0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (228)
  • R500+ (763)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback): Simple Start Guides Password Keeper - Save Passwords - Wi-Fi Log-Ins - Software Licenses (Paperback)
Simple Start Guides
R250 Discovery Miles 2 500 Ships in 18 - 22 working days
Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,098 Discovery Miles 10 980 Ships in 18 - 22 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking... C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R538 Discovery Miles 5 380 Ships in 18 - 22 working days
The Human Firewall - Cybersecurity is not just an IT problem (Paperback): Rob May The Human Firewall - Cybersecurity is not just an IT problem (Paperback)
Rob May
R260 Discovery Miles 2 600 Ships in 18 - 22 working days
The Expanding Cyber Threat (Paperback): Subcommittee on Research and Technology The Expanding Cyber Threat (Paperback)
Subcommittee on Research and Technology
R495 Discovery Miles 4 950 Ships in 18 - 22 working days
Examining the President's Cybersecurity Information-Sharing Proposal (Paperback): Committee on Homeland Security House of Examining the President's Cybersecurity Information-Sharing Proposal (Paperback)
Committee on Homeland Security House of
R397 Discovery Miles 3 970 Ships in 18 - 22 working days
Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback): Infrastru Subcommittee on... Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback)
Infrastru Subcommittee on Cybersecurity
R396 Discovery Miles 3 960 Ships in 18 - 22 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R348 Discovery Miles 3 480 Ships in 18 - 22 working days
Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R527 Discovery Miles 5 270 Ships in 18 - 22 working days
Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback): Codaspy Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback)
Codaspy
R2,789 Discovery Miles 27 890 Ships in 18 - 22 working days
Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback): John a Schaefer Protecting Your Assets - A Cybersecurity Guide for Small Businesses (Paperback)
John a Schaefer
R535 R490 Discovery Miles 4 900 Save R45 (8%) Ships in 18 - 22 working days
Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R280 Discovery Miles 2 800 Ships in 18 - 22 working days
The Personal Internet and Password Log (Paperback): Gary Wittmann The Personal Internet and Password Log (Paperback)
Gary Wittmann
R180 Discovery Miles 1 800 Ships in 18 - 22 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R521 Discovery Miles 5 210 Ships in 18 - 22 working days
Protect Your Online Identity Like Your Virginity (Paperback): Abhishek Singh Rajpurohit Protect Your Online Identity Like Your Virginity (Paperback)
Abhishek Singh Rajpurohit
R447 Discovery Miles 4 470 Ships in 18 - 22 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,052 Discovery Miles 10 520 Ships in 18 - 22 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R358 R332 Discovery Miles 3 320 Save R26 (7%) Ships in 18 - 22 working days
Cyber Ethics 4.0 - Serving Humanity with Values (Paperback): Christoph Stuckelberger, Pavan Duggal Cyber Ethics 4.0 - Serving Humanity with Values (Paperback)
Christoph Stuckelberger, Pavan Duggal
R792 Discovery Miles 7 920 Ships in 18 - 22 working days
Bug Bounty Hunting Essentials - Quick-paced guide to help white-hat hackers get through bug bounty programs (Paperback): Carlos... Bug Bounty Hunting Essentials - Quick-paced guide to help white-hat hackers get through bug bounty programs (Paperback)
Carlos A. Lozano, Shahmeer Amir
R1,060 Discovery Miles 10 600 Ships in 18 - 22 working days

Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals. What you will learn Learn the basics of bug bounty hunting Hunt bugs in web applications Hunt bugs in Android applications Analyze the top 300 bug reports Discover bug bounty hunting research methodologies Explore different tools used for Bug Hunting Who this book is forThis book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.

Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R617 Discovery Miles 6 170 Ships in 18 - 22 working days
Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback): Jason Healey, Robert K. Knake Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback)
Jason Healey, Robert K. Knake
R407 Discovery Miles 4 070 Ships in 18 - 22 working days
Cybersecurity Primer (Paperback): Victor M. Font Jr Cybersecurity Primer (Paperback)
Victor M. Font Jr
R425 R390 Discovery Miles 3 900 Save R35 (8%) Ships in 18 - 22 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback): Bruce Johnston How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback)
Bruce Johnston; Edited by Lisa Zahn; Patrick X. Gallagher
R344 Discovery Miles 3 440 Ships in 18 - 22 working days
Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Free and Open Source Enterprise Resource…
Rogerio Atem De Carvalho, Bjoern Johansson Hardcover R4,895 Discovery Miles 48 950
Bilingualism - Basic Principles
Hugo Baetens Beardsmore Paperback R1,554 Discovery Miles 15 540
Level 3: Poptropica English Space Island…
Nicola Schofield Paperback R242 Discovery Miles 2 420
Cybersecurity for Connected Medical…
Arnab Ray Paperback R2,061 Discovery Miles 20 610
Bilingualism: A Social Approach
M. Heller Hardcover R2,686 Discovery Miles 26 860
Autopoiesis and Self-Sustaining…
Malgorzata Pankowska Hardcover R7,484 Discovery Miles 74 840
The Changing Face of the "Native…
Nikolay Slavkov, Silvia Melo-Pfeifer, … Hardcover R3,643 Discovery Miles 36 430
Soulful Business Journal - Grow your…
Eos Koch Hardcover R729 Discovery Miles 7 290
The C++ Project - A companion for…
Marcos Tewfiq Hardcover R1,372 Discovery Miles 13 720
Computer Programming The Doctrine 2.0…
Adesh Silva Hardcover R698 R621 Discovery Miles 6 210

 

Partners