0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (155)
  • R250 - R500 (191)
  • R500+ (829)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Happy 81st Birthday - 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 81st Birthday - 81 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a... Happy 67th Birthday - 67 is Just a Number, Large Print Address Book for the Young at Heart. Forget the Birthday Card and Give a Birthday Book Instead! (Large print, Paperback, Large type / large print edition)
Level Up Designs, Karlon Douglas
R306 Discovery Miles 3 060 Ships in 10 - 15 working days
Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback):... Ethical Hacking - A Comprehensive Beginner's Guide to Learn About the Effective Strategies of Ethical Hacking (Paperback)
Elijah Lewis
R543 Discovery Miles 5 430 Ships in 10 - 15 working days
Throughput Accounting in a Hyperconnected World (Paperback): Ionica Oncioiu Throughput Accounting in a Hyperconnected World (Paperback)
Ionica Oncioiu
R4,108 Discovery Miles 41 080 Ships in 10 - 15 working days

As economies globalize, the number and power of transnational companies increases, especially in developing countries. Relevant, reliable, and comparable financial information and a common business language are needed to ensure communication between all users of financial information. Throughput Accounting in a Hyperconnected World provides innovative insights into controversial debates regarding the configuration and use of accounting and finance information both internally within economic entities and through third parties. These debates underline the major responsibility of users when configuring accounting and finance models and thereby in modelling business information. The content within this publication covers risk analysis, social accounting, and entrepreneurial models and is designed for managers, accountants, risk managers, academics, researchers, practitioners, and students.

EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS (Paperback): Brian P Major Zeitz EARLY WARNING and PREDICTION of INTERNET ATTACKS and EXPLOITS (Paperback)
Brian P Major Zeitz; Edited by Penny Hill Press; Air Force Institute of Technology
R369 Discovery Miles 3 690 Ships in 10 - 15 working days
Hacking With Kali Linux - The Step-By-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and... Hacking With Kali Linux - The Step-By-Step Beginner's Guide to Learn Hacking, Cybersecurity, Wireless Network and Penetration Testing (Paperback)
David James Carmack
R283 Discovery Miles 2 830 Ships in 10 - 15 working days
Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated... Kali Linux 2018: Assuring Security by Penetration Testing - Unleash the full potential of Kali Linux 2018, now with updated tools, 4th Edition (Paperback, 4th Revised edition)
Shiva V.N Parasram, Alex Samm, Damian Boodoo, Gerard Johansen, Lee Allen, …
R1,342 Discovery Miles 13 420 Ships in 10 - 15 working days

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book DescriptionKali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is forThis fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linux operating systems. Prior knowledge of information security will help you understand the concepts in this book

I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design... I'll Never Forget You - Internet Password Manager to Keep Your Private Information Safe - With A-Z Tabs and Flower Design (Paperback)
Secure Publishing
R184 Discovery Miles 1 840 Ships in 10 - 15 working days
Building an Effective Cybersecurity Program (Paperback, 2nd ed.): Tari Schreider Building an Effective Cybersecurity Program (Paperback, 2nd ed.)
Tari Schreider
R2,231 Discovery Miles 22 310 Ships in 10 - 15 working days
Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made... Hacking - A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux (Paperback)
Kevin White
R502 Discovery Miles 5 020 Ships in 10 - 15 working days
Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback): Danielle Mead Build a Better Password - Create and Save Strong, Secure Passwords the Fun & Easy Way! (Paperback)
Danielle Mead
R263 Discovery Miles 2 630 Ships in 10 - 15 working days
Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd... Digital Forensics and Incident Response - Incident response techniques and procedures to respond to modern cyber threats, 2nd Edition (Paperback, 2nd Revised edition)
Gerard Johansen
R1,538 Discovery Miles 15 380 Ships in 10 - 15 working days

