0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (215)
  • R500+ (786)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,166 Discovery Miles 11 660 Ships in 18 - 22 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R280 Discovery Miles 2 800 Ships in 18 - 22 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R521 Discovery Miles 5 210 Ships in 18 - 22 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,052 Discovery Miles 10 520 Ships in 18 - 22 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Cyber Ethics 4.0 - Serving Humanity with Values (Paperback): Christoph Stuckelberger, Pavan Duggal Cyber Ethics 4.0 - Serving Humanity with Values (Paperback)
Christoph Stuckelberger, Pavan Duggal
R792 Discovery Miles 7 920 Ships in 18 - 22 working days
Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R617 Discovery Miles 6 170 Ships in 18 - 22 working days
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R540 Discovery Miles 5 400 Ships in 18 - 22 working days
GNU SASL 1.8 Reference Manual (Paperback): Simon Josefsson GNU SASL 1.8 Reference Manual (Paperback)
Simon Josefsson
R404 Discovery Miles 4 040 Ships in 18 - 22 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R531 Discovery Miles 5 310 Ships in 18 - 22 working days
C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking... C++ and Computer Hacking & Mobile Hacking 3 Bundle Manuscript Beginners Guide to Learn C++ Programming with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R538 Discovery Miles 5 380 Ships in 18 - 22 working days
Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R792 Discovery Miles 7 920 Ships in 18 - 22 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback): Anuj Mishra The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback)
Anuj Mishra
R357 Discovery Miles 3 570 Ships in 18 - 22 working days
Cyber Storm V - After Action Report (Paperback): U.S. Department of Homeland Security Cyber Storm V - After Action Report (Paperback)
U.S. Department of Homeland Security
R312 Discovery Miles 3 120 Ships in 18 - 22 working days
Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.): Jan Marshall Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.)
Jan Marshall
R481 R456 Discovery Miles 4 560 Save R25 (5%) Ships in 18 - 22 working days
Don't Step in the Trap - How to Recognize and Avoid Email Phishing Scams (Paperback): Brett W Smith Don't Step in the Trap - How to Recognize and Avoid Email Phishing Scams (Paperback)
Brett W Smith; Illustrated by Antonia R Hughes
R143 Discovery Miles 1 430 Ships in 18 - 22 working days
Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback): Michael Paulhus Simple Internet Safety - The Knowledge You Need to Avoid Being Scammed (Paperback)
Michael Paulhus
R464 Discovery Miles 4 640 Ships in 18 - 22 working days
Enterprise Cloud Security and Governance (Paperback): Zeal Vora Enterprise Cloud Security and Governance (Paperback)
Zeal Vora
R1,203 Discovery Miles 12 030 Ships in 18 - 22 working days

Build a resilient cloud architecture to tackle data disasters with ease About This Book * Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform * Practical examples to ensure you secure your Cloud environment efficiently * A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn * Configure your firewall and Network ACL * Protect your system against DDOS and application-level attacks * Explore cryptography and data security for your cloud * Get to grips with configuration management tools to automate your security tasks * Perform vulnerability scanning with the help of the standard tools in the industry * Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback): Jane Frankland IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback)
Jane Frankland
R697 Discovery Miles 6 970 Ships in 18 - 22 working days
The GnuTLS 3.6.1 Manual (Paperback): Nikos Mavrogiannopoulos, Simon Josefsson The GnuTLS 3.6.1 Manual (Paperback)
Nikos Mavrogiannopoulos, Simon Josefsson
R623 Discovery Miles 6 230 Ships in 18 - 22 working days
Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback): Max Nomad Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback)
Max Nomad
R699 R629 Discovery Miles 6 290 Save R70 (10%) Ships in 18 - 22 working days
Tor - Access the Dark Net, Stay Anonymous Online and Escape NSA Spying (Paperback): Evan Lane Tor - Access the Dark Net, Stay Anonymous Online and Escape NSA Spying (Paperback)
Evan Lane
R386 Discovery Miles 3 860 Ships in 18 - 22 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.)
Michael W Lucas
R663 R622 Discovery Miles 6 220 Save R41 (6%) Ships in 18 - 22 working days
Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback): R. Scott Alvord Locking the Cookie Jar - How to Protect Against Embezzlement, Identity Theft, and Hackers (Paperback)
R. Scott Alvord; Edited by Kyler S Alvord
R437 R404 Discovery Miles 4 040 Save R33 (8%) Ships in 18 - 22 working days
Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback): M Blaine Faulkner Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback)
M Blaine Faulkner
R354 Discovery Miles 3 540 Ships in 18 - 22 working days
Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R202 Discovery Miles 2 020 Ships in 18 - 22 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Monstrosity
Laura Diaz de Arce Hardcover R583 Discovery Miles 5 830
Captain America
Jack Kirby, Joe Simon, … Paperback R672 R595 Discovery Miles 5 950
The Odyssey
Homer Paperback R788 Discovery Miles 7 880
Full House - A Wild Cards Collection
George R. R. Martin Paperback R461 Discovery Miles 4 610
Dark Tales From the Strange Wyrld…
Paramjit S. Bharj Hardcover R567 Discovery Miles 5 670
Fantastic Stories Presents the Fantastic…
E Robert Howard Hardcover R1,073 Discovery Miles 10 730
The Plattner Story and Others
H. G. Wells Hardcover R764 Discovery Miles 7 640
A Diversity of Creatures
Rudyard Kipling Hardcover R811 Discovery Miles 8 110
Twisted Tales From The Universe
Mari Collier Hardcover R699 R628 Discovery Miles 6 280
The Black Tulip
Alexandre Dumas Hardcover R773 Discovery Miles 7 730

 

Partners