0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (762)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

I'm Dead, But My Password Is Not (Paperback): Josh K Howard I'm Dead, But My Password Is Not (Paperback)
Josh K Howard
R267 Discovery Miles 2 670 Ships in 18 - 22 working days
Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C... Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C (Paperback)
National Institute of Standards and Tech
R707 Discovery Miles 7 070 Ships in 18 - 22 working days
Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,102 Discovery Miles 11 020 Ships in 18 - 22 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R358 R339 Discovery Miles 3 390 Save R19 (5%) Ships in 18 - 22 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R249 Discovery Miles 2 490 Ships in 18 - 22 working days
Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events... Designing a HIPAA-Compliant Security Operations Center - A Guide to Detecting and Responding to Healthcare Breaches and Events (Paperback, 1st ed.)
Eric C. Thompson
R1,195 R998 Discovery Miles 9 980 Save R197 (16%) Ships in 18 - 22 working days

Develop a comprehensive plan for building a HIPAA-compliant security operations center, designed to detect and respond to an increasing number of healthcare data breaches and events. Using risk analysis, assessment, and management data combined with knowledge of cybersecurity program maturity, this book gives you the tools you need to operationalize threat intelligence, vulnerability management, security monitoring, and incident response processes to effectively meet the challenges presented by healthcare's current threats. Healthcare entities are bombarded with data. Threat intelligence feeds, news updates, and messages come rapidly and in many forms such as email, podcasts, and more. New vulnerabilities are found every day in applications, operating systems, and databases while older vulnerabilities remain exploitable. Add in the number of dashboards, alerts, and data points each information security tool provides and security teams find themselves swimming in oceans of data and unsure where to focus their energy. There is an urgent need to have a cohesive plan in place to cut through the noise and face these threats. Cybersecurity operations do not require expensive tools or large capital investments. There are ways to capture the necessary data. Teams protecting data and supporting HIPAA compliance can do this. All that's required is a plan-which author Eric Thompson provides in this book. What You Will Learn Know what threat intelligence is and how you can make it useful Understand how effective vulnerability management extends beyond the risk scores provided by vendors Develop continuous monitoring on a budget Ensure that incident response is appropriate Help healthcare organizations comply with HIPAA Who This Book Is For Cybersecurity, privacy, and compliance professionals working for organizations responsible for creating, maintaining, storing, and protecting patient information.

The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback): David Tracey The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback)
David Tracey
R339 Discovery Miles 3 390 Ships in 18 - 22 working days
Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback): Shamrock Logbook Password Book - Include Alphabetical Index With Black Seamless Floral Pattern (Paperback)
Shamrock Logbook
R197 Discovery Miles 1 970 Ships in 18 - 22 working days
The Language of Cybersecurity (Paperback): Maria Antonieta Flores The Language of Cybersecurity (Paperback)
Maria Antonieta Flores
R643 Discovery Miles 6 430 Ships in 18 - 22 working days
Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback): Harris Schwartz Operation Espionage - the Spy Within: A Primer on Risk Mitigation (Paperback)
Harris Schwartz
R546 Discovery Miles 5 460 Ships in 18 - 22 working days
I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback): Fletcher Press I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback)
Fletcher Press
R179 Discovery Miles 1 790 Ships in 18 - 22 working days
Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,204 Discovery Miles 12 040 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R445 R414 Discovery Miles 4 140 Save R31 (7%) Ships in 18 - 22 working days
Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R5,923 Discovery Miles 59 230 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- White (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- White (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design... All the Shit I Can't Remember - Password Keeper and Finder Notebook w/ White & Green Paint on House Wall Texture Design Gift (Paperback)
The Yellow Brush
R283 Discovery Miles 2 830 Ships in 18 - 22 working days
Building an Effective Cybersecurity Program (Paperback, 2nd ed.): Tari Schreider Building an Effective Cybersecurity Program (Paperback, 2nd ed.)
Tari Schreider
R2,061 Discovery Miles 20 610 Ships in 18 - 22 working days
The Implant (Paperback): Robert L. Ivey The Implant (Paperback)
Robert L. Ivey
R166 R157 Discovery Miles 1 570 Save R9 (5%) Ships in 18 - 22 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R333 Discovery Miles 3 330 Ships in 18 - 22 working days
I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Purple (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Purple (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
WTF Is My Password - Internet Password Logbook- Black (Paperback): River Valley Journals WTF Is My Password - Internet Password Logbook- Black (Paperback)
River Valley Journals
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Jump - A Memoir
Lenerd Louw Paperback R304 Discovery Miles 3 040
Burchell's African Odyssey - Revealing…
Roger Stewart, Marion Whitehead Hardcover  (2)
R470 R419 Discovery Miles 4 190
Land of Cinnamon Sun
John Nizalowski Hardcover R757 Discovery Miles 7 570
In Code - Poems
Maryann Corbett Hardcover R662 R591 Discovery Miles 5 910
Legends - People Who Changed South…
Matthew Blackman, Nick Dall Paperback R360 R332 Discovery Miles 3 320
Quite Literally - Problem Words and How…
Wynford Hicks Paperback R1,472 Discovery Miles 14 720
Gesenius' Hebrew Grammar
Wilhelm. Gesenius Paperback R570 Discovery Miles 5 700
Order and Structure in Syntax I
Laura R Bailey, Michelle Sheehan Hardcover R1,388 Discovery Miles 13 880
Over 200 English Irregular Verbs - Part…
Dictionopolis Hardcover R412 Discovery Miles 4 120
Black Tax - Burden Or Ubuntu?
Niq Mhlongo Paperback  (2)
R340 R304 Discovery Miles 3 040

 

Partners