Build your organization's cyber defense system by effectively implementing digital forensics and incident management techniques Key Features Create a solid incident response framework and manage cyber incidents effectively Perform malware analysis for effective incident response Explore real-life scenarios that effectively use threat intelligence and modeling techniques Book DescriptionAn understanding of how digital forensics integrates with the overall response to cybersecurity incidents is key to securing your organization's infrastructure from attacks. This updated second edition will help you perform cutting-edge digital forensic activities and incident response. After focusing on the fundamentals of incident response that are critical to any information security team, you'll move on to exploring the incident response framework. From understanding its importance to creating a swift and effective response to security incidents, the book will guide you with the help of useful examples. You'll later get up to speed with digital forensic techniques, from acquiring evidence and examining volatile memory through to hard drive examination and network-based evidence. As you progress, you'll discover the role that threat intelligence plays in the incident response process. You'll also learn how to prepare an incident response report that documents the findings of your analysis. Finally, in addition to various incident response activities, the book will address malware analysis, and demonstrate how you can proactively use your digital forensic skills in threat hunting. By the end of this book, you'll have learned how to efficiently investigate and report unwanted security breaches and incidents in your organization. What you will learn Create and deploy an incident response capability within your own organization Perform proper evidence acquisition and handling Analyze the evidence collected and determine the root cause of a security incident Become well-versed with memory and log analysis Integrate digital forensic techniques and procedures into the overall incident response process Understand the different techniques for threat hunting Write effective incident reports that document the key findings of your analysis Who this book is forThis book is for cybersecurity and information security professionals who want to implement digital forensics and incident response in their organization. You will also find the book helpful if you are new to the concept of digital forensics and are looking to get started with the fundamentals. A basic understanding of operating systems and some knowledge of networking fundamentals are required to get started with this book.

Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback):... Shit I Can't Remember - Keep track of usernames, passwords, web addresses in one easy & organized location (Paperback)
Family's Books
R188 Discovery Miles 1 880 Ships in 10 - 15 working days
Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for... Internet Password Logbook - Black Password organizer to Keep Usernames, Passwords, Web Addresses & More. Alphabetical Tabs for Quick Easy Access (Paperback)
Practical Blank Journals
R199 Discovery Miles 1 990 Ships in 10 - 15 working days
Happy 37th Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print,... Happy 37th Birthday Shithead - Forget the Birthday Card and Get This Funny Birthday Password Book Instead! (Large print, Paperback, Large type / large print edition)
Karlon Douglas; Level Up Designs, Karlon Douglas
R232 Discovery Miles 2 320 Ships in 10 - 15 working days
Is the OPM Data Breach the Tip of the Iceberg? (Paperback): Subcommittee on Oversight & Subcommittee Is the OPM Data Breach the Tip of the Iceberg? (Paperback)
Subcommittee on Oversight & Subcommittee
R529 Discovery Miles 5 290 Ships in 10 - 15 working days
Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback): Ajay... Practical Network Scanning - Capture network vulnerabilities using standard tools such as Nmap and Nessus (Paperback)
Ajay Singh Chauhan
R1,168 Discovery Miles 11 680 Ships in 10 - 15 working days

Get more from your network by securing its infrastructure and increasing its effectiveness Key Features Learn to choose the best network scanning toolset for your system Implement different concepts of network scanning such as port scanning and OS detection Adapt a practical approach to securing your network Book DescriptionNetwork scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. What you will learn Achieve an effective security posture to design security architectures Learn vital security aspects before moving to the Cloud Launch secure applications with Web Application Security and SQL Injection Explore the basics of threat detection/response/ mitigation with important use cases Learn all about integration principles for PKI and tips to secure it Design a WAN infrastructure and ensure security over a public WAN Who this book is forIf you are a security professional who is responsible for securing an organization's infrastructure, then this book is for you.

Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover... Wtf Is My Password - Keep track of usernames, passwords, web addresses in one easy & organized location - Pink Cover (Paperback)
Norman M Pray
R182 Discovery Miles 1 820 Ships in 10 - 15 working days
Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback): Trust... Cybersecurity - The Hacker Proof Guide To Cybersecurity, Internet Safety, Cybercrime, & Preventing Attacks (Paperback)
Trust Genics
R480 R445 Discovery Miles 4 450 Save R35 (7%) Ships in 10 - 15 working days
Internet Password Organizer - Flowers (Password Log Book) (Paperback): Peter Paker P K Internet Password Organizer - Flowers (Password Log Book) (Paperback)
Peter Paker P K
R226 Discovery Miles 2 260 Ships in 10 - 15 working days
Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback): Adrian Pruteanu Becoming the Hacker - The Playbook for Getting Inside the Mind of the Attacker (Paperback)
Adrian Pruteanu
R1,185 Discovery Miles 11 850 Ships in 10 - 15 working days

