0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (126)
  • R250 - R500 (241)
  • R500+ (795)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Internet Password Organizer - Flowers (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Flowers (Password Log Book) (Paperback)
Peter Paker P K
R208 Discovery Miles 2 080 Ships in 18 - 22 working days
I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and... I Know Your Dirty Little Secret - Cool Weed Design Manager to Protect Usernames and Passwords for Internet Websites and Services - With Tabs (Paperback)
Secure Publishing
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
Cross Site Scripting - XSS Defense Made Easy (Paperback): Harvey Berman Cross Site Scripting - XSS Defense Made Easy (Paperback)
Harvey Berman
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,098 Discovery Miles 10 980 Ships in 18 - 22 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Large (6 x 9 inches) - 100 Pages - Black Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses... Password Keeper - Size (6 x 9 inches) - 100 Pages - Anchor Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and... Password Keeper - Size (6 x 9 inches) - 100 Pages - Lilac Cover: Keep your usernames, passwords, social info, web addresses and security questions in one. So easy & organized (Paperback)
Dorothy J Hall
R171 Discovery Miles 1 710 Ships in 18 - 22 working days
Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback): Ethan Thorpe Kali Linux - Simple and Effective Approach to Learn Kali Linux (Paperback)
Ethan Thorpe
R499 Discovery Miles 4 990 Ships in 18 - 22 working days
Oops! I Forgot Password (Paperback): Dorothy J Hall Oops! I Forgot Password (Paperback)
Dorothy J Hall
R162 Discovery Miles 1 620 Ships in 18 - 22 working days
What is the Dark Web? - The truth about the hidden part of the internet (Paperback): Evan J Rodgers What is the Dark Web? - The truth about the hidden part of the internet (Paperback)
Evan J Rodgers
R323 Discovery Miles 3 230 Ships in 18 - 22 working days
Cybercon - Protecting Ourselves from Big Tech & Bigger Lies (Paperback): James L Norrie Cybercon - Protecting Ourselves from Big Tech & Bigger Lies (Paperback)
James L Norrie
R457 Discovery Miles 4 570 Ships in 18 - 22 working days
Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover): Heather Nickerson Shield Your Privacy - 15 Ways To Protect Your Personal Information (Hardcover)
Heather Nickerson
R428 Discovery Miles 4 280 Ships in 18 - 22 working days
I'm Dead, But My Password Is Not (Paperback): Josh K Howard I'm Dead, But My Password Is Not (Paperback)
Josh K Howard
R267 Discovery Miles 2 670 Ships in 18 - 22 working days
Hacking With Kali Linux - A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples... Hacking With Kali Linux - A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing (Paperback)
Peter Bradley
R468 Discovery Miles 4 680 Ships in 18 - 22 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,423 Discovery Miles 14 230 Ships in 18 - 22 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C... Protecting the Integrity of Internet Routing - Border Gateway Protocol (BGP) Route Origin Validation: NIST SP 1800-14A, B & C (Paperback)
National Institute of Standards and Tech
R707 Discovery Miles 7 070 Ships in 18 - 22 working days
Location Privacy in Mobile Applications (Paperback, 1st ed. 2018): Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang Location Privacy in Mobile Applications (Paperback, 1st ed. 2018)
Bo Liu, Wanlei Zhou, Tianqing Zhu, Yong Xiang, Kun Wang
R1,408 Discovery Miles 14 080 Ships in 18 - 22 working days

This book provides a comprehensive study of the state of the art in location privacy for mobile applications. It presents an integrated five-part framework for location privacy research, which includes the analysis of location privacy definitions, attacks and adversaries, location privacy protection methods, location privacy metrics, and location-based mobile applications. In addition, it analyses the relationships between the various elements of location privacy, and elaborates on real-world attacks in a specific application. Furthermore, the book features case studies of three applications and shares valuable insights into future research directions. Shedding new light on key research issues in location privacy and promoting the advance and development of future location-based mobile applications, it will be of interest to a broad readership, from students to researchers and engineers in the field.

Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback): Yuri A Bogachev Darknet Secrets - A Beginner's Underground Playbook To The Secrets Of Staying Anonymous Online (Paperback)
Yuri A Bogachev
R311 R288 Discovery Miles 2 880 Save R23 (7%) Ships in 18 - 22 working days
Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback):... Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback)
Family's Books
R174 Discovery Miles 1 740 Ships in 18 - 22 working days
Your Safety and Privacy Online - The CIA and NSA (Paperback): Siggi Bjarnason Your Safety and Privacy Online - The CIA and NSA (Paperback)
Siggi Bjarnason
R289 R274 Discovery Miles 2 740 Save R15 (5%) Ships in 18 - 22 working days
Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network... Hacking For Beginners - Discover Secrets Of Underground Hacking And Penetration Testing And Learn How To Keep Your Own Network Safe (Paperback)
Yuri A Bogachev
R312 R289 Discovery Miles 2 890 Save R23 (7%) Ships in 18 - 22 working days
Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage... Cybersecurity For Beginners - Discover the Trade's Secret Attack Strategies And Learn Essential Prevention And Damage Control Mechanism (Paperback)
Yuri A Bogachev
R331 R312 Discovery Miles 3 120 Save R19 (6%) Ships in 18 - 22 working days
The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives... The Weaponization of AI and the Internet - How Global Networks of Infotech Overlords Are Expanding Their Control Over Our Lives (Paperback)
Larry Bell
R358 R339 Discovery Miles 3 390 Save R19 (5%) Ships in 18 - 22 working days
Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and... Anonymize Yourself - The Art of Anonymity to Achieve Your Ambition in the Shadows and Protect Your Identity, Privacy and Reputation (Paperback)
Derek Drake, Instafo
R249 Discovery Miles 2 490 Ships in 18 - 22 working days
The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback): David Tracey The Fraud Prevention (FP)101 Handbook - An Illustrated Guide to Consumer Fraud Awareness (Paperback)
David Tracey
R339 Discovery Miles 3 390 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
Security and Privacy Management…
Yassine Maleh Hardcover R5,124 Discovery Miles 51 240
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,520 Discovery Miles 25 200
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,245 Discovery Miles 32 450
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R349 Discovery Miles 3 490
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R7,215 Discovery Miles 72 150
Cyber Security and Threats - Concepts…
Information Reso Management Association Hardcover R9,416 Discovery Miles 94 160
Handbook of Research on Intelligent Data…
Stepan Mykolayovych Bilan, Saleem Issa Al-Zoubi Hardcover R9,365 Discovery Miles 93 650
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R360 R321 Discovery Miles 3 210

 

Partners