0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (209)
  • R500+ (794)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Web Penetration Testing - Step-By-Step Guide (Paperback): Radhi Shatob Web Penetration Testing - Step-By-Step Guide (Paperback)
Radhi Shatob
R1,011 Discovery Miles 10 110 Ships in 10 - 15 working days
Infinity Ethical Hacking - Learn basic to advance hacks (Paperback): Arthur S Sapp Infinity Ethical Hacking - Learn basic to advance hacks (Paperback)
Arthur S Sapp
R395 Discovery Miles 3 950 Ships in 10 - 15 working days
Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and... Ethical Hacking - A Beginner's Guide to Computer and Wireless Networks Defense Strategies, Penetration Testing and Information Security Risk Assessment (Paperback)
Zach Codings
R426 Discovery Miles 4 260 Ships in 10 - 15 working days
I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback): Fletcher Press I Definitely Don't Forget My Passwords - Basic Internet Password Keeper Book (Paperback)
Fletcher Press
R174 Discovery Miles 1 740 Ships in 10 - 15 working days
Electronic Crime Scene Investigation - A Guide for First Responders (Paperback): Department of Justice Electronic Crime Scene Investigation - A Guide for First Responders (Paperback)
Department of Justice
R474 Discovery Miles 4 740 Ships in 10 - 15 working days
Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance... Algorithms - The Complete Guide To The Computer Science & Artificial Intelligence Used to Solve Human Decisions, Advance Technology, Optimize Habits, Learn Faster & Your Improve Life (Two Book Bundle) (Paperback)
Trust Genics
R537 R462 Discovery Miles 4 620 Save R75 (14%) Ships in 10 - 15 working days
Report of the Attorney General's Cyber Digital Task Force - 2018 (Paperback): Department of Justice Report of the Attorney General's Cyber Digital Task Force - 2018 (Paperback)
Department of Justice
R1,017 Discovery Miles 10 170 Ships in 10 - 15 working days
Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation... Hands-On Web Penetration Testing with Metasploit - The subtle art of using Metasploit 5.0 for web application exploitation (Paperback)
Harpreet Singh, Himanshu Sharma
R1,144 Discovery Miles 11 440 Ships in 10 - 15 working days

Identify, exploit, and test web application security with ease Key Features Get up to speed with Metasploit and discover how to use it for pentesting Understand how to exploit and protect your web environment effectively Learn how an exploit works and what causes vulnerabilities Book DescriptionMetasploit has been a crucial security tool for many years. However, there are only a few modules that Metasploit has made available to the public for pentesting web applications. In this book, you'll explore another aspect of the framework - web applications - which is not commonly used. You'll also discover how Metasploit, when used with its inbuilt GUI, simplifies web application penetration testing. The book starts by focusing on the Metasploit setup, along with covering the life cycle of the penetration testing process. Then, you will explore Metasploit terminology and the web GUI, which is available in the Metasploit Community Edition. Next, the book will take you through pentesting popular content management systems such as Drupal, WordPress, and Joomla, which will also include studying the latest CVEs and understanding the root cause of vulnerability in detail. Later, you'll gain insights into the vulnerability assessment and exploitation of technological platforms such as JBoss, Jenkins, and Tomcat. Finally, you'll learn how to fuzz web applications to find logical security vulnerabilities using third-party tools. By the end of this book, you'll have a solid understanding of how to exploit and validate vulnerabilities by working with various tools and techniques. What you will learn Get up to speed with setting up and installing the Metasploit framework Gain first-hand experience of the Metasploit web interface Use Metasploit for web-application reconnaissance Understand how to pentest various content management systems Pentest platforms such as JBoss, Tomcat, and Jenkins Become well-versed with fuzzing web applications Write and automate penetration testing reports Who this book is forThis book is for web security analysts, bug bounty hunters, security professionals, or any stakeholder in the security sector who wants to delve into web application security testing. Professionals who are not experts with command line tools or Kali Linux and prefer Metasploit's graphical user interface (GUI) will also find this book useful. No experience with Metasploit is required, but basic knowledge of Linux and web application pentesting will be helpful.

Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback):... Cybersecurity essentials - Beginners guide - Step-by-step manual with ten methods to protect your privacy online (Paperback)
Gianluca Amadio, David Costa
R240 Discovery Miles 2 400 Ships in 10 - 15 working days
The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Paperback): Danielle Keats Citron The Fight for Privacy - Protecting Dignity, Identity and Love in the Digital Age (Paperback)
Danielle Keats Citron
R376 Discovery Miles 3 760 Ships in 12 - 17 working days

Danielle Citron takes the conversation about technology and privacy out of the boardrooms and op-eds to reach readers where we are - in our bathrooms and bedrooms; with our families and our lovers; in all the parts of our lives we assume are untouchable - and shows us that privacy, as we think we know it, is largely already gone. The boundary that once protected our intimate lives from outside interests is an artefact of the 20th century. In the 21st, we have embraced a vast array of technology that enables constant access and surveillance of the most private aspects of our lives. From non-consensual pornography, to online extortion, to the sale of our data for profit, we are vulnerable to abuse. As Citron reveals, wherever we live, laws have failed miserably to keep up with corporate or individual violators, letting our privacy wash out with the technological tide. And the erosion of intimate privacy in particular, Citron argues, holds immense toxic power to transform our lives and our societies for the worse (and already has). With vivid examples drawn from interviews with victims, activists and lawmakers from around the world, The Fight for Privacy reveals the threat we face and argues urgently and forcefully for a reassessment of privacy as a human right. And, as a legal scholar and expert, Danielle Citron is the perfect person to show us the way to a happier, better protected future.

Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback): George Mansour Unhackable - Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (Paperback)
George Mansour
R500 Discovery Miles 5 000 Ships in 10 - 15 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback):... Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback)
Elijah Lewis
R498 Discovery Miles 4 980 Ships in 10 - 15 working days
Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback): Elijah Lewis Cybersecurity - A Comprehensive Beginner's Guide to learn the Realms of Cybersecurity from A-Z (Paperback)
Elijah Lewis
R475 Discovery Miles 4 750 Ships in 10 - 15 working days
Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback): Winfred Yaokumah, Muttukrishnan Rajarajan,... Modern Theories and Practices for Cyber Ethics and Security Compliance (Paperback)
Winfred Yaokumah, Muttukrishnan Rajarajan, Jamal-Deen Abdulai, Isaac Wiafe, Ferdinand Apietu Katsriku
R4,391 Discovery Miles 43 910 Ships in 10 - 15 working days

In today's globalized world, businesses and governments rely heavily on technology for storing and protecting essential information and data. Despite the benefits that computing systems offer, there remains an assortment of issues and challenges in maintaining the integrity and confidentiality of these databases. As professionals become more dependent cyberspace, there is a need for research on modern strategies and concepts for improving the security and safety of these technologies. Modern Theories and Practices for Cyber Ethics and Security Compliance is a collection of innovative research on the concepts, models, issues, challenges, innovations, and mitigation strategies needed to improve cyber protection. While highlighting topics including database governance, cryptography, and intrusion detection, this book provides guidelines for the protection, safety, and security of business data and national infrastructure from cyber-attacks. It is ideally designed for security analysts, law enforcement, researchers, legal practitioners, policymakers, business professionals, governments, strategists, educators, and students seeking current research on combative solutions for cyber threats and attacks.

Cybersecurity - Best Tips and Tricks to Learn and Secure Your Cyber Networks (Paperback): Elijah Lewis Cybersecurity - Best Tips and Tricks to Learn and Secure Your Cyber Networks (Paperback)
Elijah Lewis
R481 Discovery Miles 4 810 Ships in 10 - 15 working days
Ethical Hacking - Best Tips and Tricks of Ethical Hacking (Paperback): Elijah Lewis Ethical Hacking - Best Tips and Tricks of Ethical Hacking (Paperback)
Elijah Lewis
R475 Discovery Miles 4 750 Ships in 10 - 15 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R461 R379 Discovery Miles 3 790 Save R82 (18%) Ships in 10 - 15 working days
Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback): Richard... Learn Azure Sentinel - Integrate Azure security with artificial intelligence to build secure cloud systems (Paperback)
Richard Diver, Gary Bushey; Foreword by Jason S. Rader
R931 Discovery Miles 9 310 Ships in 10 - 15 working days

