0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (161)
  • R250 - R500 (191)
  • R500+ (820)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback): Infrastru Subcommittee on... Industry Perspectives on the President's Cybersecurity Information-Sharing Proposal (Paperback)
Infrastru Subcommittee on Cybersecurity
R453 Discovery Miles 4 530 Ships in 10 - 15 working days
Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.): Jan Marshall Romance Scam Survivor - The Whole Sordid Story (Paperback, The Whole Sordid Story ed.)
Jan Marshall
R549 R514 Discovery Miles 5 140 Save R35 (6%) Ships in 10 - 15 working days
Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback):... Building a Life and Career in Security - A Guide from Day 1 to Building A Life and Career in Information Security (Paperback)
Jay Schulman
R205 Discovery Miles 2 050 Ships in 10 - 15 working days
Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element... Protecting Your Business From Insider Threats In Seven Effective Steps - How To Identify, Address And Shape The Human Element Of The Threat Within Your Business In Seven Successful Practices (Paperback)
Boaz Fischer
R591 Discovery Miles 5 910 Ships in 10 - 15 working days
Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback): Dr. Erdal Ozkaya Learn Social Engineering - Learn the art of human hacking with an internationally renowned expert (Paperback)
Dr. Erdal Ozkaya
R1,321 Discovery Miles 13 210 Ships in 10 - 15 working days

Improve information security by learning Social Engineering. Key Features Learn to implement information security using social engineering Get hands-on experience of using different tools such as Kali Linux, the Social Engineering toolkit and so on Practical approach towards learning social engineering, for IT security Book DescriptionThis book will provide you with a holistic understanding of social engineering. It will help you to avoid and combat social engineering attacks by giving you a detailed insight into how a social engineer operates. Learn Social Engineering starts by giving you a grounding in the different types of social engineering attacks,and the damages they cause. It then sets up the lab environment to use different toolS and then perform social engineering steps such as information gathering. The book covers topics from baiting, phishing, and spear phishing, to pretexting and scareware. By the end of the book, you will be in a position to protect yourself and your systems from social engineering threats and attacks. All in all, the book covers social engineering from A to Z , along with excerpts from many world wide known security experts. What you will learn Learn to implement information security using social engineering Learn social engineering for IT security Understand the role of social media in social engineering Get acquainted with Practical Human hacking skills Learn to think like a social engineer Learn to beat a social engineer Who this book is forThis book targets security professionals, security analysts, penetration testers, or any stakeholder working with information security who wants to learn how to use social engineering techniques. Prior knowledge of Kali Linux is an added advantage

Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback): M Blaine Faulkner Black Hat Banking - A Hacker's Guide to Financial Security & Privacy (Paperback)
M Blaine Faulkner
R404 Discovery Miles 4 040 Ships in 10 - 15 working days
Methods for Location Privacy - A Comparative Overview (Paperback): Kostantinos Chatzikokolakis, Ehab Elsalamouny, Catuscia... Methods for Location Privacy - A Comparative Overview (Paperback)
Kostantinos Chatzikokolakis, Ehab Elsalamouny, Catuscia Palamidessi
R1,485 Discovery Miles 14 850 Ships in 10 - 15 working days

In recent years, the growing popularity of mobile devices equipped with GPS chips, in combination with the increasing availability of wireless data connections, has led to an incremental rise in the use of Location-Based Services (LBSs), namely applications in which a user obtains, typically in real-time, a service related to his current location. The growing popularity of location-based services, allowing for the collection of vast amounts of information regarding users' location, has started raising serious privacy concerns. Methods for Location Privacy: A Comparative Overview examines the various kinds of privacy breaches that may arise due to the use of LBSs, and considers and compares some of the mechanisms and the metrics that have been proposed to protect user privacy, focusing in particular on a comparison between probabilistic spatial obfuscation techniques.

Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems... Systems Security Engineering - Considerations for a Multidisciplinary Approach in the Engineering of Trustworthy Secure Systems (Paperback)
National Institute of St And Technology, U. S. Department of Commerce
R595 Discovery Miles 5 950 Ships in 10 - 15 working days
Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback): Seth... Hacking - Learning to Hack. Cyber Terrorism, Kali Linux, Computer Hacking, Pentesting, & Basic Security. (Paperback)
Seth McKinnon
R231 Discovery Miles 2 310 Ships in 10 - 15 working days
Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive... Data Analytics and Computer Hacking & Mobile Hacking 3 Bundle Manuscript - Beginners Guide to Learn Data Analytics, Predictive Analytics and Data Science with Computer Hacking and Mobile Hacking (Paperback)
Isaac D Cody
R584 Discovery Miles 5 840 Ships in 10 - 15 working days
SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels, and Keys (Paperback, 2nd ed.)
Michael W Lucas
R758 R700 Discovery Miles 7 000 Save R58 (8%) Ships in 10 - 15 working days
IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback): Jane Frankland IN Security - Why a Failure to Attract and Retain Women in Cybersecurity is Making Us All Less Safe (Paperback)
Jane Frankland
R785 Discovery Miles 7 850 Ships in 10 - 15 working days
Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: Your Guide On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R693 Discovery Miles 6 930 Ships in 10 - 15 working days
How to Keep Your Stuff Safe Online (Paperback): Raef Meeuwisse How to Keep Your Stuff Safe Online (Paperback)
Raef Meeuwisse
R218 Discovery Miles 2 180 Ships in 10 - 15 working days
Cybersecurity: Home and Small Business (Paperback): Raef Meeuwisse Cybersecurity: Home and Small Business (Paperback)
Raef Meeuwisse
R363 Discovery Miles 3 630 Ships in 10 - 15 working days
How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback): Bruce Johnston How to Bullet Proof Your LinkedIn Profile - 10 Security Issues to Avoid (Paperback)
Bruce Johnston; Edited by Lisa Zahn; Patrick X. Gallagher
R393 Discovery Miles 3 930 Ships in 10 - 15 working days
Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits... Protecting Your Business From Cyber Attacks In Only 10 Minutes A Day - Simple Steps to Help You Create Better Security Habits to Reduce the Risk of Becoming a Cyber Victim (Paperback)
Boaz Fischer
R2,018 Discovery Miles 20 180 Ships in 10 - 15 working days
Hacking - The Complete Beginner's Guide To Computer Hacking: More On How To Hack Networks and Computer Systems,... Hacking - The Complete Beginner's Guide To Computer Hacking: More On How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R441 Discovery Miles 4 410 Ships in 10 - 15 working days
Tor - Accessing The Deep Web & Dark Web With Tor: How To Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access The Deep... Tor - Accessing The Deep Web & Dark Web With Tor: How To Set Up Tor, Stay Anonymous Online, Avoid NSA Spying & Access The Deep Web & Dark Web (Paperback)
Jack Jones
R437 Discovery Miles 4 370 Ships in 10 - 15 working days
Hacking - The Complete Beginner's Guide To Computer Hacking: How To Hack Networks and Computer Systems, Information... Hacking - The Complete Beginner's Guide To Computer Hacking: How To Hack Networks and Computer Systems, Information Gathering, Password Cracking, System Entry & Wireless Hacking (Paperback)
Jack Jones
R440 Discovery Miles 4 400 Ships in 10 - 15 working days
Down the Rabbit Hole An OSINT Journey - Open Source Intelligence Gathering for Penetration Testing (Paperback): Chris Kubecka Down the Rabbit Hole An OSINT Journey - Open Source Intelligence Gathering for Penetration Testing (Paperback)
Chris Kubecka
R722 Discovery Miles 7 220 Ships in 10 - 15 working days
Tor & Darknet - In the Art of Anonymity (Paperback): Raffaele De Rosa Tor & Darknet - In the Art of Anonymity (Paperback)
Raffaele De Rosa
R237 Discovery Miles 2 370 Ships in 10 - 15 working days
Zero Day - China's Cyber Wars (Paperback): T.L. Williams Zero Day - China's Cyber Wars (Paperback)
T.L. Williams; Edited by Emily Carmain
R440 Discovery Miles 4 400 Ships in 10 - 15 working days
Cybersecurity in Our Digital Lives (Paperback): Jane LeClair, Gregory Keeley Cybersecurity in Our Digital Lives (Paperback)
Jane LeClair, Gregory Keeley; Foreword by John Ashcroft
R754 R662 Discovery Miles 6 620 Save R92 (12%) Ships in 10 - 15 working days
Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback): Max Nomad Surviving The Zombie Apocalypse - Safer Computing Tips for Small Business Managers and Everyday People (Paperback)
Max Nomad
R799 R707 Discovery Miles 7 070 Save R92 (12%) Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R575 Discovery Miles 5 750
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R385 R347 Discovery Miles 3 470
Modern Day Surveillance Ecosystem and…
Ananda Mitra Hardcover R6,084 Discovery Miles 60 840
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R819 Discovery Miles 8 190
Privacy and Security Policies in Big…
Sharvari Tamane, Vijender Kumar Solanki, … Hardcover R6,042 Discovery Miles 60 420
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R508 Discovery Miles 5 080
Research Handbook on Privacy and Data…
Gloria Gonzalez, Rosamunde van Brakel, … Hardcover R6,864 Discovery Miles 68 640
Pandemic Surveillance - Privacy…
Margaret Hu Hardcover R3,237 Discovery Miles 32 370
Smart-Tech Society - Convenience…
Mark Whitehead, William G.A. Collier Hardcover R3,090 Discovery Miles 30 900
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,242 Discovery Miles 12 420

 

Partners