0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (5)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Paperback)
James S. Tiller
R1,804 Discovery Miles 18 040 Ships in 12 - 17 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible. The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization. Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

Adaptive Security Management Architecture (Paperback): James S. Tiller Adaptive Security Management Architecture (Paperback)
James S. Tiller
R1,836 Discovery Miles 18 360 Ships in 12 - 17 working days

For an organization to function effectively, its security controls must not be so restrictive that the business is denied the ability to be innovative and flexible. But increasingly pervasive threats mandate vigilance in unlikely areas. Adaptive Security Management Architecture enables security professionals to structure the best program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence. Security aligned with business needs Introducing the concept of Adaptive Security Management Architecture (ASMA), the book explains how an organization can develop an adaptive security program closely aligned to business needs, making it an enabling force that helps the organization achieve its goals and objectives. Describing how to achieve this adaptability, the book cites several examples and concepts to demonstrate aspects of managing change. It presents the end product of a successful security management system and examines the finer points of how it can be accomplished. Risk management and governance The book explores the security and business attributes that must be considered in the development of services and discusses the importance of consistency of management of services. In a section on risk management, the author explains how this important component is directly integrated with the ASMA model. He also discusses the critical element of governance and its importance to demonstrating value and ensuring effective adaptation. Lastly, the book examines how proper organizational management can give the executive and leadership team the necessary oversight to ensure the entire security program meets stated expectations. It also describes the capability maturity model, which ensures that all the co-dependent features of the

Information Security Management Handbook, Volume 7 (Hardcover, 6th edition): Richard O'Hanley, James S. Tiller Information Security Management Handbook, Volume 7 (Hardcover, 6th edition)
Richard O'Hanley, James S. Tiller
R4,324 Discovery Miles 43 240 Ships in 12 - 17 working days

Updated annually, the Information Security Management Handbook, Sixth Edition is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding required to stay one step ahead of evolving threats, standards, and regulations. Reporting on the latest developments in information security and recent changes to the (ISC)2 (R) CISSP Common Body of Knowledge (CBK (R)), Volume 7 features 27 new chapters on topics such as BYOD, IT consumerization, smart grids, security, and privacy. Covers the fundamental knowledge, skills, techniques, and tools required by IT security professionals Updates its bestselling predecessors with new developments in information security and the (ISC)2 (R) CISSP (R) CBK (R) Provides valuable insights from leaders in the field on the theory and practice of computer security technology Facilitates the comprehensive and up-to-date understanding you need to stay fully informed The ubiquitous nature of computers and networks will always provide the opportunity and means to do harm. This edition updates its popular predecessors with the information you need to address the vulnerabilities created by recent innovations such as cloud computing, mobile banking, digital wallets, and near-field communications. This handbook is also available on CD.

The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover): James S. Tiller The Ethical Hack - A Framework for Business Value Penetration Testing (Hardcover)
James S. Tiller
R3,715 Discovery Miles 37 150 Ships in 12 - 17 working days

There are many books that detail tools and techniques of penetration testing, but none of these effectively communicate how the information gathered from tests should be analyzed and implemented. Until recently, there was very little strategic information available to explain the value of ethical hacking and how tests should be performed in order to provide a company with insight beyond a mere listing of security vulnerabilities. Now there is a resource that illustrates how an organization can gain as much value from an ethical hack as possible.

The Ethical Hack: A Framework for Business Value Penetration Testing explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. This book is unique in that it goes beyond the technical aspects of penetration testing to address the processes and rules of engagement required for successful tests. It examines testing from a strategic perspective, shedding light on how testing ramifications affect an entire organization.

Security practitioners can use this resource to reduce their exposure and deliver a focused, valuable service to customers. Organizations will learn how to align the information about tools, techniques, and vulnerabilities that they gathered from testing with their overall business objectives.

A Technical Guide to IPSec Virtual Private Networks (Hardcover): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Hardcover)
James S. Tiller
R4,914 Discovery Miles 49 140 Ships in 12 - 17 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become. A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security. Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies. After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

A Technical Guide to IPSec Virtual Private Networks (Paperback): James S. Tiller A Technical Guide to IPSec Virtual Private Networks (Paperback)
James S. Tiller
R2,957 Discovery Miles 29 570 Ships in 12 - 17 working days

What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
A Technical Guide to IPSec Virtual Private Networks provides a single point of information that represents hundreds or resources and years of experience with IPSec VPN solutions. It cuts through the complexity surrounding IPSec and the idiosyncrasies of design, implementation, operations, and security.
Starting with a primer on the IP protocol suite, the book travels layer by layer through the protocols and the technologies that make VPNs possible. It includes security theory, cryptography, RAS, authentication, IKE, IPSec, encapsulation, keys, and policies.
After explaining the technologies and their interrelationships, the book provides sections on implementation and product evaluation. A Technical Guide to IPSec Virtual Private Networks arms information security, network, and system engineers and administrators with the knowledge and the methodologies to design and deploy VPNs in the real world for real companies.

CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Paperback): James S. Tiller CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Paperback)
James S. Tiller
R1,764 Discovery Miles 17 640 Ships in 12 - 17 working days

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.

CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New): James S. Tiller CISO's Guide to Penetration Testing - A Framework to Plan, Manage, and Maximize Benefits (Hardcover, New)
James S. Tiller
R3,715 Discovery Miles 37 150 Ships in 12 - 17 working days

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview of the common tools and exploits used by attackers along with the rationale for why they are used. From the first meeting to accepting the deliverables and knowing what to do with the results, James Tiller explains what to expect from all phases of the testing life cycle. He describes how to set test expectations and how to identify a good test from a bad one. He introduces the business characteristics of testing, the imposed and inherent limitations, and describes how to deal with those limitations. The book outlines a framework for protecting confidential information and security professionals during testing. It covers social engineering and explains how to tune the plethora of options to best use this investigative tool within your own environment. Ideal for senior security management and anyone else responsible for ensuring a sound security posture, this reference depicts a wide range of possible attack scenarios. It illustrates the complete cycle of attack from the hacker's perspective and presents a comprehensive framework to help you meet the objectives of penetration testing-including deliverables and the final report.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Speak Now - Taylor's Version
Taylor Swift CD R521 Discovery Miles 5 210
Meet The Moonlight
Jack Johnson CD R437 Discovery Miles 4 370
Nuovo All-In-One Car Seat (Black)
R3,599 R3,020 Discovery Miles 30 200
Marketing Analytics - Essential Tools…
Rajkumar Venkatesan, Paul W. Farris, … Hardcover R1,060 R299 Discovery Miles 2 990
ZA Cute Butterfly Earrings and Necklace…
R712 R499 Discovery Miles 4 990
3 Layer Fabric Face Mask (Blue)
R15 Discovery Miles 150
Adata UV320 USB 3.0 Flash Drive…
R165 Discovery Miles 1 650
Pure Pleasure Electric Heating Pad (30 x…
 (2)
R599 R529 Discovery Miles 5 290
Elecstor B22 7W Rechargeable LED Bulb…
R399 R369 Discovery Miles 3 690
Microsoft Xbox Series X Console (1TB…
R14,999 Discovery Miles 149 990

 

Partners