Understand how to set up, configure, and use Azure Sentinel to provide security incident and event management services for your environment Key Features Secure your network, infrastructure, data, and applications on Microsoft Azure effectively Integrate artificial intelligence, threat analysis, and automation for optimal security solutions Investigate possible security breaches and gather forensic evidence to prevent modern cyber threats Book DescriptionAzure Sentinel is a Security Information and Event Management (SIEM) tool developed by Microsoft to integrate cloud security and artificial intelligence (AI). Azure Sentinel not only helps clients identify security issues in their environment, but also uses automation to help resolve these issues. With this book, you'll implement Azure Sentinel and understand how it can help find security incidents in your environment with integrated artificial intelligence, threat analysis, and built-in and community-driven logic. This book starts with an introduction to Azure Sentinel and Log Analytics. You'll get to grips with data collection and management, before learning how to create effective Azure Sentinel queries to detect anomalous behaviors and patterns of activity. As you make progress, you'll understand how to develop solutions that automate the responses required to handle security incidents. Finally, you'll grasp the latest developments in security, discover techniques to enhance your cloud security architecture, and explore how you can contribute to the security community. By the end of this book, you'll have learned how to implement Azure Sentinel to fit your needs and be able to protect your environment from cyber threats and other security issues. What you will learn Understand how to design and build a security operations center Discover the key components of a cloud security architecture Manage and investigate Azure Sentinel incidents Use playbooks to automate incident responses Understand how to set up Azure Monitor Log Analytics and Azure Sentinel Ingest data into Azure Sentinel from the cloud and on-premises devices Perform threat hunting in Azure Sentinel Who this book is forThis book is for solution architects and system administrators who are responsible for implementing new solutions in their infrastructure. Security analysts who need to monitor and provide immediate security solutions or threat hunters looking to learn how to use Azure Sentinel to investigate possible security breaches and gather forensic evidence will also benefit from this book. Prior experience with cloud security, particularly Azure, is necessary.

Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in... Cyber Security - How to Protect Your Digital Life, Avoid Identity Theft, Prevent Extortion, and Secure Your Social Privacy in 2020 and beyond (Paperback)
Matt Reyes
R484 R403 Discovery Miles 4 030 Save R81 (17%) Ships in 10 - 15 working days
Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback): Bill Bunnell, Chuck Tomlinson, Chuck Brown Hack Proof Your Business, Volume 2 - Featuring 14 IT Experts Nationwide (Paperback)
Bill Bunnell, Chuck Tomlinson, Chuck Brown
R386 Discovery Miles 3 860 Ships in 10 - 15 working days
Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R337 R281 Discovery Miles 2 810 Save R56 (17%) Ships in 10 - 15 working days
Protect Your Online Identity Like Your Virginity (Paperback): Abhishek Singh Rajpurohit Protect Your Online Identity Like Your Virginity (Paperback)
Abhishek Singh Rajpurohit
R406 Discovery Miles 4 060 Ships in 10 - 15 working days
Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux... Kali Linux - 3 in 1: Beginners Guide+ Simple and Effective Strategies+ Advance Method and Strategies to learn Kali Linux (Paperback)
Ethan Thorpe
R1,065 Discovery Miles 10 650 Ships in 10 - 15 working days
Cybersecurity, Hacking, and Espionage - a beginners guide (Paperback): Abhinav Vaid Cybersecurity, Hacking, and Espionage - a beginners guide (Paperback)
Abhinav Vaid
R163 Discovery Miles 1 630 Ships in 10 - 15 working days
Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Golden Retriever Dog (Password Log Book) (Paperback)
Peter Paker P K
R203 Discovery Miles 2 030 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,692 Discovery Miles 76 920
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Handbook of Research on Medical Data…
Butta Singh, Barjinder Singh Saini, … Hardcover R9,499 Discovery Miles 94 990
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,960 Discovery Miles 99 600
Security, Trust, and Regulatory Aspects…
S. Srinivasan Hardcover R5,134 Discovery Miles 51 340
Advanced Methodologies and Technologies…
Mehdi Khosrowpour Hardcover R7,464 Discovery Miles 74 640
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010

 

Partners