0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (6)
  • R1,000 - R2,500 (9)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Meeting People via WiFi and Bluetooth (Paperback): Joshua Schroeder, Henry Dalziel Meeting People via WiFi and Bluetooth (Paperback)
Joshua Schroeder, Henry Dalziel
R770 Discovery Miles 7 700 Ships in 12 - 17 working days

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.

How to Attack and Defend Your Website (Paperback): Henry Dalziel How to Attack and Defend Your Website (Paperback)
Henry Dalziel; Edited by Alejandro Caceres
R820 Discovery Miles 8 200 Ships in 12 - 17 working days

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities. This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols. How to Attack and Defend Your Website is be the first book to combine the methodology behind using penetration testing tools such as Burp Suite and Damn Vulnerable Web Application (DVWA), with practical exercises that show readers how to (and therefore, how to prevent) pwning with SQLMap and using stored XSS to deface web pages.

Introduction to US Cybersecurity Careers (Paperback): Henry Dalziel Introduction to US Cybersecurity Careers (Paperback)
Henry Dalziel
R832 Discovery Miles 8 320 Ships in 12 - 17 working days

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback): Henry Dalziel How to Defeat Advanced Malware - New Tools for Protection and Forensics (Paperback)
Henry Dalziel; Edited by Simon Crosby
R770 Discovery Miles 7 700 Ships in 12 - 17 working days

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

How to Define and Build an Effective Cyber Threat Intelligence Capability (Paperback): Henry Dalziel How to Define and Build an Effective Cyber Threat Intelligence Capability (Paperback)
Henry Dalziel; Edited by Eric Olson, James Carnall
R891 R770 Discovery Miles 7 700 Save R121 (14%) Ships in 12 - 17 working days

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback): Henry Dalziel, Ajin... Automated Security Analysis of Android and iOS Applications with Mobile Security Framework (Paperback)
Henry Dalziel, Ajin Abraham
R1,168 Discovery Miles 11 680 Ships in 10 - 15 working days

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defences for these attacks.

Cyber Security Awareness for Lawyers (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Lawyers (Paperback)
David Willson, Henry Dalziel
R1,176 Discovery Miles 11 760 Ships in 10 - 15 working days

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Cyber Security Awareness for Accountants and CPAs (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Accountants and CPAs (Paperback)
David Willson, Henry Dalziel
R1,172 Discovery Miles 11 720 Ships in 10 - 15 working days

Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Essential Skills for Hackers (Paperback): Kevin Cardwell, Henry Dalziel Essential Skills for Hackers (Paperback)
Kevin Cardwell, Henry Dalziel
R1,172 Discovery Miles 11 720 Ships in 10 - 15 working days

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn't match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.

Cyber Security Awareness for Corporate Directors and Board Members (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for Corporate Directors and Board Members (Paperback)
David Willson, Henry Dalziel
R1,186 Discovery Miles 11 860 Ships in 10 - 15 working days

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.

Deploying Secure Containers for Training and Development (Paperback): Jon Schipp, Henry Dalziel Deploying Secure Containers for Training and Development (Paperback)
Jon Schipp, Henry Dalziel
R807 Discovery Miles 8 070 Ships in 9 - 15 working days

In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.

Infosec Management Fundamentals (Paperback): Henry Dalziel Infosec Management Fundamentals (Paperback)
Henry Dalziel
R1,176 Discovery Miles 11 760 Ships in 10 - 15 working days

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security and how it impacts their business decisions and daily activities.

Cyber Security Awareness for CEOs and Management (Paperback): David Willson, Henry Dalziel Cyber Security Awareness for CEOs and Management (Paperback)
David Willson, Henry Dalziel
R1,174 Discovery Miles 11 740 Ships in 10 - 15 working days

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company's reputation, as well as discuss your ethical, fiduciary and legal obligations.

Next Generation Red Teaming (Paperback): Henry Dalziel Next Generation Red Teaming (Paperback)
Henry Dalziel
R1,171 Discovery Miles 11 710 Ships in 10 - 15 working days

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization's security posture is. This course is particularly suited to CISO's and CTO's that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.

Securing Social Media in the Enterprise (Paperback): Henry Dalziel Securing Social Media in the Enterprise (Paperback)
Henry Dalziel
R1,172 Discovery Miles 11 720 Ships in 10 - 15 working days

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professionals and network systems administrators a much-needed dive into the most current threats, detection techniques, and defenses for these attacks, and provides a roadmap for best practices to secure and manage social media within the enterprise.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Casals 22 Piece Steel Hand Tool Set…
 (1)
R399 Discovery Miles 3 990
Loot
Nadine Gordimer Paperback  (2)
R205 R164 Discovery Miles 1 640
Poop Scoopa
R369 Discovery Miles 3 690
Microsoft Xbox Series Wireless…
R1,699 R1,589 Discovery Miles 15 890
Alcolin Cold Glue (500ml)
R128 R99 Discovery Miles 990
Ultimate Cookies & Cupcakes For Kids
Hinkler Pty Ltd Kit R299 R234 Discovery Miles 2 340
Peptine Pro Equine Hydrolysed Collagen…
R699 R499 Discovery Miles 4 990
Marc Anthony Strictly Curls Curl Envy…
R210 Discovery Miles 2 100
Tenet
John David Washington, Robert Pattinson, … DVD  (1)
R51 Discovery Miles 510
Spectra S1 Double Rechargeable Breast…
 (46)
R3,799 Discovery Miles 37 990

 

Partners