0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R250 - R500 (1)
  • R500 - R1,000 (3)
  • R1,000 - R2,500 (3)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback): Robert Bathurst, Russ Rogers, Alijohn... The Hacker's Guide to OS X - Exploiting OS X from the Root Up (Paperback)
Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
R1,038 R803 Discovery Miles 8 030 Save R235 (23%) Ships in 12 - 19 working days

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers

As a resource to the reader, the companion website will provide links from the authors, commentary and updates.

*Provides relevant information including some of the latest OS X threats

*Easily accessible to those without any prior OS X experience

*Useful tips and strategies for exploiting and compromising OS X systems

*Includes discussion of defensive and countermeasure applications and how to use them

*Covers mobile IOS vulnerabilities

Low Tech Hacking - Street Smarts for Security Professionals (Paperback): Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ... Low Tech Hacking - Street Smarts for Security Professionals (Paperback)
Jack Wiles, Terry Gudaitis, Jennifer Jabbusch, Russ Rogers, Sean Lowther
R1,048 R912 Discovery Miles 9 120 Save R136 (13%) Ships in 12 - 19 working days

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world. Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk. This book will be a valuable resource for penetration testers, internal auditors, information systems auditors, CIOs, CISOs, risk managers, fraud investigators, system administrators, private investigators, ethical hackers, black hat hackers, corporate attorneys, and members of local, state, and federal law enforcement.

Nessus Network Auditing (Paperback, 2nd edition): Russ Rogers Nessus Network Auditing (Paperback, 2nd edition)
Russ Rogers
R1,077 Discovery Miles 10 770 Ships in 12 - 19 working days

The Updated Version of the Bestselling Nessus Book.
This is the ONLY Book to Read if You Run Nessus Across the Enterprise
Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a de facto standard by the security industry, vendor, and practitioner alike, many of whom rely on Nessus as the foundation to their security practices. Now, a team of leading developers have created the definitive book for the Nessus community.
* Perform a Vulnerability Assessment
Use Nessus to find programming errors that allow intruders to gain unauthorized access.
* Obtain and Install Nessus
Install from source or binary, set up up clients and user accounts, and update your plug-ins.
* Modify the Preferences Tab
Specify the options for Nmap and other complex, configurable components of Nessus.
* Understand Scanner Logic and Determine Actual Risk
Plan your scanning strategy and learn what variables can be changed.
* Prioritize Vulnerabilities
Prioritize and manage critical vulnerabilities, information leaks, and denial of service errors.
* Deal with False Positives
Learn the different types of false positives and the differences between intrusive and nonintrusive tests.
* Get Under the Hood of Nessus
Understand the architecture and design of Nessus and master the Nessus Attack Scripting Language (NASL).
* Scan the Entire Enterprise Network
Plan for enterprise deployment by gauging network bandwith and topology issues.
* Nessus is the premier Open Source vulnerability assessment tool, and has been voted the "most popular" Open Source security tool several times.
* The first edition is still the only book available on the product.
* Written by the world's premier Nessus developers and featuring a foreword by the creator of Nessus, Renaud Deraison.

OS X for Hackers at Heart (Paperback): Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers OS X for Hackers at Heart (Paperback)
Bruce Potter, Chris Hurley, Johnny Long, Tom Owad, Russ Rogers
R1,072 Discovery Miles 10 720 Ships in 12 - 19 working days

The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker s eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world s foremost true hackers unleash the power of OS X for everything form cutting edge research and development to just plain old fun.
OS X 10.4 Tiger is a major upgrade for Mac OS X for running Apple s Macintosh computers and laptops. This book is not a reference to every feature and menu item for OS X. Rather, it teaches hackers of all types from software developers to security professionals to hobbyists, how to use the most powerful (and often obscure) features of OS X for wireless networking, WarDriving, software development, penetration testing, scripting administrative tasks, and much more.
* Analyst reports indicate that OS X sales will double in 2005. OS X Tiger is currently the #1 selling software product on Amazon and the 12-inch PowerBook is the #1 selling laptop
* Only book on the market directly appealing to groundswell of hackers migrating to OS X
* Each chapter written by hacker most commonly associated with that topic, such as Chris Hurley (Roamer) organizer of the World Wide War Drive"

The 17 Laws of Parenting (Paperback): Russ Rogers The 17 Laws of Parenting (Paperback)
Russ Rogers
R525 Discovery Miles 5 250 Ships in 10 - 15 working days
The 17 Laws of Marriage (Paperback): Russ Rogers The 17 Laws of Marriage (Paperback)
Russ Rogers
R491 Discovery Miles 4 910 Ships in 10 - 15 working days
WarDriving and Wireless Penetration Testing (Paperback): Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker WarDriving and Wireless Penetration Testing (Paperback)
Chris Hurley, Russ Rogers, Frank Thornton, Brian Baker
R1,621 Discovery Miles 16 210 Ships in 10 - 15 working days

Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.
Unlike other wireless networking and security books that have been published in recent years, this book is geared primarily to those individuals that are tasked with performing penetration testing on wireless networks. This book continues in the successful vein of books for penetration testers such as Google Hacking for Penetration Testers and Penetration Tester s Open Source Toolkit. Additionally, the methods discussed will prove invaluable for network administrators tasked with securing wireless networks. By understanding the methods used by penetration testers and attackers in general, these administrators can better define the strategies needed to secure their networks.
* According to a study by the Strategis Group more than one third of the words population will own a wireless device by the end of 2008.
* The authors have performed hundreds of wireless penetration tests, modeling their attack methods after those used by real world attackers.
* Unlike other wireless books, this is geared specifically for those individuals that perform security assessments and penetration tests on wireless networks."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Bifidobacteria - Genomics and Molecular…
Baltasar Mayo, Douwe van Sinderen Hardcover R5,712 Discovery Miles 57 120
Budgeting Practice and Organisational…
David Dugdale, Stephen Lyne Paperback R1,469 Discovery Miles 14 690
Left-Libertarianism and Its Critics…
Peter Vallentyne Hardcover R4,386 Discovery Miles 43 860
Stones from Other Mountains - Chinese…
Jason C. Kuo Hardcover R1,039 Discovery Miles 10 390
The Economic Theory of Socialism and the…
Bruno Jossa, Gaetano Cuomo Hardcover R4,278 Discovery Miles 42 780
Anti-Differentiation and the Calculation…
Johannes Blumlein, Carsten Schneider Hardcover R4,618 Discovery Miles 46 180
A New Lease of Life? - Anglican Clergy…
Tony Neal, Leslie Francis Paperback R549 Discovery Miles 5 490
An Invitation to Analytic Combinatorics…
Stephen Melczer Hardcover R3,919 Discovery Miles 39 190
The Name Book - Over 10,000 Names--Their…
Dorothy Astoria Paperback R375 R343 Discovery Miles 3 430
Checkmate to Murder - A Second World War…
E.C.R. Lorac Paperback R367 R342 Discovery Miles 3 420

 

Partners