0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (6)
  • R1,000 - R2,500 (2)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners (Paperback, 2nd edition): Jason Andress, Steve... Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners (Paperback, 2nd edition)
Jason Andress, Steve Winterfeld
R891 Discovery Miles 8 910 Ships in 12 - 17 working days

Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It probes relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Logical, physical, and psychological weapons used in cyber warfare are discussed. This text will appeal to information security practitioners, network security administrators, computer system administrators, and security analysts.

Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback): Thomas Wilhelm, Jason Andress Ninja Hacking - Unconventional Penetration Testing Tactics and Techniques (Paperback)
Thomas Wilhelm, Jason Andress
R804 Discovery Miles 8 040 Ships in 12 - 17 working days

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks at the methods used by malicious attackers in real-world situations and details unorthodox penetration testing techniques by getting inside the mind of a ninja. It also expands upon current penetration testing methodologies including new tactics for hardware and physical attacks. This book is organized into 17 chapters. The first two chapters incorporate the historical ninja into the modern hackers. The white-hat hackers are differentiated from the black-hat hackers. The function gaps between them are identified. The next chapters explore strategies and tactics using knowledge acquired from Sun Tzu's The Art of War applied to a ninja hacking project. The use of disguise, impersonation, and infiltration in hacking is then discussed. Other chapters cover stealth, entering methods, espionage using concealment devices, covert listening devices, intelligence gathering and interrogation, surveillance, and sabotage. The book concludes by presenting ways to hide the attack locations and activities. This book will be of great value not only to penetration testers and security professionals, but also to network and system administrators as well as hackers.

Building a Practical Information Security Program (Paperback): Jason Andress, Mark Leary Building a Practical Information Security Program (Paperback)
Jason Andress, Mark Leary
R1,689 R1,433 Discovery Miles 14 330 Save R256 (15%) Ships in 12 - 17 working days

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject matter supports aspiring security engineers to forge a career path to successfully manage a security program, thereby adding value and reducing risk to the business. Readers learn how to translate technical challenges into business requirements, understand when to "go big or go home," explore in-depth defense strategies, and review tactics on when to absorb risks. This book explains how to properly plan and implement an infosec program based on business strategy and results.

Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback, 2nd edition)
Jason Andress, Ryan Linn
R1,078 Discovery Miles 10 780 Ships in 12 - 17 working days

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.

Coding for Penetration Testers - Building Better Tools (Paperback): Jason Andress, Ryan Linn Coding for Penetration Testers - Building Better Tools (Paperback)
Jason Andress, Ryan Linn
R873 R727 Discovery Miles 7 270 Save R146 (17%) Ships in 9 - 15 working days

Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language. "Coding for Penetration Testers" provides the reader with an understanding of the scripting languages that are commonly used when developing tools for penetration testing. It also guides the reader through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the reader is guided through real-world scenarios and tool development that can be incorporated into a tester's toolkit.
Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting including, but not limited to, Web scripting, scanner scripting, and exploitation scripting

The Basics of Cyber Warfare - Understanding the Fundamentals of Cyber Warfare in Theory and Practice (Paperback): Steve... The Basics of Cyber Warfare - Understanding the Fundamentals of Cyber Warfare in Theory and Practice (Paperback)
Steve Winterfeld, Jason Andress
R643 R549 Discovery Miles 5 490 Save R94 (15%) Ships in 12 - 17 working days

"The Basics of Cyber Warfare" provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology.

"The Basics of Cyber Warfare" gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
Provides a sound understanding of the tools and tactics used in cyber warfare. Describes both offensive and defensive tactics from an insider's point of view. Presents doctrine and hands-on techniques to understand as cyber warfare evolves with technology.

The Basics of Information Security - Understanding the Fundamentals of InfoSec in Theory and Practice (Paperback, 2nd edition):... The Basics of Information Security - Understanding the Fundamentals of InfoSec in Theory and Practice (Paperback, 2nd edition)
Jason Andress
R828 Discovery Miles 8 280 Ships in 12 - 17 working days

As part of the Syngress "Basics" series, "The Basics of Information Security" provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.

"The Basics of Information Security" gives you clear-non-technical explanations of how infosec works and how to apply these principles whether you're in the IT field or want to understand how it affects your career and business. The new Second Edition has been updated for the latest trends and threats, including new material on many infosec subjects.
Learn about information security without wading through a huge textbookCovers both theoretical and practical aspects of information securityProvides a broad view of the information security field in a concise mannerAll-new Second Edition updated for the latest information security trends and threats, including material on incident response, social engineering, security awareness, risk management, and legal/regulatory issues

Foundations Of Information Security - A Straightforward Introduction (Paperback): Jason Andress Foundations Of Information Security - A Straightforward Introduction (Paperback)
Jason Andress
R1,108 R765 Discovery Miles 7 650 Save R343 (31%) Ships in 12 - 17 working days

Foundations of Information Security provides readers with fundamental knowledge of information security in both theoretical and practical aspects. Each chapter explores one main security concept, lists scenarios in which the concept is applicable, and discusses the implementation of that concept in detail, often by going over rival models or strategies. Readers will come away with a sense of what types of assets need protecting, what kinds of risks exist, and what kinds of defensive measures can be taken.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Calamity Of Souls
David Baldacci Paperback R365 R260 Discovery Miles 2 600
The Hidden Storyteller
Mandy Robotham Paperback R380 R255 Discovery Miles 2 550
Overkill
Sandra Brown Paperback R530 R449 Discovery Miles 4 490
This Nowhere Place
Natasha Bell Paperback R488 R404 Discovery Miles 4 040
The Heist Men
Andrew Brown Paperback R290 R232 Discovery Miles 2 320
The Good Nigerian
David Dison Paperback R240 R188 Discovery Miles 1 880
Amok
Sebastian Fitzek Paperback R482 R397 Discovery Miles 3 970
Good Girl, Bad Girl
Michael Robotham Paperback  (2)
R524 R394 Discovery Miles 3 940
2 Sisters Detective Agency
James Patterson, Candice Fox Paperback R257 R212 Discovery Miles 2 120
No Plan B
Lee Child, Andrew Child Paperback R411 Discovery Miles 4 110

 

Partners