0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (162)
  • R250 - R500 (192)
  • R500+ (821)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback): Anuj Mishra The Pro-hacker's Guide to Hacking - hacking the right way, the smart way (Paperback)
Anuj Mishra
R307 Discovery Miles 3 070 Ships in 10 - 15 working days
Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback): Dan Remenyi, Richard L. Wilson Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback)
Dan Remenyi, Richard L. Wilson
R821 Discovery Miles 8 210 Ships in 10 - 15 working days
Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R554 Discovery Miles 5 540 Ships in 10 - 15 working days
Book of Elusive Passwords - Internet security password with 312 sections for internet passwords for addresses and usernames,... Book of Elusive Passwords - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R269 Discovery Miles 2 690 Ships in 10 - 15 working days
Password Slut - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover... Password Slut - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R269 Discovery Miles 2 690 Ships in 10 - 15 working days
Bug Bounty Hunting Essentials - Quick-paced guide to help white-hat hackers get through bug bounty programs (Paperback): Carlos... Bug Bounty Hunting Essentials - Quick-paced guide to help white-hat hackers get through bug bounty programs (Paperback)
Carlos A. Lozano, Shahmeer Amir
R1,200 Discovery Miles 12 000 Ships in 10 - 15 working days

Get hands-on experience on concepts of Bug Bounty Hunting Key Features Get well-versed with the fundamentals of Bug Bounty Hunting Hands-on experience on using different tools for bug hunting Learn to write a bug bounty report according to the different vulnerabilities and its analysis Book DescriptionBug bounty programs are the deals offered by prominent companies where-in any white-hat hacker can find bugs in the applications and they will have a recognition for the same. The number of prominent organizations having this program has increased gradually leading to a lot of opportunity for Ethical Hackers. This book will initially start with introducing you to the concept of Bug Bounty hunting. Then we will dig deeper into concepts of vulnerabilities and analysis such as HTML injection, CRLF injection and so on. Towards the end of the book, we will get hands-on experience working with different tools used for bug hunting and various blogs and communities to be followed. This book will get you started with bug bounty hunting and its fundamentals. What you will learn Learn the basics of bug bounty hunting Hunt bugs in web applications Hunt bugs in Android applications Analyze the top 300 bug reports Discover bug bounty hunting research methodologies Explore different tools used for Bug Hunting Who this book is forThis book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.

Pond of Scams (Paperback): Tolu Ayoade Pond of Scams (Paperback)
Tolu Ayoade
R265 Discovery Miles 2 650 Ships in 10 - 15 working days
They Will Do Anything - Identity Theft and Internet Fraud (Paperback): Wayne L. Staley They Will Do Anything - Identity Theft and Internet Fraud (Paperback)
Wayne L. Staley
R302 Discovery Miles 3 020 Ships in 10 - 15 working days
Hacking - Basic Hacking Fundamental Secrets (Paperback): Steven Dunlop Hacking - Basic Hacking Fundamental Secrets (Paperback)
Steven Dunlop
R258 Discovery Miles 2 580 Ships in 10 - 15 working days
Shit! I forgot my password again! - Internet security password with 312 sections for internet passwords for addresses and... Shit! I forgot my password again! - Internet security password with 312 sections for internet passwords for addresses and usernames, humorous cover A-Z index (Paperback)
Kay D Johnson
R269 Discovery Miles 2 690 Ships in 10 - 15 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R398 Discovery Miles 3 980 Ships in 10 - 15 working days
GNU SASL 1.8 Reference Manual (Paperback): Simon Josefsson GNU SASL 1.8 Reference Manual (Paperback)
Simon Josefsson
R462 Discovery Miles 4 620 Ships in 10 - 15 working days
scam.con (Paperback): Tom Law scam.con (Paperback)
Tom Law
R977 Discovery Miles 9 770 Ships in 10 - 15 working days
Hello World - How  to be Human in the Age of the Machine (Paperback): Hannah Fry Hello World - How to be Human in the Age of the Machine (Paperback)
Hannah Fry 1
R424 Discovery Miles 4 240 Ships in 2 - 4 working days

