paperback)
Amanda-Jane Turner
R292 Discovery Miles 2 920 Ships in 18 - 22 working days
Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for... Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for Quick Easy Access (Paperback)
Practical Blank Journals
R183 Discovery Miles 1 830 Ships in 18 - 22 working days
The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The... The Successful Privacy Mindset - Proven Security Hacks And Tricks To Protect Yourself From Stalkers And Stay Safe In The Digital Age...Guaranteed! (Paperback)
Jack Norton
R310 Discovery Miles 3 100 Ships in 18 - 22 working days
Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R508 Discovery Miles 5 080 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Purple (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Purple (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback): Ajay... Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback)
Ajay Singh Chauhan
R1,082 Discovery Miles 10 820 Ships in 18 - 22 working days

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Is the OPM Data Breach the Tip of the Iceberg? (Paperback): Subcommittee on Oversight & Subcommittee Is the OPM Data Breach the Tip of the Iceberg? (Paperback)
Subcommittee on Oversight & Subcommittee
R494 Discovery Miles 4 940 Ships in 18 - 22 working days
Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali... Digital Forensics with Kali Linux - Perform data acquisition, data recovery, network forensics, and malware analysis with Kali Linux 2019.x, 2nd Edition (Paperback, 2nd Revised edition)
Shiva V.N Parasram
R1,402 Discovery Miles 14 020 Ships in 18 - 22 working days

Take your forensic abilities and investigation skills to the next level using powerful tools that cater to all aspects of digital forensic investigations, right from hashing to reporting Key Features Perform evidence acquisition, preservation, and analysis using a variety of Kali Linux tools Use PcapXray to perform timeline analysis of malware and network activity Implement the concept of cryptographic hashing and imaging using Kali Linux Book DescriptionKali Linux is a Linux-based distribution that's widely used for penetration testing and digital forensics. It has a wide range of tools to help for digital forensics investigations and incident response mechanisms. This updated second edition of Digital Forensics with Kali Linux covers the latest version of Kali Linux and The Sleuth Kit. You'll get to grips with modern techniques for analysis, extraction, and reporting using advanced tools such as FTK Imager, hex editor, and Axiom. Updated to cover digital forensics basics and advancements in the world of modern forensics, this book will also delve into the domain of operating systems. Progressing through the chapters, you'll explore various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also show you how to create forensic images of data and maintain integrity using hashing tools. Finally, you'll cover advanced topics such as autopsies and acquiring investigation data from networks, operating system memory, and quantum cryptography. By the end of this book, you'll have gained hands-on experience of implementing all the pillars of digital forensics: acquisition, extraction, analysis, and presentation, all using Kali Linux tools. What you will learn Get up and running with powerful Kali Linux tools for digital investigation and analysis Perform internet and memory forensics with Volatility and Xplico Understand filesystems, storage, and data fundamentals Become well-versed with incident response procedures and best practices Perform ransomware analysis using labs involving actual ransomware Carry out network forensics and analysis using NetworkMiner and other tools Who this book is forThis Kali Linux book is for forensics and digital investigators, security analysts, or anyone interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be helpful to gain a better understanding of the concepts covered.

Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback): Larry Bell Cyberwarfare - Targeting America, Our Infrastructure and Our Future (Paperback)
Larry Bell
R566 Discovery Miles 5 660 Ships in 18 - 22 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover (Paperback)
Norman M Pray
R168 Discovery Miles 1 680 Ships in 18 - 22 working days
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback): Bill Bunnell, Chuck Tomlinson, Chuck Brown Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback)
Bill Bunnell, Chuck Tomlinson, Chuck Brown
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and... Elementary... the Art and Science of Finding Information - Achieving More Knowledge Advantage through OSINT - Revised and Expanded Edition (Paperback)
Miguel Fernandez, Alan Millington, Mark Monday
R817 Discovery Miles 8 170 Ships in 18 - 22 working days
Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of... Stuxnet - The Revenge of Malware: How the Discovery of Malware from the Stuxnet Family Led to the U.S. Government Ban of Kaspersky Lab Anti-Virus Software (Paperback)
Roman Poroshyn
R282 Discovery Miles 2 820 Ships in 18 - 22 working days
Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback): Elijah Lewis Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback)
Elijah Lewis
R487 Discovery Miles 4 870 Ships in 18 - 22 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R442 R410 Discovery Miles 4 100 Save R32 (7%) Ships in 18 - 22 working days
Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough... Deaver on Cybersecurity - An irreverent and honest expose of the online security problem, complete with a candid and thorough reveal of its solution (Paperback)
Frederic Scott Deaver
R2,321 R1,898 Discovery Miles 18 980 Save R423 (18%) Ships in 18 - 22 working days
Internet Password Organizer - Flowers (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Flowers (Password Log Book) (Paperback)
Peter Paker P K
R208 Discovery Miles 2 080 Ships in 18 - 22 working days
I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and... I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Cross Site Scripting - XSS Defense Made Easy (Paperback): Harvey Berman Cross Site Scripting - XSS Defense Made Easy (Paperback)
Harvey Berman
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,098 Discovery Miles 10 980 Ships in 18 - 22 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Crash And Burn - A CEO's Crazy…
Glenn Orsmond Paperback R320 R286 Discovery Miles 2 860
Expansive - A Guide To Thinking Bigger…
John Sanei, Erik Kruger Paperback R290 R259 Discovery Miles 2 590
Experiential Approach to Organization…
Donald Brown Paperback  (2)
R2,385 Discovery Miles 23 850
Financial Management - Turning Theory…
J. Fouche Paperback R763 Discovery Miles 7 630
The Other End Of The Telescope - How To…
Ian Russell Paperback R250 R223 Discovery Miles 2 230
Business Management By Portfolio - An…
Louis Botha, Tersia Botha Paperback  (1)
R741 R673 Discovery Miles 6 730
Project Management Techniques
Rory Burke Paperback R550 R503 Discovery Miles 5 030
Practising Strategy - A Southern African…
Peet Venter, Tersia Botha Paperback R586 R549 Discovery Miles 5 490
Relationship Marketing and CRM
M. Tait, M. Robert-Lombard Paperback R632 Discovery Miles 6 320
Entrepreneurship - And How To Establish…
Tersia Botha Paperback R282 Discovery Miles 2 820

 

Partners