0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (5)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Defending IoT Infrastructures with the Raspberry Pi - Monitoring and Detecting Nefarious Behavior in Real Time (Paperback, 1st... Defending IoT Infrastructures with the Raspberry Pi - Monitoring and Detecting Nefarious Behavior in Real Time (Paperback, 1st ed.)
Chet Hosmer
R875 R717 Discovery Miles 7 170 Save R158 (18%) Ships in 10 - 15 working days

Apply a methodology and practical solutions for monitoring the behavior of the Internet of Things (IoT), industrial control systems (ICS), and other critical network devices with the inexpensive Raspberry Pi. With this book, you will master passive monitoring and detection of aberrant behavior, and learn how to generate early indications and warning of attacks targeting IoT, ICS, and other critical network resources. Defending IoT Infrastructures with the Raspberry Pi provides techniques and scripts for the discovery of dangerous data leakage events emanating from IoT devices. Using Raspbian Linux and specialized Python scripts, the book walks through the steps necessary to monitor, detect, and respond to attacks targeting IoT devices. There are several books that cover IoT, IoT security, Raspberry Pi, and Python separately, but this book is the first of its kind to put them all together. It takes a practical approach, providing an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn Create a secure, operational Raspberry Pi IoT sensor Configure and train the sensor using "normal" IoT behavior Establish analytics for detecting aberrant activities Generate real-time alerts to preempt attacks Identify and report data-leakage events originating from IoT devices Develop custom Python applications for cybersecurity Who This Book Is For Cybersecurity specialists, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, software developers and engineers developing new cybersecurity defenses, incident response teams, software developers and engineers in general, and hobbyists wanting to expand the application of Raspberry Pi into both IoT and cybersecurity

Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New):... Data Hiding - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols (Paperback, New)
Michael T. Raggo, Chet Hosmer
R1,222 R1,145 Discovery Miles 11 450 Save R77 (6%) Ships in 12 - 17 working days

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. "Data Hiding "provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions fordata hiding"

Python Passive Network Mapping - P2NMAP (Paperback): Chet Hosmer Python Passive Network Mapping - P2NMAP (Paperback)
Chet Hosmer
R1,416 Discovery Miles 14 160 Ships in 12 - 17 working days

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks - they can disrupt operations, crash systems, and - most importantly - miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately. Python Passive Network Mapping is for practitioners, forensic investigators, IT teams, and individuals who work together when performing incident response and investigating potential damage, or are examining the impacts of new malware threats. Those defending critical infrastructures will have a special interest in this book, as active or probing methods of network mapping are rarely used within these environments as any resulting impacts can be disastrous. Python Passive Network Mapping is ideally suited for use as a text in a variety of academic programs to expose and engage students in the art of passively mapping enterprise networks, with the added benefit of providing exposure to open source Python solutions.

PowerShell and Python Together - Targeting Digital Investigations (Paperback, 1st ed.): Chet Hosmer PowerShell and Python Together - Targeting Digital Investigations (Paperback, 1st ed.)
Chet Hosmer
R1,157 R920 Discovery Miles 9 200 Save R237 (20%) Ships in 10 - 15 working days

Bring together the Python programming language and Microsoft's PowerShell to address digital investigations and create state-of-the-art solutions for administrators, IT personnel, cyber response teams, and forensic investigators. You will learn how to join PowerShell's robust set of commands and access to the internals of both the MS Windows desktop and enterprise devices and Python's rich scripting environment allowing for the rapid development of new tools for investigation, automation, and deep analysis. PowerShell and Python Together takes a practical approach that provides an entry point and level playing field for a wide range of individuals, small companies, researchers, academics, students, and hobbyists to participate. What You'll Learn Leverage the internals of PowerShell for: digital investigation, incident response, and forensics Leverage Python to exploit already existing PowerShell CmdLets and aliases to build new automation and analysis capabilities Create combined PowerShell and Python applications that provide: rapid response capabilities to cybersecurity events, assistance in the precipitous collection of critical evidence (from the desktop and enterprise), and the ability to analyze, reason about, and respond to events and evidence collected across the enterprise Who This Book Is For System administrators, IT personnel, incident response teams, forensic investigators, professors teaching in undergraduate and graduate programs in cybersecurity, students in cybersecurity and computer science programs, and software developers and engineers developing new cybersecurity defenses

Python Forensics - A Workbench for Inventing and Sharing Digital Forensic Technology (Paperback): Chet Hosmer Python Forensics - A Workbench for Inventing and Sharing Digital Forensic Technology (Paperback)
Chet Hosmer
R1,447 Discovery Miles 14 470 Ships in 12 - 17 working days

"Python Forensics" provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions.

Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile devices or cloud services, or you are collecting and processing evidence from a network, Python forensic implementations can fill in the gaps.

Drawing upon years of practical experience and using numerous examples and illustrative code samples, author Chet Hosmer discusses how to: Develop new forensic solutions independent of large vendor software release schedules Participate in an open-source workbench that facilitates direct involvement in the design and implementation of new methods that augment or replace existing tools Advance your career by creating new solutions along with the construction of cutting-edge automation solutions to solve old problems
Provides hands-on tools, code samples, and detailed instruction and documentation that can be put to use immediatelyDiscusses how to create a Python forensics workbenchCovers effective forensic searching and indexing using PythonShows how to use Python to examine mobile device operating systems: iOS, Android, and Windows 8 Presents complete coverage of how to use Python scripts for network investigation

Integrating Python with Leading Computer Forensics Platforms (Paperback): Chet Hosmer Integrating Python with Leading Computer Forensics Platforms (Paperback)
Chet Hosmer
R1,243 R1,168 Discovery Miles 11 680 Save R75 (6%) Ships in 12 - 17 working days

Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCase by Guidance Software, MPE+ by AccessData, The Open Source Autopsy/SleuthKit by Brian Carrier and WetStone Technologies, and Live Acquisition and Triage Tool US-LATT. This book is for practitioners, forensic investigators, educators, students, private investigators, or anyone advancing digital forensics for investigating cybercrime. Additionally, the open source availability of the examples allows for sharing and growth within the industry. This book is the first to provide details on how to directly integrate Python into key forensic platforms.

Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback): Chet Hosmer, Joshua... Executing Windows Command Line Investigations - While Ensuring Evidentiary Integrity (Paperback)
Chet Hosmer, Joshua Bartolomie, Rosanne Pelli
R1,447 R1,351 Discovery Miles 13 510 Save R96 (7%) Ships in 12 - 17 working days

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Shield Fresh 24 Mist Spray (Vanilla…
R19 Discovery Miles 190
Bostik Clear on Blister Card (25ml)
R33 Discovery Miles 330
Butterfly A3 120gsm Landscape Sketch Pad…
R91 R59 Discovery Miles 590
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Luceco A70 Classic 16W Non-Dimmable LED…
R83 Discovery Miles 830
Peptine Pro Equine Hydrolysed Collagen…
 (2)
R359 R279 Discovery Miles 2 790
LocknLock Pet Dry Food Container (1.6L)
R91 Discovery Miles 910
Mellerware Plastic Oscilating Floor Fan…
R549 R497 Discovery Miles 4 970
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Bestway Beach Ball (51cm)
 (2)
R26 Discovery Miles 260

 

Partners