0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (122)
  • R250 - R500 (227)
  • R500+ (757)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback): Codaspy Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback)
Codaspy
R2,789 Discovery Miles 27 890 Ships in 18 - 22 working days
Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R5,923 Discovery Miles 59 230 Ships in 18 - 22 working days
How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback): Bruce Johnston How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback)
Bruce Johnston; Edited by Lisa Zahn; Patrick X. Gallagher
R344 Discovery Miles 3 440 Ships in 18 - 22 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,093 Discovery Miles 10 930 Ships in 18 - 22 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback): Anuj Mishra The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback)
Anuj Mishra
R357 Discovery Miles 3 570 Ships in 18 - 22 working days
Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,244 Discovery Miles 12 440 Ships in 18 - 22 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback): Claire Pales The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback)
Claire Pales
R474 Discovery Miles 4 740 Ships in 18 - 22 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback): Dan Remenyi, Richard L. Wilson Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback)
Dan Remenyi, Richard L. Wilson
R729 Discovery Miles 7 290 Ships in 18 - 22 working days
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R540 Discovery Miles 5 400 Ships in 18 - 22 working days
The GnuTLS 3.6.1 Manual (Paperback): Nikos Mavrogiannopoulos, Simon Josefsson The GnuTLS 3.6.1 Manual (Paperback)
Nikos Mavrogiannopoulos, Simon Josefsson
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
What is the Dark Web? - The truth about the hidden part of the internet (Paperback): Evan J Rodgers What is the Dark Web? - The truth about the hidden part of the internet (Paperback)
Evan J Rodgers
R323 Discovery Miles 3 230 Ships in 18 - 22 working days
Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback): Ajay... Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback)
Ajay Singh Chauhan
R1,122 Discovery Miles 11 220 Ships in 18 - 22 working days

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,206 Discovery Miles 12 060 Ships in 18 - 22 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R832 Discovery Miles 8 320 Ships in 18 - 22 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback): R. Scott Alvord Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback)
R. Scott Alvord; Edited by Kyler S Alvord
R437 R404 Discovery Miles 4 040 Save R33 (8%) Ships in 18 - 22 working days
Security and Privacy in an It World - Managing and Meeting Online Regulatory Compliance in the 21st Century (Paperback): Craig... Security and Privacy in an It World - Managing and Meeting Online Regulatory Compliance in the 21st Century (Paperback)
Craig Mackinder; Designed by Daniel Crack; Edited by Michael Carroll
R359 R335 Discovery Miles 3 350 Save R24 (7%) Ships in 18 - 22 working days
IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback): Jane Frankland IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback)
Jane Frankland
R697 Discovery Miles 6 970 Ships in 18 - 22 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.)
Michael W Lucas
R663 R622 Discovery Miles 6 220 Save R41 (6%) Ships in 18 - 22 working days
Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover): Bryce Austin Secure Enough? - 20 Questions on Cybersecurity for Business Owners and Executives (Hardcover)
Bryce Austin
R968 Discovery Miles 9 680 Ships in 18 - 22 working days
GNU SASL 1.8 Reference Manual (Paperback): Simon Josefsson GNU SASL 1.8 Reference Manual (Paperback)
Simon Josefsson
R404 Discovery Miles 4 040 Ships in 18 - 22 working days
Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made... Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux (Paperback)
Kevin White
R466 Discovery Miles 4 660 Ships in 18 - 22 working days
Cyber Storm V - After Action Report (Paperback): U.S. Department of Homeland Security Cyber Storm V - After Action Report (Paperback)
U.S. Department of Homeland Security
R312 Discovery Miles 3 120 Ships in 18 - 22 working days
The Encrypted Book of Passwords (Paperback, 2nd edition): Raef Meeuwisse The Encrypted Book of Passwords (Paperback, 2nd edition)
Raef Meeuwisse
R287 Discovery Miles 2 870 Ships in 18 - 22 working days
Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R202 Discovery Miles 2 020 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Decolonisation - Revolution & Evolution
David Boucher, Ayesha Omar Paperback R420 R388 Discovery Miles 3 880
New Times
Rehana Rossouw Paperback  (1)
R280 R259 Discovery Miles 2 590
Debates, Resolutions and Other…
Massachusetts. Convention Paperback R464 Discovery Miles 4 640
A Hibiscus Coast
Nick Mulgrew Paperback R336 Discovery Miles 3 360
Vengeance
Wilbur Smith, Tom Harper Hardcover R399 R319 Discovery Miles 3 190
Joburg Noir
Niq Mhlongo Paperback  (2)
R325 Discovery Miles 3 250
The Tea Ladies Of St Jude's Hospital
Joanna Nell Paperback R437 R399 Discovery Miles 3 990
Nicole - The True Story Of A Great White…
Richard Peirce Paperback  (1)
R189 Discovery Miles 1 890
Closing The Gap - The Fourth Industrial…
Tshilidzi Marwala Paperback R559 Discovery Miles 5 590
Crossfire
Wilbur Smith, David Churchill Hardcover R399 R362 Discovery Miles 3 620

 

Partners