0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (181)
  • R250 - R500 (208)
  • R500+ (792)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

The Language of Cybersecurity (Paperback): Maria Antonieta Flores The Language of Cybersecurity (Paperback)
Maria Antonieta Flores
R657 Discovery Miles 6 570 Ships in 10 - 15 working days
CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback): Ip... CompTIA Security+ All in One Complete Training Guide with Exam Practice Questions & Labs - Exam SY0-501 (Paperback)
Ip Specialist
R434 Discovery Miles 4 340 Ships in 10 - 15 working days
Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security... Hands-On Bug Hunting for Penetration Testers - A practical guide to help ethical hackers discover web application security flaws (Paperback)
Joseph Marshall
R1,093 Discovery Miles 10 930 Ships in 10 - 15 working days

Detailed walkthroughs of how to discover, test, and document common web application vulnerabilities. Key Features Learn how to test for common bugs Discover tools and methods for hacking ethically Practice working through pentesting engagements step-by-step Book DescriptionBug bounties have quickly become a critical part of the security economy. This book shows you how technical professionals with an interest in security can begin productively-and profitably-participating in bug bounty programs. You will learn about SQli, NoSQLi, XSS, XXE, and other forms of code injection. You'll see how to create CSRF PoC HTML snippets, how to discover hidden content (and what to do with it once it's found), and how to create the tools for automated pentesting workflows. Then, you'll format all of this information within the context of a bug report that will have the greatest chance of earning you cash. With detailed walkthroughs that cover discovering, testing, and reporting vulnerabilities, this book is ideal for aspiring security professionals. You should come away from this work with the skills you need to not only find the bugs you're looking for, but also the best bug bounty programs to participate in, and how to grow your skills moving forward in freelance security research. What you will learn Choose what bug bounty programs to engage in Understand how to minimize your legal liability and hunt for bugs ethically See how to take notes that will make compiling your submission report easier Know how to take an XSS vulnerability from discovery to verification, and report submission Automate CSRF PoC generation with Python Leverage Burp Suite for CSRF detection Use WP Scan and other tools to find vulnerabilities in WordPress, Django, and Ruby on Rails applications Write your report in a way that will earn you the maximum amount of money Who this book is forThis book is written for developers, hobbyists, pentesters, and anyone with an interest (and a little experience) in web application security.

Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback): Jason Healey, Robert K. Knake Zero Botnets - Building a Global Effort to Clean Up the Internet (Paperback)
Jason Healey, Robert K. Knake
R396 Discovery Miles 3 960 Ships in 10 - 15 working days
Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment,... Cybersecurity - An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack and Defense Strategies, and Cyberwarfare (Paperback)
Lester Evans
R339 Discovery Miles 3 390 Ships in 10 - 15 working days
Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps... Ethereum Cookbook - Over 100 recipes covering Ethereum-based tokens, games, wallets, smart contracts, protocols, and Dapps (Paperback)
Manoj P R
R1,255 Discovery Miles 12 550 Ships in 10 - 15 working days

Mine Ether, deploy smart contracts, tokens, and ICOs, and manage security vulnerabilities of Ethereum Key Features Build end-to-end decentralized Ethereum apps using Truffle, Web3, and Solidity Explore various solution-based recipes to build smart contracts and foolproof decentralized applications Develop decentralized marketplaces from scratch, build wallets, and manage transactions Book DescriptionEthereum and Blockchain will change the way software is built for business transactions. Most industries have been looking to leverage these new technologies to gain efficiencies and create new business models and opportunities. The Ethereum Cookbook covers various solutions such as setting up Ethereum, writing smart contracts, and creating tokens, among others. You'll learn about the security vulnerabilities, along with other protocols of Ethereum. Once you have understood the basics, you'll move on to exploring various design decisions and tips to make your application scalable and secure. In addition to this, you'll work with various Ethereum packages such as Truffle, Web3, and Ganache. By the end of this book, you'll have comprehensively grasped the Ethereum principles and ecosystem. What you will learn Efficiently write smart contracts in Ethereum Build scalable distributed applications and deploy them Use tools and frameworks to develop, deploy, and test your application Use block explorers such as Etherscan to find a specific transaction Create your own tokens, initial coin offerings (ICOs), and games Understand various security flaws in smart contracts in order to avoid them Who this book is forThe Ethereum Cookbook is for you if you are a software engineer, Blockchain developer, or research scientist who wants to build smart contracts, develop decentralized applications, and facilitate peer-to-peer transaction. It is assumed that you are familiar with Blockchain concepts and have sound knowledge of JavaScript.

Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback): Asiaccs Asiaccs '18 - Proceedings of the 2018 on Asia Conference on Computer and Communications Security (Paperback)
Asiaccs
R6,261 Discovery Miles 62 610 Ships in 10 - 15 working days
Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback): Dr S Sai Satyanarayana Reddy, Dr Ramesh... Multimedia Security Paradigms - A Peer-To-Peer Network Perspective (Paperback)
Dr S Sai Satyanarayana Reddy, Dr Ramesh Shahabadkar
R273 Discovery Miles 2 730 Ships in 10 - 15 working days
Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback): Codaspy Codaspy '18 - Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy (Paperback)
Codaspy
R2,935 Discovery Miles 29 350 Ships in 10 - 15 working days
The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback): Claire Pales The Secure CiO - How to Hire and Retain Great Cyber Security Talent to Protect your Organisation (Paperback)
Claire Pales
R462 Discovery Miles 4 620 Ships in 10 - 15 working days
Password Log (Paperback): My Password Log Password Log (Paperback)
My Password Log
R338 Discovery Miles 3 380 Ships in 10 - 15 working days
Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback): Dan Remenyi, Richard L. Wilson Glossary of Cyber Warfare, Cyber Crime and Cyber Security (Paperback)
Dan Remenyi, Richard L. Wilson
R748 Discovery Miles 7 480 Ships in 10 - 15 working days
PAM Mastery (Paperback): Michael W Lucas PAM Mastery (Paperback)
Michael W Lucas
R599 R527 Discovery Miles 5 270 Save R72 (12%) Ships in 10 - 15 working days
Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks.... Cyber Nation - How Venture Capital & Startups Are Protecting America from Cyber Criminals, Threats and Cyber Attacks. (Paperback)
Ross Blankenship
R484 Discovery Miles 4 840 Ships in 10 - 15 working days
Pond of Scams (Paperback): Tolu Ayoade Pond of Scams (Paperback)
Tolu Ayoade
R226 Discovery Miles 2 260 Ships in 10 - 15 working days
Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.): Jan Marshall Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.)
Jan Marshall
R522 R445 Discovery Miles 4 450 Save R77 (15%) Ships in 10 - 15 working days
scam.con (Paperback): Tom Law scam.con (Paperback)
Tom Law
R894 Discovery Miles 8 940 Ships in 10 - 15 working days
GNU SASL 1.8 Reference Manual (Paperback): Simon Josefsson GNU SASL 1.8 Reference Manual (Paperback)
Simon Josefsson
R394 Discovery Miles 3 940 Ships in 10 - 15 working days
Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in... Windows Server 2016 Security, Certificates, and Remote Access Cookbook - Recipe-based guide for security, networking and PKI in Windows Server 2016 (Paperback)
Jordan Krause
R816 Discovery Miles 8 160 Ships in 10 - 15 working days

This book contains more than 25 hands-on recipes that will equip you to build a PKI and roll out remote access capabilities via Microsoft DirectAccess and VPN. This book also contains tips and tricks for increasing the security footprint of your Windows Server infrastructure. Key Features Identify and mitigate security risks in your Windows Server 2016 infrastructure Learn how to build a PKI and use it to issue certificates within your network In-depth information for setting up Microsoft DirectAccess Book Description Windows Server 2016 is an operating system designed to run on today's highly performant servers, both on-premise and in the cloud. It supports enterprise-level data storage, communications, management, and applications. This book builds off a basic knowledge of the Windows Server operating system, and assists administrators with taking the security of their systems one step further. You will learn tips for configuring proper networking, especially on multi-homed systems, and tricks for locking down access to your servers. Then you will move onto one of the hottest security topics of the year - certificates. You will learn how to build your own PKI, or how to better administer one that you already have. You will publish templates, issue certificates, and even configure autoenrollment in your network. When we say "networking" we don't only mean inside the LAN. To deal safely with mobile devices, you will learn about the capabilities of Windows Server 2016 for connecting these assets securely back into the corporate network, with information about DirectAccess and VPN. The material in the book has been selected from the content of Packt's Windows Server 2016 Cookbook by Jordan Krause to provide a specific focus on these key Windows Server tasks. What you will learn Implement solid networking and security practices into your Windows Server environment Design your own PKI and start issuing certificates today Connect your remote laptops back to the corporate network using Microsoft's own remote access technologies, including DirectAccess Learn to use commands that will help you with monitoring network traffic. Build and explore your first Server Core instance today! Who this book is forIf you are a Windows Server administrator interested in learning the key security and networking functions available in Windows Server 2016, keep this book close at hand. If you are a server administrator setting up certificate services for the first time you will also benefit from the step-by-step instructions on implementation of a PKI.