Web penetration testing by becoming an ethical hacker. Protect the web by learning the tools, and the tricks of the web application attacker. Key Features Builds on books and courses on penetration testing for beginners Covers both attack and defense perspectives Examines which tool to deploy to suit different applications and situations Book DescriptionBecoming the Hacker will teach you how to approach web penetration testing with an attacker's mindset. While testing web applications for performance is common, the ever-changing threat landscape makes security testing much more difficult for the defender. There are many web application tools that claim to provide a complete survey and defense against potential threats, but they must be analyzed in line with the security needs of each web application or service. We must understand how an attacker approaches a web application and the implications of breaching its defenses. Through the first part of the book, Adrian Pruteanu walks you through commonly encountered vulnerabilities and how to take advantage of them to achieve your goal. The latter part of the book shifts gears and puts the newly learned techniques into practice, going over scenarios where the target may be a popular content management system or a containerized application and its network. Becoming the Hacker is a clear guide to web application security from an attacker's point of view, from which both sides can benefit. What you will learn Study the mindset of an attacker Adopt defensive strategies Classify and plan for standard web application security threats Prepare to combat standard system security problems Defend WordPress and mobile applications Use security tools and plan for defense against remote execution Who this book is forThe reader should have basic security experience, for example, through running a network or encountering security issues during application development. Formal education in security is useful, but not required. This title is suitable for people with at least two years of experience in development, network management, or DevOps, or with an established interest in security.

Cross Site Scripting - XSS Defense Made Easy (Paperback): Harvey Berman Cross Site Scripting - XSS Defense Made Easy (Paperback)
Harvey Berman
R419 Discovery Miles 4 190 Ships in 10 - 15 working days
What is the Dark Web? - The truth about the hidden part of the internet (Paperback): Evan J Rodgers What is the Dark Web? - The truth about the hidden part of the internet (Paperback)
Evan J Rodgers
R351 Discovery Miles 3 510 Ships in 10 - 15 working days
Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great... Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great gift for for kids, teenage girls, best friends, or mothers (Paperback)
Boss Girl Life
R216 Discovery Miles 2 160 Ships in 10 - 15 working days
Hacking With Kali Linux - A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples... Hacking With Kali Linux - A Comprehensive, Step-By-Step Beginner's Guide to Learn Ethical Hacking With Practical Examples to Computer Hacking, Wireless Network, Cybersecurity and Penetration Testing (Paperback)
Peter Bradley
R503 Discovery Miles 5 030 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Computational Diffusion MRI…
Elisenda Bonet-Carne, Francesco Grussu, … Hardcover R2,934 Discovery Miles 29 340
Lasers - Basics, Advances and…
Hans-Joachim Eichler, Jurgen Eichler, … Hardcover R5,175 Discovery Miles 51 750
Discrete-Time and Discrete-Space…
Kuize Zhang, Li Jun Zhang, … Hardcover R2,887 Discovery Miles 28 870
Convergence of Terahertz Sciences in…
Gun-Sik Park, Yong Hyup Kim, … Hardcover R5,168 Discovery Miles 51 680
Applying Data Science - Business Case…
Gerhard Svolba Hardcover R2,629 Discovery Miles 26 290
How to Find a Needle in a Haystack…
Yair Neuman Hardcover R1,601 Discovery Miles 16 010
An Introduction to Creating Standardized…
Todd Case, Yuting Tian Hardcover R1,623 Discovery Miles 16 230
Portfolio and Investment Analysis with…
John B. Guerard, Ziwei Wang, … Hardcover R2,491 Discovery Miles 24 910
Sustained Simulation Performance 2018…
Michael M Resch, Yevgeniya Kovalenko, … Hardcover R4,362 Discovery Miles 43 620
Proceedings of the 21st International…
Xiangmin Jiao, Jean-Christophe Weill Hardcover R5,702 Discovery Miles 57 020

 

Partners