0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (8)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,422 R1,330 Discovery Miles 13 300 Save R92 (6%) Ships in 12 - 17 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Wireless Security: Know It All (Paperback): Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A.... Wireless Security: Know It All (Paperback)
Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A. Rackley, …
R1,662 Discovery Miles 16 620 Ships in 12 - 17 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf
Communications engineers need to master a wide area of topics to excel. The "Wireless Security Know It All" covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume"

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,050 Discovery Miles 10 500 Ships in 12 - 17 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

WarDriving and Wireless Penetration Testing (Paperback): Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker WarDriving and Wireless Penetration Testing (Paperback)
Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker
R1,662 Discovery Miles 16 620 Ships in 10 - 15 working days

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks."

How to Cheat at Securing a Wireless Network (Paperback): Chris Hurley, Lee Barken How to Cheat at Securing a Wireless Network (Paperback)
Chris Hurley, Lee Barken
R1,384 Discovery Miles 13 840 Ships in 10 - 15 working days

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing the wireless network
With the increased demand for mobile connectivity and the decrease in cost and in the time required for installation, wireless network connections will make up 20% of all corporate network connections by the end of 2006.
With this increase in usage comes a commensurate increase in the network s vulnerability to intrusion. This book provides the typical network administrator with the basic tools and instruction they need to maintain a secure network while allowing acceptable access to users.
. A practical product and technology specific guideline to securing a wireless networks for the busy System Administrator
. Takes a simplified multi-layered approach into easily deployed plans for a straight forward understanding
. Does not bog you down with history, but offers practical useful information for today"

Stealing the Network - How to Own an Identity (Paperback, Parental Adviso): Ryan Russell, Riley Eller, Jay Beale, Chris Hurley,... Stealing the Network - How to Own an Identity (Paperback, Parental Adviso)
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, …
R1,482 Discovery Miles 14 820 Ships in 10 - 15 working days

The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on thebook are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul (Paperback): Chris Hurley, Johnny Long, Aaron W. Bayles, Ed Brindley InfoSec Career Hacking: Sell Your Skillz, Not Your Soul (Paperback)
Chris Hurley, Johnny Long, Aaron W. Bayles, Ed Brindley
R1,493 Discovery Miles 14 930 Ships in 10 - 15 working days

"InfoSec Career Hacking" starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them.
Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight on how to develop the requisite soft skills to migrate form the hacker to corporate world.
* The InfoSec job market will experience explosive growth over the next five years, and many candidates for these positions will come from thriving, hacker communities
* Teaches these hackers how to build their own test networks to develop their skills to appeal to corporations and government agencies
* Provides specific instructions for developing time, management, and personal skills to build a successful InfoSec career

WarDriving: Drive, Detect, Defend - A Guide to Wireless Security (Paperback): Chris Hurley WarDriving: Drive, Detect, Defend - A Guide to Wireless Security (Paperback)
Chris Hurley
R1,771 Discovery Miles 17 710 Ships in 10 - 15 working days

The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense debate amongst lawmakers, security professionals, and the telecommunications industry. This first ever book on WarDriving is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in very major, metropolitan area worldwide. These insiders also provide the information to secure your wireless network before it is exploited by criminal hackers.
* Provides the essential information needed to protect and secure wireless networks
* Written from the inside perspective of those who have created the tools for WarDriving and those who gather, maintain and analyse data on wireless networks
* This is the first book to deal with the hot topic of WarDriving

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Addis Rolla Foldable Cart
R599 R533 Discovery Miles 5 330
Bantex @School Jumbo Triangular Pencils…
R36 Discovery Miles 360
Salton 3 Bar Heater
R613 Discovery Miles 6 130
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
Amos Red Glue Stick (8g)
R10 Discovery Miles 100
Lifematrix MCT Powder (Unflavoured…
R271 Discovery Miles 2 710
Silicone Cellphone Card Holder [White]
R10 Discovery Miles 100
Miss Peregrine's Home for Peculiar…
Eva Green, Asa Butterfield, … Blu-ray disc  (1)
R38 Discovery Miles 380
Barbie - 4K Ultra HD + Blu-Ray
Margot Robbie, Ryan Gosling Blu-ray disc R767 R513 Discovery Miles 5 130
Mellerware Plastic Oscilating Floor Fan…
R549 R459 Discovery Miles 4 590

 

Partners