0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (6)
  • R1,000 - R2,500 (9)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R821 Discovery Miles 8 210 Ships in 12 - 19 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R873 Discovery Miles 8 730 Ships in 12 - 19 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

Introduction to US Cybersecurity Careers (Paperback): Henry Dalziel Introduction to US Cybersecurity Careers (Paperback)
Henry Dalziel
R887 Discovery Miles 8 870 Ships in 12 - 19 working days

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback): Henry Dalziel How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback)
Henry Dalziel; Edited by Simon Crosby
R821 Discovery Miles 8 210 Ships in 12 - 19 working days

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

How to Define and Build an Effective Cyber Threat Intelligence Capability (Paperback): Henry Dalziel How to Define and Build an Effective Cyber Threat Intelligence Capability (Paperback)
Henry Dalziel; Edited by Eric Olson, James Carnall
R910 R821 Discovery Miles 8 210 Save R89 (10%) Ships in 12 - 19 working days

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback): Henry Dalziel, Ajin... Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback)
Henry Dalziel, Ajin Abraham
R1,185 Discovery Miles 11 850 Ships in 10 - 15 working days

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Cyber Security Awareness for Lawyers (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Lawyers (Paperback)
David Willson, Henry Dalziel
R1,194 Discovery Miles 11 940 Ships in 10 - 15 working days

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Cyber Security Awareness for Accountants and CPAs (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Accountants and CPAs (Paperback)
David Willson, Henry Dalziel
R1,189 Discovery Miles 11 890 Ships in 10 - 15 working days

Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Cyber Security Awareness for Corporate Directors and Board Members (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Corporate Directors and Board Members (Paperback)
David Willson, Henry Dalziel
R1,203 Discovery Miles 12 030 Ships in 10 - 15 working days

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

Deploying Secure Containers for Training and Development (Paperback): Jon Schipp, Henry Dalziel Deploying Secure Containers for Training and Development (Paperback)
Jon Schipp, Henry Dalziel
R861 Discovery Miles 8 610 Ships in 9 - 17 working days

In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.

Infosec Management Fundamentals (Paperback): Henry Dalziel Infosec Management Fundamentals (Paperback)
Henry Dalziel
R1,193 Discovery Miles 11 930 Ships in 10 - 15 working days

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,189 Discovery Miles 11 890 Ships in 10 - 15 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Cyber Security Awareness for CEOs and Management (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for CEOs and Management (Paperback)
David Willson, Henry Dalziel
R1,192 Discovery Miles 11 920 Ships in 10 - 15 working days

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Next Generation Red Teaming (Paperback): Henry Dalziel Next Generation Red Teaming (Paperback)
Henry Dalziel
R1,189 Discovery Miles 11 890 Ships in 10 - 15 working days

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization's security posture is. This course is particularly suited to CISO's and CTO's that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.

Securing Social Media in the Enterprise (Paperback): Henry Dalziel Securing Social Media in the Enterprise (Paperback)
Henry Dalziel
R1,189 Discovery Miles 11 890 Ships in 10 - 15 working days

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Ghosts of North Texas
Mitchel Whitington Paperback R580 Discovery Miles 5 800
The Fasti; Tristia; Pontic Epistles…
Ovid Paperback R714 Discovery Miles 7 140
The Protective Arm of the Renin…
Thomas Unger, U. Muscha Steckelings, … Paperback R2,685 Discovery Miles 26 850
Perspectives on the Archaeology of…
Elizabeth Anne Bollwerk, Shannon Tushingham Hardcover R4,620 Discovery Miles 46 200
The Palestine Laboratory - How Israel…
Antony Loewenstein Paperback R300 R277 Discovery Miles 2 770
Working - Its Meanings and Its Limits
Gilbert C Meilaender Hardcover R2,937 Discovery Miles 29 370
Chocolate Affirmations
Leah Love Paperback R460 R421 Discovery Miles 4 210
All Our Griefs to Bear - Responding with…
Joni S Sancken Paperback R453 R420 Discovery Miles 4 200
The Female Body - Perspectives of Latin…
Raysa E. Gomez-Quintero, Mireya Perez Bustillo Hardcover R2,206 Discovery Miles 22 060
Between Advents
Bruce L Taylor Hardcover R1,028 R873 Discovery Miles 8 730

 

Partners