Tor Bible (Paperback): Arlen Kraham Tor Bible (Paperback)
Arlen Kraham
R974 Discovery Miles 9 740 Ships in 10 - 15 working days
Enterprise Cloud Security and Governance (Paperback): Zeal Vora Enterprise Cloud Security and Governance (Paperback)
Zeal Vora
R1,254 Discovery Miles 12 540 Ships in 10 - 15 working days

Build a resilient cloud architecture to tackle data disasters with ease About This Book * Gain a firm grasp of Cloud data security and governance, irrespective of your Cloud platform * Practical examples to ensure you secure your Cloud environment efficiently * A step-by-step guide that will teach you the unique techniques and methodologies of Cloud data governance Who This Book Is For If you are a cloud security professional who wants to ensure cloud security and data governance no matter the environment, then this book is for you. A basic understanding of working on any cloud platform would be beneficial. What You Will Learn * Configure your firewall and Network ACL * Protect your system against DDOS and application-level attacks * Explore cryptography and data security for your cloud * Get to grips with configuration management tools to automate your security tasks * Perform vulnerability scanning with the help of the standard tools in the industry * Learn about central log management In Detail Modern day businesses and enterprises are moving to the Cloud, to improve efficiency and speed, achieve flexibility and cost effectiveness, and for on-demand Cloud services. However, enterprise Cloud security remains a major concern because migrating to the public Cloud requires transferring some control over organizational assets to the Cloud provider. There are chances these assets can be mismanaged and therefore, as a Cloud security professional, you need to be armed with techniques to help businesses minimize the risks and misuse of business data. The book starts with the basics of Cloud security and offers an understanding of various policies, governance, and compliance challenges in Cloud. This helps you build a strong foundation before you dive deep into understanding what it takes to design a secured network infrastructure and a well-architected application using various security services in the Cloud environment. Automating security tasks, such as Server Hardening with Ansible, and other automation services, such as Monit, will monitor other security daemons and take the necessary action in case these security daemons are stopped maliciously. In short, this book has everything you need to secure your Cloud environment with. It is your ticket to obtain industry-adopted best practices for developing a secure, highly available, and fault-tolerant architecture for organizations. Style and approach This book follows a step-by-step, practical approach to secure your applications and data when they are located remotely.

The Ultimate GDPR Practitioner Guide - Demystifying Privacy & Data Protection (Paperback): Stephen Massey The Ultimate GDPR Practitioner Guide - Demystifying Privacy & Data Protection (Paperback)
Stephen Massey
R721 R625 Discovery Miles 6 250 Save R96 (13%) Ships in 10 - 15 working days
Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R197 Discovery Miles 1 970 Ships in 10 - 15 working days
An Essential Guide to Cybersecurity - What You Need to Know (Paperback): Veronica Miller An Essential Guide to Cybersecurity - What You Need to Know (Paperback)
Veronica Miller; David Miller
R337 Discovery Miles 3 370 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.)
Michael W Lucas
R720 R634 Discovery Miles 6 340 Save R86 (12%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Permanent Record
Edward Snowden Paperback R299 R234 Discovery Miles 2 340
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R738 Discovery Miles 7 380
Protecting Privacy through Homomorphic…
Kristin Lauter, Wei Dai, … Hardcover R2,977 Discovery Miles 29 770
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R2,865 Discovery Miles 28 650
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, … Hardcover R5,523 Discovery Miles 55 230
Identified, Tracked, and Profiled - The…
Peter Dauvergne Hardcover R2,127 Discovery Miles 21 270
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,101 Discovery Miles 61 010
The Age of AI - And Our Human Future
Henry A. Kissinger, Eric Schmidt, … Paperback R291 R262 Discovery Miles 2 620
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R2,732 Discovery Miles 27 320
Online Predators, an Internet Insurgency…
Jeffrey A. Lee Paperback R541 Discovery Miles 5 410

 

Partners