0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (2)
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 6 of 6 matches in All Departments

Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback): Eric Cole Advanced Persistent Threat - Understanding the Danger and How to Protect Your Organization (Paperback)
Eric Cole
R1,111 Discovery Miles 11 110 Ships in 10 - 15 working days

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization" Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim.

"Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.

Advanced Persistent Threat covers what you need to know including:

How and why organizations are being attacked

How to develop a "Risk based Approach to Security"

Tools for protecting data and preventing attacks

Critical information on how to respond and recover from an intrusion

The emerging threat to Cloud based networks "

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback): Eric Cole, Michael Nordfelt, Sandra Ring,... Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives (Paperback)
Eric Cole, Michael Nordfelt, Sandra Ring, Ted Fair
R1,343 Discovery Miles 13 430 Ships in 18 - 22 working days

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel confident they can be aware of the different online activities their families engage in.
Expert authors have worked at Fortune 500 companies, NASA, CIA, NSA and all reside now at Sytex, one of the largest government providers of IT services.
*Targets an area that is not addressed by other books: black hat techniques for computer security at the personal computer level.
*Targets a wide audience: personal computer users, specifically those interested in the online activities of their families.

Infosec Rock Star - How to Accelerate Your Career Because Geek Will Only Get You So Far (Paperback): Ted Demopoulos Infosec Rock Star - How to Accelerate Your Career Because Geek Will Only Get You So Far (Paperback)
Ted Demopoulos; Foreword by Eric Cole
R399 R359 Discovery Miles 3 590 Save R40 (10%) Ships in 10 - 15 working days

Have you noticed that some people in infosec simply have more success than others, however they may define success? Some people are simply more listened too, more prominent, make more of a difference, have more flexibility with work, more freedom, choices of the best projects, and yes, make more money. They are not just lucky. They make their luck. The most successful are not necessarily the most technical, although technical or "geek" skills are essential. They are an absolute must, and we naturally build technical skills through experience. They are essential, but not for Rock Star level success. The most successful, the Infosec Rock Stars, have a slew of other equally valuable skills, ones most people never develop nor even understand. They include skills such as self direction, communication, business understanding, leadership, time management, project management, influence, negotiation, results orientation, and lots more . . . Infosec Rock Star will start you on your journey of mastering these skills and the journey of moving toward Rock Star status and all its benefits. Maybe you think you can't be a Rock Star, but everyone can MOVE towards it and reap the benefits of vastly increased success. Remember, "Geek" will only get you so far . . .

Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback): Eric Cole Online Danger - How to Protect Yourself and Your Loved Ones From the Evil Side of the Internet (Paperback)
Eric Cole
R395 R354 Discovery Miles 3 540 Save R41 (10%) Ships in 10 - 15 working days

Cyberspace is an informative, fun, and educational place for the entire family, but danger lurks everywhere you turn online. From phishing to cyber bullying to identity theft, there are a myriad of ways that you and your loved ones could be harmed online, often with irreparable damage. Fortunately, there are precautions that everyone can take to protect themselves, their families, and their businesses that don't require advanced (or even any) technical knowledge. In this book, cyber security expert, Dr. Eric Cole, provides a layman's look at how to protect yourself online. Dr. Cole makes the case that everyone is a potential target, not just the rich and famous. And we all have the ability to make it more difficult for cyber criminals to make us their next victim. He explains in plain language how to make your computer safer, protect your email, and guard your online accounts. Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet applies to organizations as well as individuals, and across professions. Doctors, lawyers, and teachers - anyone responsible for safeguarding a client's or student's data - will learn something they can use right away. Whether you're a parent wanting to know how to keep your children safe as they use the Internet, or a senior citizen who doesn't want to fall prey to an online scammer, or a daily technology user who wants to learn more about how to protect themselves in cyberspace, this book is for you.

Cyber Crisis - Protecting Your Business from Real Threats in the Virtual World (Hardcover): Eric Cole Cyber Crisis - Protecting Your Business from Real Threats in the Virtual World (Hardcover)
Eric Cole
R615 Discovery Miles 6 150 Ships in 10 - 15 working days

Today, we live our lives-and conduct our business-online. Our data is in the cloud and in our pockets on our smartphones, shuttled over public Wi-Fi and company networks. To keep it safe, we rely on passwords and encryption and private servers, IT departments and best practices. But as you read this, there is a 70 percent chance that your data is compromised . . . you just don't know it yet. Cybersecurity attacks have increased exponentially, but because they're stealthy and often invisible, many underplay, ignore, or simply don't realize the danger. By the time they discover a breach, most individuals and businesses have been compromised for over three years. Instead of waiting until a problem surfaces, avoiding a data disaster means acting now to prevent one. In Cyber Crisis, Eric Cole gives readers a clear-eyed picture of the information war raging in cyberspace. Drawing on 30 years of experience-as a professional hacker for the CIA, as the Obama administration's cybersecurity commissioner, and as a consultant to clients around the globe from Bill Gates to Lockheed Martin and McAfee-Cole offers practical, actionable advice that even those with little technical background can implement, including steps to take on a daily, weekly, and monthly basis to protect their businesses and themselves. No matter who you are or where you work, cybersecurity should be a top priority. The information infrastructure we rely on in every sector of our lives-in healthcare and finance, for governments and private citizens-is both critical and vulnerable, and sooner or later, you or your company will be a target. This book is your guide to understanding the threat and putting together a proactive plan to minimize exposure and damage, and ensure the security of your business, your family, and your future.

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft (Paperback): Eric Cole, Sandra Ring Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft (Paperback)
Eric Cole, Sandra Ring
R1,171 Discovery Miles 11 710 Ships in 18 - 22 working days

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today.
This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most likely to pose a threat. Next, the reader will learn about the variety of tools and attacks used by insiders to commit their crimes including: encryption, steganography, and social engineering. The book will then specifically address the dangers faced by corporations and government agencies. Finally, the reader will learn how to design effective security systems to prevent insider attacks and how to investigate insider security breeches that do occur.
Throughout the book, the authors will use their backgrounds in the CIA to analyze several, high-profile cases involving insider threats.
* Tackles one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today
* Both co-authors worked for several years at the CIA, and they use this experience to analyze several high-profile cases involving insider threat attacks
* Despite the frequency and harm caused by insider attacks, there are no competing books on this topic.books on this topic"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Aerodynamic Data of Space Vehicles
Claus Weiland Hardcover R5,414 Discovery Miles 54 140
Fractal-Based Methods in Analysis
Herb Kunze, Davide La Torre, … Hardcover R2,715 Discovery Miles 27 150
Read to Succeed - Great Readers Make…
Charles O'Donnell Hardcover R768 Discovery Miles 7 680
Paradoxes in Aerohydrodynamics
Shakhbaz A. Yershin Hardcover R4,023 R3,492 Discovery Miles 34 920
Hack Proofing ColdFusion
Syngress Paperback R1,286 Discovery Miles 12 860
The Soul Of An Entrepreneur - Work And…
David Sax Paperback R405 R361 Discovery Miles 3 610
The Application of the…
Wei Dong Guo, Gerard Labrosse, … Hardcover R1,345 Discovery Miles 13 450
Heat Transfers and Related Effects in…
Bernard Zappoli, Daniel Beysens, … Hardcover R4,185 R3,654 Discovery Miles 36 540
Heat Conduction
Latif M Jiji Hardcover R2,884 Discovery Miles 28 840
Mathematical Models of Tumor-Immune…
Amina Eladdadi, Peter Kim, … Hardcover R3,957 R3,427 Discovery Miles 34 270

 

Partners