0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (6)
  • R1,000 - R2,500 (8)
  • -
Status
Brand

Showing 1 - 15 of 15 matches in All Departments

Surfside 6 - Behind the Scenes in Miami Beach (hardback) (Hardcover): Michael Gregg Michaud Surfside 6 - Behind the Scenes in Miami Beach (hardback) (Hardcover)
Michael Gregg Michaud
R955 Discovery Miles 9 550 Ships in 12 - 17 working days
Mae West - Broadcast Muse (Hardback) (Hardcover): Michaud Michael  Gregg Michaud Mae West - Broadcast Muse (Hardback) (Hardcover)
Michaud Michael Gregg Michaud
R872 Discovery Miles 8 720 Ships in 12 - 17 working days
Sal Mineo - A Biography (Paperback): Michael Gregg Michaud Sal Mineo - A Biography (Paperback)
Michael Gregg Michaud
R476 Discovery Miles 4 760 Ships in 12 - 17 working days

Sal Mineo is probably most well-known for his unforgettable, Academy Award-nominated turn opposite James Dean in "Rebel Without a Cause" and his tragic murder at the age of thirty-seven. Finally, in this riveting new biography filled with exclusive, candid interviews with both Mineo's closest female and male lovers and never-before-published photographs, Michael Gregg Michaud tells the full story of this remarkable young actor's life, charting his meteoric rise to fame and turbulent career and private life.
One of the hottest stars of the 1950s, Mineo grew up as the son of Sicilian immigrants in a humble Bronx flat. But by age eleven, he appeared on Broadway in Tennessee Williams's "The Rose Tattoo, " and then as Prince Chulalongkorn in the original Broadway production of "The King and I" starring Yul Brynner and Gertrude Lawrence. This sultry-eyed, dark-haired male ingenue of sorts appeared on the cover of every major magazine, thousands of star-struck fans attended his premieres, and millions bought his records, which included several top-ten hits.
His life offstage was just as exhilarating: full of sports cars, motor boats, famous friends, and some of the most beautiful young actresses in Hollywood. But it was fourteen-year-old Jill Haworth, his costar in "Exodus"--the film that delivered one of the greatest acting roles of his life and earned him another Academy Award nomination and a Golden Globe win--with whom he fell in love and moved to the West Coast. But by the 1960s, a series of professional missteps and an increasingly tumultuous private life reversed his fortunes.
By the late sixties and early seventies, grappling with the repercussions of publicly admitting his homosexuality and struggling to reinvent himself from an aging teen idol, Mineo turned toward increasingly self-destructive behavior. Yet his creative impulses never foundered. He began directing and producing controversial off-Broadway plays that explored social and sexual taboos. He also found personal happiness in a relationship with male actor Courtney Burr. Tragically, on the cusp of turning a new page in his life, Mineo's life was cut short in a botched robbery.
Revealing a charming, mischievous, creative, and often scandalous side of Mineo few have known before now, "Sal Mineo" is an intimate, moving biography of a distinctive Hollywood star.

"From the Hardcover edition."

Mae West - Between the Covers (hardback) (Hardcover): Michael Gregg Michaud Mae West - Between the Covers (hardback) (Hardcover)
Michael Gregg Michaud
R1,092 Discovery Miles 10 920 Ships in 12 - 17 working days
Marlene Dietrich - Between the Covers (hardback) (Hardcover): Michael Gregg Michaud Marlene Dietrich - Between the Covers (hardback) (Hardcover)
Michael Gregg Michaud
R1,045 Discovery Miles 10 450 Ships in 12 - 17 working days
Field Epidemiology (Hardcover, 3rd Revised edition): Michael Gregg Field Epidemiology (Hardcover, 3rd Revised edition)
Michael Gregg
R3,478 R2,174 Discovery Miles 21 740 Save R1,304 (37%) Ships in 12 - 17 working days

