0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • R1,000 - R2,500 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 4th edition): Branden R.... PCI Compliance - Understand and Implement Effective PCI Data Security Standard Compliance (Paperback, 4th edition)
Branden R. Williams, Anton Chuvakin
R1,558 Discovery Miles 15 580 Ships in 12 - 17 working days

Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has been revised to follow the new PCI DSS standard version 3.0, which is the official version beginning in January 2014. Also new to the Fourth Edition: additional case studies and clear guidelines and instructions for maintaining PCI compliance globally, including coverage of technologies such as NFC, P2PE, CNP/Mobile, and EMV. This is the first book to address the recent updates to PCI DSS. The real-world scenarios and hands-on guidance are also new approaches to this topic. All-new case studies and fraud studies have been added to the Fourth Edition. Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need in order to understand the current PCI Data Security standards and how to effectively implement security on network infrastructure in order to be compliant with the credit card industry guidelines, and help you protect sensitive and personally-identifiable information.

Security Warrior (Paperback): Cyrus Peikari Security Warrior (Paperback)
Cyrus Peikari; Contributions by Anton Chuvakin
R1,118 R815 Discovery Miles 8 150 Save R303 (27%) Ships in 12 - 17 working days

When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.

What's the worst an attacker can do to you? You'd better find out, right? That's what "Security Warrior" teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, "Security Warrior" reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.

"Security Warrior" places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.

"Security Warrior" is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

The Cloud Security Rules - Technology is your friend. And enemy. A book about ruling the cloud. (Paperback): Anton Chuvakin,... The Cloud Security Rules - Technology is your friend. And enemy. A book about ruling the cloud. (Paperback)
Anton Chuvakin, Margaretha Eriksson, Alistar Forbes
R657 Discovery Miles 6 570 Ships in 10 - 15 working days

The Cloud Security Rules explains the different aspects of cloud security to business leaders, CxO's, IT-managers and decision makers. The security principles are the same as before while the implementation and the risks involved are dramatically changed. The book is co-authored by some of the most recognized security specialists and bloggers in the world. The authors are gathered from USA, Europe and Africa, sharing their great knowledge of implementing and securing the cloud. This book is made to help it easier for you to choose the right cloud supplier as well as setting up and running your critical services in the cloud. Questions you will find answers about include: - Do I have to accept that standard SLA? - What should an SLA include? - What standards should I be paying attention to, if any? - How do I treat mobile workers, and how do they fit into the cloud? - Do I really need to care about logging? - Many more Since the cloud computing is global, you risk using service providers in other countries than your own - even if you only operate in your own country. The Cloud Security Rules aims at helping you understand the risks involved, and help you determine the best strategy for your organization.

Logging and Log Management - The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management... Logging and Log Management - The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management (Paperback)
Anton Chuvakin, Kevin Schmidt, Chris Phillips
R1,145 R934 Discovery Miles 9 340 Save R211 (18%) Ships in 9 - 15 working days

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Spider-Man: 5-Movie Collection…
Tobey Maguire, Kirsten Dunst, … Blu-ray disc  (1)
R466 Discovery Miles 4 660
Alva 3-Panel Infrared Radiant Indoor Gas…
R1,499 R1,199 Discovery Miles 11 990
Mellerware Aquillo Desktop Fan (White…
R597 Discovery Miles 5 970
Jabra Elite 5 Hybrid ANC True Wireless…
R2,899 R2,399 Discovery Miles 23 990
Jumbo Jan van Haasteren Comic Jigsaw…
 (1)
R439 R399 Discovery Miles 3 990
Top Gun: Maverick - Music From The…
Various Artists CD R143 Discovery Miles 1 430
Elecstor GU-10 5W Rechargeable LED Bulb…
R69 R59 Discovery Miles 590
From Russia With Love
Eunice Gayson, Daniela Bianchi, … Blu-ray disc R66 Discovery Miles 660
Moving On Skiffle
Van Morrison CD R536 Discovery Miles 5 360
Sony PlayStation 5 DualSense Wireless…
 (2)
R1,599 R1,479 Discovery Miles 14 790

 

Partners