You are accused of a crime? Who would you rather decides your future - an algorithm or a human? Before making your decision, bear in mind that the algorithm will always be more consistent, and far less prone to an error of judgement. Then again, at least the human will be able to look you in the eye before determining your fate. How much fairness would you be willing to sacrifice for that human touch? This is just one of the dilemmas we face in the age of the algorithm, where the machine rules supreme, telling us what to watch, where to go, even who to send to prison. As increasingly we rely on them to automate big, important decisions - in crime, healthcare, transport, money - they raise questions that cut to the heart of what we want our society to look like, forcing us to decide what matters most. Is helping doctors to diagnose patients more or less important than preserving our anonymity? Should we prevent people from becoming victims of crime, or protect innocent people from being falsely accused? Hannah Fry takes us on a tour through the good, the bad, and the downright ugly of the algorithms that surround us. In Hello World she lifts the lid on their inner workings, demonstrates their power, exposes their limitations, and examines whether they really are an improvement on the human systems they replace.

Enterprise Cloud Security and Governance (Paperback): Zeal Vora Enterprise Cloud Security and Governance (Paperback)
Zeal Vora
R1,363 Discovery Miles 13 630 Ships in 10 - 15 working days

Build a resilient cloud architecture to tackle data disasters with ease About This Book * Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform * Practical examples to ensure you secure your Cloud environment efficiently * A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn * Configure your firewall and Network ACL * Protect your system against DDOS and application-level attacks * Explore cryptography and data security for your cloud * Get to grips with configuration management tools to automate your security tasks * Perform vulnerability scanning with the help of the standard tools in the industry * Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,191 Discovery Miles 11 910 Ships in 10 - 15 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R231 Discovery Miles 2 310 Ships in 10 - 15 working days
Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R320 Discovery Miles 3 200 Ships in 10 - 15 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R630 R595 Discovery Miles 5 950 Save R35 (6%) Ships in 10 - 15 working days
Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores... Seguro, Atento y Simpatico - Como utilizar los medios sociales para impresionar a universidades y a futuros empleadores (Paperback)
Josh Ochs
R265 Discovery Miles 2 650 Ships in 10 - 15 working days
Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback): The Pacific Subcommittee on East Asia Cybersecurity - Setting the Rules for Responsible Global Cyber Behavior (Paperback)
The Pacific Subcommittee on East Asia
R478 Discovery Miles 4 780 Ships in 10 - 15 working days
Audio Content Security - Attack Analysis on Audio Watermarking (Paperback): Sogand Ghorbani, I.S. Dr. Amiri Audio Content Security - Attack Analysis on Audio Watermarking (Paperback)
Sogand Ghorbani, I.S. Dr. Amiri
R1,483 Discovery Miles 14 830 Out of stock

Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.

Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R894 Discovery Miles 8 940 Ships in 10 - 15 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R605 Discovery Miles 6 050 Ships in 10 - 15 working days
How to Keep Your Stuff Safe Online (Paperback): Raef Meeuwisse How to Keep Your Stuff Safe Online (Paperback)
Raef Meeuwisse
R218 Discovery Miles 2 180 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Present and Future Paradigms of…
Simber Atay, Gulsun Kurubacak-Meric, … Hardcover R5,796 Discovery Miles 57 960
Encyclopedia of Rhetoric
Thomas O. Sloane Hardcover R4,743 Discovery Miles 47 430
Viral Replication Enzymes and their…
Craig E. Cameron, Jamie J. Arnold Hardcover R4,796 Discovery Miles 47 960
Extremisms In Africa
Alain Tschudin, Stephen Buchanan-Clarke, … Paperback  (1)
R330 R298 Discovery Miles 2 980
The Premonition - A Pandemic Story
Michael Lewis Hardcover R815 R722 Discovery Miles 7 220
American Radio in China - International…
Michael A. Krysko Hardcover R2,789 Discovery Miles 27 890
The Asian Aspiration - Why And How…
Greg Mills, Olusegun Obasanjo, … Paperback R350 R316 Discovery Miles 3 160
Three Wise Monkeys
Charles Van Onselen Paperback R1,500 R1,136 Discovery Miles 11 360
Sabotage - Eskom Under Siege
Kyle Cowan Paperback  (2)
R340 R306 Discovery Miles 3 060
Boundary Layer Flows - Theory…
Vallampati Ramachandra Prasad Hardcover R3,527 Discovery Miles 35 270

 

Partners