0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 3 of 3 matches in All Departments

Securing IM and P2P Applications for the Enterprise (Paperback): Marcus Sachs, Paul Piccard Securing IM and P2P Applications for the Enterprise (Paperback)
Marcus Sachs, Paul Piccard
R1,363 Discovery Miles 13 630 Ships in 10 - 15 working days

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications.
These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.
* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004
* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time
* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics

Cyber Adversary Characterization - Auditing the Hacker Mind (Paperback): Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz Cyber Adversary Characterization - Auditing the Hacker Mind (Paperback)
Tom Parker, Marcus Sachs, Eric Shaw, Ed Stroz
R1,501 Discovery Miles 15 010 Ships in 10 - 15 working days

The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive or proprietary computer systems. Some of these vulnerabilities are waiting to be exploited, while numerous others already have. Everyday that a vulnerability or threat goes unchecked greatly increases an attack and the damage it can cause. Who knows what the prospects for a cascade of failures across US infrastructures could lead to. What type of group or individual would exploit this vulnerability, and why would they do it? "Inside the Mind of a Criminal Hacker" sets the stage and cast of characters for examples and scenarios such as this, providing the security specialist a window into the enemy s mind - necessary in order to develop a well configured defense. Written by leading security and counter-terrorism experts, whose experience include first-hand exposure in working with government branches & agencies (such as the FBI, US Army, Department of Homeland Security), this book sets a standard for the fight against the cyber-terrorist. Proving, that at the heart of the very best defense is knowing and understanding your enemy.
* This book will demonstrate the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
* This book is essential to those who need to truly "know thy enemy" in order to prepare the best defense.
* . The breadth of material in "Inside the Criminal Mind" will surprise every security specialist and cyber-terrorist buff of how much they do and (more importantly) don't know about the types of adversaries they stand to face."

Zero-Day Exploit: - Countdown to Darkness (Paperback): Rob Shein Zero-Day Exploit: - Countdown to Darkness (Paperback)
Rob Shein; Edited by Marcus Sachs; Foreword by David Litchfield
R1,503 Discovery Miles 15 030 Ships in 10 - 15 working days

The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the "inside" of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.
* The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community.
* This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists.
* Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Xbox One Replacement Case
 (8)
R79 Discovery Miles 790
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Casio LW-200-7AV Watch with 10-Year…
R999 R899 Discovery Miles 8 990
AOC AGON AG275QXR 27" WQHD Gaming…
R11,499 R7,999 Discovery Miles 79 990
Russell Hobbs Toaster (4 Slice) (Matt…
R1,187 Discovery Miles 11 870
Loot
Nadine Gordimer Paperback  (2)
R367 R340 Discovery Miles 3 400
Top Gun: Maverick
Tom Cruise, Miles Teller, … Blu-ray disc R285 R255 Discovery Miles 2 550
Bantex @School Jumbo Triangular Pencils…
R40 Discovery Miles 400
Generic Lafufu Monster Doll Mystery Box…
 (2)
R299 R149 Discovery Miles 1 490
Discovering Daniel - Finding Our Hope In…
Amir Tsarfati, Rick Yohn Paperback R280 R258 Discovery Miles 2 580

 

Partners