0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback): John Pirc, David DeSanto, Iain Davison, Will... Threat Forecasting - Leveraging Big Data for Predictive Analysis (Paperback)
John Pirc, David DeSanto, Iain Davison, Will Gragido
R1,019 R947 Discovery Miles 9 470 Save R72 (7%) Ships in 12 - 17 working days

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security intelligence as a tool to develop threat forecasting techniques, and how to use threat data visualization techniques and threat simulation tools. Readers will gain valuable security insights into unstructured big data, along with tactics on how to use the data to their advantage to reduce risk.

Blackhatonomics - An Inside Look at the Economics of Cybercrime (Paperback, New): Will Gragido, Daniel Molina, John Pirc, Nick... Blackhatonomics - An Inside Look at the Economics of Cybercrime (Paperback, New)
Will Gragido, Daniel Molina, John Pirc, Nick Selby
R828 Discovery Miles 8 280 Ships in 12 - 17 working days

"Blackhatonomics "explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, "Blackhatonomics" takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.


Historical perspectives of the development of malware as it evolved into a viable economic endeavour
Country specific cyber-crime analysis of the United States, China, and Russia, as well as an analysis of the impact of Globalization on cyber-crime.
Presents the behind the scenes methods used to successfully execute financially motivated attacks in a globalized cybercrime economy.
Provides unique insights, analysis, and useful tools for justifying corporate information security budgets.
Provides multiple points of view, from pure research, to corporate, to academic, to law enforcement.
Includes real world cybercrime case studies and profiles of high-profile cybercriminals.

Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback): Will Gragido, John Pirc Cybercrime and Espionage - An Analysis of Subversive Multi-Vector Threats (Paperback)
Will Gragido, John Pirc
R1,253 R911 Discovery Miles 9 110 Save R342 (27%) Ships in 12 - 17 working days

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, SMTs are real and growing at an alarming pace. This book contains a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. It will educate readers on the realities of advanced, next generation threats, which take form in a variety ways. This book consists of 12 chapters covering a variety of topics such as the maturity of communications systems and the emergence of advanced web technology; how regulatory compliance has worsened the state of information security; the convergence of physical and logical security; asymmetric forms of gathering information; seven commonalities of SMTs; examples of compromise and presence of SMTs; next generation techniques and tools for avoidance and obfuscation; and next generation techniques and tools for detection, identification and analysis. This book will appeal to information and physical security professionals as well as those in the intelligence community and federal and municipal law enforcement, auditors, forensic analysts, and CIO/CSO/CISO.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Xbox One Replacement Case
 (8)
R53 Discovery Miles 530
The Fabelmans
Steven Spielberg DVD R133 Discovery Miles 1 330
Zap! Air Dry Pottery Kit
Kit R250 R195 Discovery Miles 1 950
Huntlea Original Memory Foam Mattress…
R999 R539 Discovery Miles 5 390
Anamino Beef Protein (250g)
R289 R189 Discovery Miles 1 890
OMC! Totally Wick-ed! Candle Kit
Hinkler Pty Ltd Kit R250 R195 Discovery Miles 1 950
Huntlea Koletto - Matlow Pet Bed…
R969 R562 Discovery Miles 5 620
Vitatech Weight Loss Support (30…
R79 Discovery Miles 790
Ambulance
Jake Gyllenhaal, Yahya Abdul-Mateen II, … DVD  (1)
R93 Discovery Miles 930
Baby Dove Soap Bar Rich Moisture 75g
R20 Discovery Miles 200

 

Partners