0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback): Eric Cole Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback)
Eric Cole
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization" Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

"Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

Advanced Persistent Threat covers what you need to know including:

How and why organizations are being attacked

How to develop a "Risk based Approach to Security"

Tools for protecting data and preventing attacks

Critical information on how to respond and recover from an intrusion

The emerging threat to Cloud based networks "

Infosec Rock Star - How to Accelerate Your Career Because Geek Will Only Get You So Far (Paperback): Ted Demopoulos Infosec Rock Star - How to Accelerate Your Career Because Geek Will Only Get You So Far (Paperback)
Ted Demopoulos; Foreword by Eric Cole
R399 R359 Discovery Miles 3 590 Save R40 (10%) Ships in 10 - 15 working days

Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits. Maybe you think you can't be a Rock Star, but everyone can MOVE towards it and reap the benefits of vastly increased success. Remember, "Geek" will only get you so far . . .

Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback): Eric Cole Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback)
Eric Cole
R395 R354 Discovery Miles 3 540 Save R41 (10%) Ships in 10 - 15 working days

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers - anyone responsible for safeguarding a client's or student's data - will learn something they can use right away. Whether you're a parent wanting to know how to keep your children safe as they use the Internet, or a senior citizen who doesn't want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft (Paperback): Eric Cole, Sandra Ring Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft (Paperback)
Eric Cole, Sandra Ring
R1,171 Discovery Miles 11 710 Ships in 18 - 22 working days

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today.
This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur.
Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
* Tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today
* Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks
* Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.books on this topic"

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback): Eric Cole, Michael Nordfelt, Sandra Ring,... Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback)
Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
R1,343 Discovery Miles 13 430 Ships in 18 - 22 working days

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Copywriting Is... - 30-or-so Thoughts on…
Andrew Boulton Paperback R371 R337 Discovery Miles 3 370
Can You See Me?
Libby Scott, Rebecca Westcott Paperback R213 Discovery Miles 2 130
Millie Marotta's Brilliant Beasts - A…
Millie Marotta Paperback  (2)
R350 R312 Discovery Miles 3 120
Special Topics in Intellectual Property
Andrea Twiss-Brooks Hardcover R2,716 Discovery Miles 27 160
Achieve Beyond Expectations
Bill Blokker Hardcover R660 Discovery Miles 6 600
Customer service
R. Machado Paperback  (2)
R590 Discovery Miles 5 900
Advanced Introduction to International…
Susy Frankel, Daniel J. Gervais Paperback R644 Discovery Miles 6 440
ANONYMITY in COLLABORATION - Anonymous…
Ruiling Lu Hardcover R644 Discovery Miles 6 440
Cultural Studies And Technical…
Mark Zachry Paperback R999 Discovery Miles 9 990
My Brother and Me
Amy Zoque Paperback R218 R207 Discovery Miles 2 070

 

Partners