0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (8)
  • -
Status
Brand

Showing 1 - 9 of 9 matches in All Departments

CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback): Ric Messier CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions (Paperback)
Ric Messier
R1,352 Discovery Miles 13 520 Ships in 12 - 17 working days

The latest version of the official study guide for the in-demand CEH certification, now with 750 Practice Test Questions Information security and personal privacy remains a growing concern for businesses in every sector. And even as the number of certifications increases, the Certified Ethical Hacker, Version 12 (CEH v12) maintains its place as one of the most sought-after and in-demand credentials in the industry. In CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions, you’ll find a comprehensive overview of the CEH certification requirements. Concise and easy-to-follow instructions are combined with intuitive organization that allows you to learn each exam objective in your own time and at your own pace. The Study Guide now contains more end of chapter review questions and more online practice tests. This combines the value from the previous two-book set including a practice test book into a more valuable Study Guide. The book offers thorough and robust coverage of every relevant topic, as well as challenging chapter review questions, even more end of chapter review questions to validate your knowledge, and Exam Essentials, a key feature that identifies important areas for study. There are also twice as many online practice tests included. You’ll learn about common attack practices, like reconnaissance and scanning, intrusion detection, DoS attacks, buffer overflows, wireless attacks, mobile attacks, Internet of Things vulnerabilities, and more. It also provides: Practical, hands-on exercises that reinforce vital, real-world job skills and exam competencies Essential guidance for a certification that meets the requirements of the Department of Defense 8570 Directive for Information Assurance positions Complimentary access to the Sybex online learning center, complete with chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms The CEH v12 Certified Ethical Hacker Study Guide with 750 Practice Test Questions is your go-to official resource to prep for the challenging CEH v12 exam and a new career in information security and privacy.

Penetration Testing Basics - A Quick-Start Guide to Breaking into Systems (Paperback, 1st ed.): Ric Messier Penetration Testing Basics - A Quick-Start Guide to Breaking into Systems (Paperback, 1st ed.)
Ric Messier
R1,252 Discovery Miles 12 520 Ships in 10 - 15 working days

Learn how to break systems, networks, and software in order to determine where the bad guys might get in. Once the holes have been determined, this short book discusses how they can be fixed. Until they have been located, they are exposures to your organization. By reading Penetration Testing Basics, you'll gain the foundations of a simple methodology used to perform penetration testing on systems and networks for which you are responsible. What You Will Learn Identify security vulnerabilities Use some of the top security tools to identify holes Read reports from testing tools Spot and negate common attacks Identify common Web-based attacks and exposures as well as recommendations for closing those holes Who This Book Is For Anyone who has some familiarity with computers and an interest in information security and penetration testing.

Operating System Forensics (Paperback): Ric Messier Operating System Forensics (Paperback)
Ric Messier
R1,707 R1,556 Discovery Miles 15 560 Save R151 (9%) Ships in 12 - 17 working days

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference. Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key technical concepts, and the tools needed to perform examinations. Mobile operating systems such as Android, iOS, Windows, and Blackberry are also covered, providing everything practitioners need to conduct a forensic investigation of the most commonly used operating systems, including technical details of how each operating system works and how to find artifacts. This book walks you through the critical components of investigation and operating system functionality, including file systems, data recovery, memory forensics, system configuration, Internet access, cloud computing, tracking artifacts, executable layouts, malware, and log files. You'll find coverage of key technical topics like Windows Registry, /etc directory, Web browers caches, Mbox, PST files, GPS data, ELF, and more. Hands-on exercises in each chapter drive home the concepts covered in the book. You'll get everything you need for a successful forensics examination, including incident response tactics and legal requirements. Operating System Forensics is the only place you'll find all this covered in one book.

Learning Kali Linux - Security Testing, Penetration Testing & Ethical Hacking (Paperback): Ric Messier Learning Kali Linux - Security Testing, Penetration Testing & Ethical Hacking (Paperback)
Ric Messier
R1,387 R1,041 Discovery Miles 10 410 Save R346 (25%) Ships in 12 - 17 working days

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine what’s available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete

Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback): Ric Messier Collaboration with Cloud Computing - Security, Social Media, and Unified Communications (Paperback)
Ric Messier
R1,138 Discovery Miles 11 380 Ships in 12 - 17 working days

"Collaboration with Cloud Computing "discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions.

Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information securityThe risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing remote connectivity and accessibility to the enterprise network
Discusses the risks associated with technologies such as social media, voice over IP (VoIP) and cloud computing and provides guidance on how to manage that risk through policy changes and technical solutionsPresents a detailed look at the risks and rewards associated with cloud computing and storage as well as software as a service (SaaS) and includes pertinent case studiesExplores the risks associated with the use of social media to the enterprise networkCovers the bring-your-own-device(BYOD) trend, including policy considerations and technical requirements"

Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments (Paperback):... Build Your Own Cybersecurity Testing Lab: Low-cost Solutions for Testing in Virtual and Cloud-based Environments (Paperback)
Ric Messier
R847 Discovery Miles 8 470 Ships in 12 - 17 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Develop and assemble your own high-tech, inexpensive cybersecurity testing environment This hands-on guide shows how to build a low-cost lab for effective cybersecurity testing using open-source technologies and cloud resources. The book fully explains the languages used for infrastructure-as-code, meaning you can write programs to create your labs quickly, without manual steps that could lead to costly and frustrating mistakes. Build Your Own Cybersecurity Testing Lab: Low-Cost Solutions for Testing in Virtual and Cloud-Based Environments provides a single source for information and guidance needed to build out forensics resources, regardless of where those resources are located. You will get complete coverage of cloud-based and local virtual resources, network builds, and automating system and network builds for repeatability. *All source code in the book is available online*Includes more than two hours of videos that demonstrate the concepts covered*Written by a security expert and experienced educator

Network Forensics (Paperback): Ric Messier Network Forensics (Paperback)
Ric Messier
R1,454 R1,111 Discovery Miles 11 110 Save R343 (24%) Ships in 7 - 13 working days

Intensively hands-on training for real-world network forensics Network Forensics provides a uniquely practical guide for IT and law enforcement professionals seeking a deeper understanding of cybersecurity. This book is hands-on all the way by dissecting packets, you gain fundamental knowledge that only comes from experience. Real packet captures and log files demonstrate network traffic investigation, and the learn-by-doing approach relates the essential skills that traditional forensics investigators may not have. From network packet analysis to host artifacts to log analysis and beyond, this book emphasizes the critical techniques that bring evidence to light. Network forensics is a growing field, and is becoming increasingly central to law enforcement as cybercrime becomes more and more sophisticated. This book provides an unprecedented level of hands-on training to give investigators the skills they need. * Investigate packet captures to examine network communications * Locate host-based artifacts and analyze network logs * Understand intrusion detection systems and let them do the legwork * Have the right architecture and systems in place ahead of an incident Network data is always changing, and is never saved in one place; an investigator must understand how to examine data over time, which involves specialized skills that go above and beyond memory, mobile, or data forensics. Whether you're preparing for a security certification or just seeking deeper training for a law enforcement or IT role, you can only learn so much from concept; to thoroughly understand something, you need to do it. Network Forensics provides intensive hands-on practice with direct translation to real-world application.

Security Strategies in Linux Platforms and Applications (Paperback, 3rd edition): Ric Messier, Michael Jang Security Strategies in Linux Platforms and Applications (Paperback, 3rd edition)
Ric Messier, Michael Jang
R1,864 Discovery Miles 18 640 Ships in 9 - 15 working days

The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Part of the Jones & Bartlett Learning Information Systems Security & Assurance Series! Click here to learn more.

GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition): Ric Messier GSEC GIAC Security Essentials Certification All-in-One Exam Guide, Second Edition (Paperback, 2nd edition)
Ric Messier
R1,794 R1,372 Discovery Miles 13 720 Save R422 (24%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Fully updated coverage of every topic on the current version of the GSEC exam Take the Global Information Assurance Certification's challenging GIAC Security Essentials (GSEC) exam with confidence using this thoroughly revised self-study guide. You will explore IT systems roles and learn to perform hands-on cybersecurity tasks. The book covers the latest cybersecurity knowledge areas tested by the GSEC, including virtualization, cloud, and Windows-as-a-Service security. GSEC GIAC Security Essentials All-in-One Exam Guide, Second Edition offers clear explanations of complex concepts that ensure you will be ready for the test. To aid in self-study, each chapter includes a useful summary as well as "Exam Tips" that highlight salient points and practice questions that mimic those on the live test. Beyond exam prep, the book also serves as a valuable on-the-job reference for cybersecurity professionals. *Contains 100% coverage of all GSEC exam objectives*Online content includes full-length practice tests in the Total Tester exam engine and two hours of video training from the author*Written by an information security expert with decades of experience

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Tipping Point: Turmoil Or Reform…
Raymond Parsons Paperback R300 R219 Discovery Miles 2 190
Mission Of Malice - My Exodus From…
Erika Bornman Paperback  (8)
R260 R208 Discovery Miles 2 080
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Joseph Joseph Index Mini (Graphite)
R642 Discovery Miles 6 420
Shield Fresh 24 Gel Air Freshener…
R31 Discovery Miles 310
Loot
Nadine Gordimer Paperback  (2)
R398 R330 Discovery Miles 3 300
Wonder Organic Compost Activator (Single…
R59 R52 Discovery Miles 520
Moving Helper (Blue)
R399 R313 Discovery Miles 3 130
Handover Round Artist Brush in Pony Hair…
R38 R35 Discovery Miles 350
Croxley Create Wood Free Colouring…
R29 Discovery Miles 290

 

Partners