The new edition of this classic text continues its mission of describing the application of basic epidemiologic principles in real time, place, and person to solve problems of an urgent or emergency nature. Based on decades of experience in both infectious and noninfectious diseases at the Centers for Disease Control and Prevention, this book describes in clear and practical terms the distinct approach, tasks, and actions needed for successful field investigations. Guidance is given on such issues as how to perform surveillance, manage and execute field investigatins, collect and analyze data, perform surveys, adapt a personal computer for field use, and communicate the findings. Specific advice is also given on such subjects as dealing with the media; investigations in health care, day care, and international settings; and the legal aspects of field studies. An entire chapter covers the proper collection, handling, and testing of infectious and noninfectious agents in the field. This edition contains new chapters on environmental investigations and immunization practices for the field epidemiologist. The boko is based both on science and experience. It deals with real problems, real places, and real people: nature's experiment rather than carefully designed studies in a laboratory or clinical setting. So, in the lexicon of the epidemiologist, the book addresses issues relating to observational- not experimental- epidemiology.

CEH Certified Ethical Hacker Cert Guide (Hardcover, 4th edition): Michael Gregg, Omar Santos CEH Certified Ethical Hacker Cert Guide (Hardcover, 4th edition)
Michael Gregg, Omar Santos
R1,387 Discovery Miles 13 870 Ships in 9 - 15 working days

In this best-of-breed study guide, leading experts Michael Gregg and Omar Santos help you master all the topics you need to know to succeed on your Certified Ethical Hacker exam and advance your career in IT security. The authors' concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. Every feature of this book supports both efficient exam preparation and long-term mastery: * Opening topics lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives * Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success * Exam Preparation Tasks enable you to review key topics, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career * Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including * Ethical hacking basics * Technical foundations of hacking * Footprinting and scanning * Enumeration and system hacking * Social engineering, malware threats, and vulnerability analysis * Sniffers, session hijacking, and denial of service * Web server hacking, web applications, and database attacks * Wireless technologies, mobile security, and mobile attacks * IDS, firewalls, and honeypots * Cryptographic attacks and defenses * Cloud computing, IoT, and botnets

InfoSecurity 2008 Threat Analysis (Paperback): Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg InfoSecurity 2008 Threat Analysis (Paperback)
Craig Schiller, Seth Fogie, Colby DeRodeff, Michael Gregg; Contributions by Paul Schooping
R1,215 R1,147 Discovery Miles 11 470 Save R68 (6%) Ships in 12 - 17 working days

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely new threats to their enterprise
* Includes real-world examples of system intrusions and compromised data
* Provides techniques and strategies to detect, prevent, and recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence

Certified Ethical Hacker (CEH) Version 9 Cert Guide (Hardcover, 2nd edition): Michael Gregg Certified Ethical Hacker (CEH) Version 9 Cert Guide (Hardcover, 2nd edition)
Michael Gregg
bundle available
R1,675 Discovery Miles 16 750 Ships in 9 - 15 working days

In this best-of-breed study guide, leading expert Michael Gregg helps you master all the topics you need to know to succeed on your Certified Ethical Hacker Version 9 exam and advance your career in IT security. Michael's concise, focused approach explains every exam objective from a real-world perspective, helping you quickly identify weaknesses and retain everything you need to know. * Every feature of this book supports both efficient exam preparation and long-term mastery: * Opening Topics Lists identify the topics you need to learn in each chapter and list EC-Council's official exam objectives * Key Topics figures, tables, and lists call attention to the information that's most crucial for exam success * Exam Preparation Tasks enable you to review key topics, complete memory tables, define key terms, work through scenarios, and answer review questions...going beyond mere facts to master the concepts that are crucial to passing the exam and enhancing your career * Key Terms are listed in each chapter and defined in a complete glossary, explaining all the field's essential terminology This study guide helps you master all the topics on the latest CEH exam, including * Ethical hacking basics * Technical foundations of hacking * Footprinting and scanning * Enumeration and system hacking * Linux distro's, such as Kali and automated assessment tools * Trojans and backdoors * Sniffers, session hijacking, and denial of service * Web server hacking, web applications, and database attacks * Wireless technologies, mobile security, and mobile attacks * IDS, firewalls, and honeypots * Buffer overflows, viruses, and worms * Cryptographic attacks and defenses * Cloud security and social engineering

