0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R500 - R1,000 (1)
  • R1,000 - R2,500 (6)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback): Johnny Long No Tech Hacking - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing (Paperback)
Johnny Long; Series edited by Kevin D. Mitnick
R994 R833 Discovery Miles 8 330 Save R161 (16%) Ships in 10 - 15 working days

As the cliche reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.
As you browse this book, you'll hear old familiar terms like "dumpster diving," "social engineering," and "shoulder surfing." Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big boldletters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal "war stories" from the trenches of Information Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,278 Discovery Miles 12 780 Ships in 10 - 15 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,013 Discovery Miles 10 130 Ships in 10 - 15 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

Google Hacking for Penetration Testers (Paperback, 3rd edition): Johnny Long, Bill Gardner, Justin Brown Google Hacking for Penetration Testers (Paperback, 3rd edition)
Johnny Long, Bill Gardner, Justin Brown
R1,273 Discovery Miles 12 730 Ships in 10 - 15 working days

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations. You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance. This third edition includes completely updated content throughout and all new hacks such as Google scripting and using Google hacking with other search engines and APIs. Noted author Johnny Long, founder of Hackers for Charity, gives you all the tools you need to conduct the ultimate open source reconnaissance and penetration testing.

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD (Hardcover, Collector's ed.):... Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD (Hardcover, Collector's ed.)
Johnny Long, Ryan Russell, Timothy Mullen
R1,890 R1,435 Discovery Miles 14 350 Save R455 (24%) Ships in 10 - 15 working days

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real."
--Jeff Moss, Founder and CEO of Black Hat
The "Stealing the Network Series" has developed a passionate, cult following which includes more than 30,000 readers. Over 3,000 readers have registered their copies of Stealing on the Syngress Web site. The Stealing book signings at the Black Hat Briefings in Las Vegas have become an annual event, attracting hundreds of readers, who want to meet the authors who serve as the heroes and villains of the series. These are true fans. They want the inside scoop. They want their picture taken with the legend, Kevin Mitnick. They want to know if the elaborate hacks in the stories are actually based on real-life, close-encounters. They want to know it all?.Did Jay Beale base his character on the movie "Real Genius"?.....Does FX ever smile?...How tall is Thor?...Is ?Blah? really Roelof Temmingh? Did the guys from Sensepost really receive death threats in South Africa for ?revealing too much?. But maybe most importantly?..they want to know: How does the story end?
"Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD" answers all these questions and more. Not only will longtime fans of the series find out how the story ends in the much anticipated "Final Chapter" (The "Final Chapter" will also be available separately as an E-Only product six months after publication of the Collector's Edition). They will get much more than this. The collector's edition also contains author-annotated versions of the entire series: How to Own the Box, How to Own a Continent, How to Own and Identity, and How to Own a Shadow. For the first time, the authors will reveal which of the stories and characters are actually based on fact. The authors will share e-mails they exchanged during the writing of the books....and even a few flames directed at one another! Fans of the series have always been attracted to the "rock stars" of the hacking underground who have contributed to the series over the years including: Dan Kaminsky (Effugas), Fyodor, Tim Mullen (Thor), Johnny Long, Ryan Russell (Blue Boar), Jay Beale, Joe Grand (Kingpin), Jeff Moss, and Kevin Mitnick...just to name a few. Friends and foes alike of the authors scour the internet for information on the authors, and some some have even successfully hacked into their computers and e-mail to find out more about them. Now...they can find out everything they ever wanted to know without risking federal prosecution in "Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD,"
In addition to "The Final Chapter" and the "Annotated Complete Series," the fanatics will also receive a DVD containing extended, personal interviews with the primary authors and editors of the series. The DVD also contains digital photographs from exclusive and secretive author dinners and meetings at Black Hat and Defcon.
Long time fans of the series as well as a new generation of hackers will be drawn to this unique collector's edition either for themselves or as a gift for their favorite hacker.
* Annotated by the original authors, readers find out for the first time which hacks and characters are real.
* The DVD contains exclusive, personal interviews with the rock star authors shot atBlack Hat and Defcon.
* Readers will finally learn the fate of "Knuth" in the much anticipated Final Chapter.

Google Talking (Paperback): Joshua Brashars, Johnny Long Google Talking (Paperback)
Joshua Brashars, Johnny Long
R1,135 Discovery Miles 11 350 Ships in 18 - 22 working days

Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there are 250 million people across the globe--and nearly 80 million Americans--who regularly use instant messaging as a quick and convenient communications tool.
Google Talking takes communication to the next level, combining the awesome power of Text and Voice This book teaches readers how to blow the lid off of Instant Messaging and Phone calls over the Internet.
This book will cover the program Google Talk in its entirety. From detailed information about each of its features, to a deep-down analysis of how it works. Also, we will cover real techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.
* Google has 41% of the search engine market making it by far the most commonly used search engine
* The Instant Messaging market has 250 million users world wide
* Google Talking will be the first book to hit the streets about Google Talk"

Stealing the Network - How to Own a Shadow (Paperback): Johnny Long, Timothy Mullen, Ryan Russell Stealing the Network - How to Own a Shadow (Paperback)
Johnny Long, Timothy Mullen, Ryan Russell
R1,570 Discovery Miles 15 700 Ships in 18 - 22 working days

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles
. The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth
. Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
A Guide to Practical Procurement
Maureen Sullivan Hardcover R2,442 Discovery Miles 24 420
Consumer credit regulation in South…
M. Kelly-Louw, J. Stoop Paperback R1,676 R1,421 Discovery Miles 14 210
Corporate Internal Affairs - A Corporate…
Marc I. Steinberg Hardcover R2,810 R2,544 Discovery Miles 25 440
Scots Commercial Law
Ross G. Anderson Paperback R1,064 Discovery Miles 10 640
Legal accounting
S. Kalideen, L. Sullivan Paperback  (2)
R586 R549 Discovery Miles 5 490
Competition Case Law Digest, 5th Edition…
Frederic Jenny, Nicolas Charbit Hardcover R8,199 Discovery Miles 81 990
A Restatement of the English Law of…
Andrew Burrows Fba Qc (Hon) Hardcover R3,635 Discovery Miles 36 350
Transfer Pricing Developments Around the…
Michael Lang, Raffaele Petruzzi Hardcover R3,977 Discovery Miles 39 770
Legal Priorities in Air Transport
Ruwantissa Abeyratne Hardcover R3,368 Discovery Miles 33 680
The Impact of Corruption on…
Michael Joachim Bonell, Olaf Meyer Hardcover R4,083 Discovery Miles 40 830

 

Partners