0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (169)
  • R250 - R500 (201)
  • R500+ (861)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Apple Card and Apple Pay - A Ridiculously Simple Guide to Mobile Payments (Paperback): Scott La Counte Apple Card and Apple Pay - A Ridiculously Simple Guide to Mobile Payments (Paperback)
Scott La Counte
R152 R124 Discovery Miles 1 240 Save R28 (18%) Ships in 10 - 15 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,576 Discovery Miles 15 760 Ships in 10 - 15 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral... I'll Never Forget You - Discrete Internet Password Manager to Keep Your Private Information Safe - With Beautiful Floral Motif (Paperback)
Sam Secure
R176 Discovery Miles 1 760 Ships in 10 - 15 working days
Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback): Elijah Lewis Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback)
Elijah Lewis
R505 Discovery Miles 5 050 Ships in 10 - 15 working days
Hacking Tools for Computers - The Crash Course for Beginners to Learn Hacking and How to Use Kali Linux. Practical Step-by-Step... Hacking Tools for Computers - The Crash Course for Beginners to Learn Hacking and How to Use Kali Linux. Practical Step-by-Step Examples to Learn How to Use Hacking Tools, Easily and in a Short Time (Paperback)
Daniel Geron
R463 Discovery Miles 4 630 Ships in 10 - 15 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback):... Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback)
Elijah Lewis
R530 Discovery Miles 5 300 Ships in 10 - 15 working days
Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy &... Personal Password Keeper - Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R177 Discovery Miles 1 770 Ships in 10 - 15 working days
Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover): Heather Nickerson Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover)
Heather Nickerson
R443 Discovery Miles 4 430 Ships in 10 - 15 working days
Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Red And White Cover (Paperback)
Norman M Pray
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R498 R403 Discovery Miles 4 030 Save R95 (19%) Ships in 10 - 15 working days
Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover): Alex Wagner Hacking with Kali Linux - Penetration Testing Hacking Bible (Hardcover)
Alex Wagner
R1,064 R860 Discovery Miles 8 600 Save R204 (19%) Ships in 10 - 15 working days
Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R522 R429 Discovery Miles 4 290 Save R93 (18%) Ships in 10 - 15 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R177 Discovery Miles 1 770 Ships in 10 - 15 working days
Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover): Stepan Mykolayovych Bilan,... Handbook of Research on Intelligent Data Processing and Information Security Systems (Hardcover)
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi
R10,511 Discovery Miles 105 110 Ships in 10 - 15 working days

Intelligent technologies have emerged as imperative tools in computer science and information security. However, advanced computing practices have preceded new methods of attacks on the storage and transmission of data. Developing approaches such as image processing and pattern recognition are susceptible to breaches in security. Modern protection methods for these innovative techniques require additional research. The Handbook of Research on Intelligent Data Processing and Information Security Systems provides emerging research exploring the theoretical and practical aspects of cyber protection and applications within computer science and telecommunications. Special attention is paid to data encryption, steganography, image processing, and recognition, and it targets professionals who want to improve their knowledge in order to increase strategic capabilities and organizational effectiveness. As such, this book is ideal for analysts, programmers, computer engineers, software engineers, mathematicians, data scientists, developers, IT specialists, academicians, researchers, and students within fields of information technology, information security, robotics, artificial intelligence, image processing, computer science, and telecommunications.

Protect Your Online Identity Like Your Virginity (Paperback): Abhishek Singh Rajpurohit Protect Your Online Identity Like Your Virginity (Paperback)
Abhishek Singh Rajpurohit
R431 Discovery Miles 4 310 Ships in 10 - 15 working days
Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit... Improving your Penetration Testing Skills - Strengthen your defense against web attacks with Kali Linux and Metasploit (Paperback)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari, Daniel Teixeira, Abhinav Singh
R1,470 Discovery Miles 14 700 Ships in 10 - 15 working days

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book DescriptionPenetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is forThis Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback)
Peter Paker P K
R216 Discovery Miles 2 160 Ships in 10 - 15 working days
Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback): Brian... Ethical Hacking - Comprehensive Beginner's Guide to Learn and Understand the Realms of Ethical Hacking (Paperback)
Brian Walker
R514 Discovery Miles 5 140 Ships in 10 - 15 working days
Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback): Hidaia Mahmooa Alassouli Configuration of Microsoft ISA Proxy Server and Linux Squid Proxy Server (Paperback)
Hidaia Mahmooa Alassouli
R418 Discovery Miles 4 180 Ships in 10 - 15 working days
Control Shift - How Technology Affects You and Your Rights (Paperback): David Meyer Control Shift - How Technology Affects You and Your Rights (Paperback)
David Meyer
R323 Discovery Miles 3 230 Ships in 10 - 15 working days
Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover): Scott N... Cybersecurity Is Everybody's Business - Solve the Security Puzzle for Your Small Business and Home (Hardcover)
Scott N Schober, Craig W Schober
R818 R680 Discovery Miles 6 800 Save R138 (17%) Ships in 10 - 15 working days
Keeping Track of - Passwords (Paperback): Susan Alison Keeping Track of - Passwords (Paperback)
Susan Alison
R202 Discovery Miles 2 020 Ships in 10 - 15 working days
Building an Effective Cybersecurity Program (Paperback, 2nd ed.): Tari Schreider Building an Effective Cybersecurity Program (Paperback, 2nd ed.)
Tari Schreider
R2,296 Discovery Miles 22 960 Ships in 10 - 15 working days
Security and Privacy Management, Techniques, and Protocols (Hardcover): Yassine Maleh Security and Privacy Management, Techniques, and Protocols (Hardcover)
Yassine Maleh
R5,739 Discovery Miles 57 390 Ships in 10 - 15 working days

The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.

Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R177 Discovery Miles 1 770 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,911 Discovery Miles 29 110
CIPM Certified Information Privacy…
Peter Gregory Paperback R1,032 Discovery Miles 10 320
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R380 R297 Discovery Miles 2 970
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R290 R232 Discovery Miles 2 320
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,507 Discovery Miles 65 070
The California Consumer Privacy Act…
Preston Bukaty Paperback R892 Discovery Miles 8 920
PCI Compliance - Understand and…
Branden Williams, James Adamson Paperback R1,370 Discovery Miles 13 700
Blockchain Technology - Exploring…
Sonali Vyas, Vinod Kumar Shukla, … Paperback R1,913 Discovery Miles 19 130
Hands-On Ethical Hacking and Network…
Rob Wilson Paperback R1,416 R1,260 Discovery Miles 12 600
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R754 Discovery Miles 7 540

 

Partners