0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

A History of Cyber Security Attacks - 1980 to Present (Paperback): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Paperback)
Bruce Middleton
R1,434 Discovery Miles 14 340 Ships in 9 - 17 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition): Bruce Middleton Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition)
Bruce Middleton
R1,914 Discovery Miles 19 140 Ships in 12 - 19 working days

Unique selling point: * Set up to be used as a college textbook with a complete "Case Study" that involves the use of Python (a very key programming language at this time) Core audience: * Cyber security professionals, college students in a cyber forensics class, and individuals interested in cyber crime Place in the market: * Will build on the success of the previous two editions

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,827 Discovery Miles 18 270 Ships in 12 - 19 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Cyber Crime Investigator's Field Guide (Paperback, 2nd edition): Bruce Middleton Cyber Crime Investigator's Field Guide (Paperback, 2nd edition)
Bruce Middleton
R2,525 Discovery Miles 25 250 Ships in 12 - 19 working days

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.

A History of Cyber Security Attacks - 1980 to Present (Hardcover): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Hardcover)
Bruce Middleton
R1,982 Discovery Miles 19 820 Ships in 12 - 19 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Conducting Network Penetration and Espionage in a Global Environment (Hardcover): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Hardcover)
Bruce Middleton
R3,307 Discovery Miles 33 070 Ships in 12 - 19 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
International Comparative Employee…
Karl Koch, Pietro Manzella Hardcover R3,137 Discovery Miles 31 370
An Alphabet of Birds
Judith Lopez Hardcover R590 Discovery Miles 5 900
Work and Labour Relations in Global…
Julieta Haidar, Maarten Keune Hardcover R3,329 Discovery Miles 33 290
Churchill & Smuts - The Friendship
Richard Steyn Paperback  (6)
R320 R286 Discovery Miles 2 860
The Aesthetics of Children's Poetry - A…
Katherine Wakely-Mulroney, Louise Joy Hardcover R4,474 Discovery Miles 44 740
Everyone Is Still Alive
Cathy Rentzenbrink Paperback R335 R188 Discovery Miles 1 880
The Fruit Cultivator's Manual…
Thomas Bridgeman Paperback R487 Discovery Miles 4 870
Published This Day - Marketing Books in…
Fred Nesta Hardcover R3,029 Discovery Miles 30 290
Vincent van Gogh: Sunflowers Artisan Art…
Flame Tree Studio Notebook / blank book R237 Discovery Miles 2 370
The End of an Elite - The French Bishops…
Nigel Aston Hardcover R1,746 Discovery Miles 17 460

 

Partners