Surfside 6 - Behind the Scenes in Miami Beach (Paperback): Michael Gregg Michaud Surfside 6 - Behind the Scenes in Miami Beach (Paperback)
Michael Gregg Michaud
R809 Discovery Miles 8 090 Ships in 10 - 15 working days
Marlene Dietrich - Between the Covers (Paperback): Michael Gregg Michaud Marlene Dietrich - Between the Covers (Paperback)
Michael Gregg Michaud
R878 Discovery Miles 8 780 Ships in 10 - 15 working days
Mae West - Broadcast Muse (Paperback): Michaud Michael  Gregg Michaud Mae West - Broadcast Muse (Paperback)
Michaud Michael Gregg Michaud
R666 Discovery Miles 6 660 Ships in 10 - 15 working days
Mae West - Between the Covers (Paperback): Michael Gregg Michaud Mae West - Between the Covers (Paperback)
Michael Gregg Michaud
R905 Discovery Miles 9 050 Ships in 10 - 15 working days
How to Cheat at Configuring Open Source Security Tools (Paperback): Michael Gregg, Eric S. Seagren, Angela Orebaugh, Matt... How to Cheat at Configuring Open Source Security Tools (Paperback)
Michael Gregg, Eric S. Seagren, Angela Orebaugh, Matt Jonkman, Raffael Marty
R1,702 Discovery Miles 17 020 Ships in 10 - 15 working days

The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit your systems using products like Snort and Wireshark and some of the add-ons available for both. In addition, learn handy techniques for network troubleshooting and protecting the perimeter.
* Take Inventory
See how taking an inventory of the devices on your network must be repeated regularly to ensure that the inventory remains accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can turn a PC into a dedicated firewall appliance that is completely configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to know if they re being exceeded and watch for unauthorized traffic on your network.
*Covers the top 10 most popular open source security tools including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers with everything they need and nothing they don't"

Hack the Stack - Using Snort and Ethereal to Master The 8 Layers of An Insecure Network (Paperback): Michael Gregg, Stephen... Hack the Stack - Using Snort and Ethereal to Master The 8 Layers of An Insecure Network (Paperback)
Michael Gregg, Stephen Watkins, George Mays, Chris Ries, Ronald M. Bandes, …
R1,656 Discovery Miles 16 560 Ships in 10 - 15 working days

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer: The people layer.
This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker s exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur.
What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
* Remember being a child and wanting to take something apart, like a phone, to see how it worked? This book is for you then as it details how specific hacker tools and techniques accomplish the things they do.
* This book will not only give you knowledge of security tools but will provide you the ability to design more robust security solutions
* Anyone can tell you what a tool does but this book shows you how the tool works"

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Coolaroo Elevated Pet Bed (L)(Brunswick…
R990 Discovery Miles 9 900
Bennett Read Steam Iron (2200W)
R592 Discovery Miles 5 920
Maze Runner: Chapter II - The Scorch…
Thomas Brodie-Sangster, Nathalie Emmanuel, … Blu-ray disc R52 R32 Discovery Miles 320
Bantex B9875 A5 Record Card File Box…
 (1)
R125 R112 Discovery Miles 1 120
Lucky Lubricating Clipper Oil (100ml)
R79 Discovery Miles 790
Afrikaans Plus - Everything You Need To…
Marieta Nel Paperback R380 R199 Discovery Miles 1 990
Dala Craft Pom Poms - Assorted Colours…
R34 Discovery Miles 340
Joggers Belt
 (1)
R59 R48 Discovery Miles 480
Casio LW-200-7AV Watch with 10-Year…
R999 R884 Discovery Miles 8 840
Sharpe: Classic Collection
Sean Bean, Daragh O'Malley, … DVD  (2)
R519 R491 Discovery Miles 4 910

 

Partners