0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (4)
  • R2,500 - R5,000 (2)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition): Bruce Middleton Cyber Crime Investigator's Field Guide (Hardcover, 3rd edition)
Bruce Middleton
R1,951 Discovery Miles 19 510 Ships in 12 - 17 working days

Unique selling point: * Set up to be used as a college textbook with a complete "Case Study" that involves the use of Python (a very key programming language at this time) Core audience: * Cyber security professionals, college students in a cyber forensics class, and individuals interested in cyber crime Place in the market: * Will build on the success of the previous two editions

A History of Cyber Security Attacks - 1980 to Present (Paperback): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Paperback)
Bruce Middleton
R1,461 Discovery Miles 14 610 Ships in 9 - 15 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Conducting Network Penetration and Espionage in a Global Environment (Paperback): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Paperback)
Bruce Middleton
R1,862 Discovery Miles 18 620 Ships in 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Cyber Crime Investigator's Field Guide (Paperback, 2nd edition): Bruce Middleton Cyber Crime Investigator's Field Guide (Paperback, 2nd edition)
Bruce Middleton
R2,574 Discovery Miles 25 740 Ships in 12 - 17 working days

Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative framework that needs to be followed, along with information about how cyberspace works and the tools that reveal the who, what, when, where, why, and how in the investigation of cyber crime. This volume offers a valuable Q&A by subject area, an extensive overview of recommended reference materials, and a detailed case study. Appendices highlight attack signatures, UNIX/Linux commands, Cisco PIX commands, port numbers targeted by trojan horses, and more.

A History of Cyber Security Attacks - 1980 to Present (Hardcover): Bruce Middleton A History of Cyber Security Attacks - 1980 to Present (Hardcover)
Bruce Middleton
R2,020 Discovery Miles 20 200 Ships in 12 - 17 working days

Stories of cyberattacks dominate the headlines. Whether it is theft of massive amounts of personally identifiable information or the latest intrusion of foreign governments in U.S. government and industrial sites, cyberattacks are now important. For professionals and the public, knowing how the attacks are launched and succeed is vital to ensuring cyber security. The book provides a concise summary in a historical context of the major global cyber security attacks since 1980. Each attack covered contains an overview of the incident in layman terms, followed by a technical details section, and culminating in a lessons learned and recommendations section.

Conducting Network Penetration and Espionage in a Global Environment (Hardcover): Bruce Middleton Conducting Network Penetration and Espionage in a Global Environment (Hardcover)
Bruce Middleton
R3,372 Discovery Miles 33 720 Ships in 12 - 17 working days

When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Telling Stories
Steven Cohan, Linda M. Shires Hardcover R8,068 Discovery Miles 80 680
Prostitution Scandals in China…
Elaine Jeffreys Paperback R1,552 Discovery Miles 15 520
Bare Architecture - A Schizoanalysis
Chris L. Smith Hardcover R4,319 Discovery Miles 43 190
Queen Of Our Times - The Life Of…
Robert Hardman Hardcover R655 Discovery Miles 6 550
Wilkinson Sword Teardrop - Dessert Knife…
R529 R494 Discovery Miles 4 940
Poststructuralism, Marxism, and…
Michael A. Peters Paperback R1,268 Discovery Miles 12 680
Acts of the Legislative Council of the…
Florida Legislative Council Paperback R420 Discovery Miles 4 200
B.E. 2.0 - Turning Your Business Into An…
Jim Collins Hardcover R690 R570 Discovery Miles 5 700
Daisy Dragon Has As A Cold - bedtime…
Kelly Curtiss Hardcover R504 Discovery Miles 5 040
Eetrite Newport Table Knife Set (2…
R101 Discovery Miles 1 010

 

Partners