0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R100 - R250 (1)
  • R500 - R1,000 (2)
  • R1,000 - R2,500 (4)
  • -
Status
Brand

Showing 1 - 7 of 7 matches in All Departments

Stealing the Network - How to Own a Continent (Loose-leaf): Ryan Russell, Joe Grand, Tom Craig Stealing the Network - How to Own a Continent (Loose-leaf)
Ryan Russell, Joe Grand, Tom Craig
R1,134 R860 Discovery Miles 8 600 Save R274 (24%) Ships in 12 - 17 working days

This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box"
* A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring
* An informative and scary insight into the boundries of hacking and cyber-terrorism
* Written by a team of the most accomplished cyber-security specialists in the world

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD (Hardcover, Collector's ed.):... Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD (Hardcover, Collector's ed.)
Johnny Long, Ryan Russell, Timothy Mullen
R1,971 R1,412 Discovery Miles 14 120 Save R559 (28%) Ships in 12 - 17 working days

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real."
--Jeff Moss, Founder and CEO of Black Hat
The "Stealing the Network Series" has developed a passionate, cult following which includes more than 30,000 readers. Over 3,000 readers have registered their copies of Stealing on the Syngress Web site. The Stealing book signings at the Black Hat Briefings in Las Vegas have become an annual event, attracting hundreds of readers, who want to meet the authors who serve as the heroes and villains of the series. These are true fans. They want the inside scoop. They want their picture taken with the legend, Kevin Mitnick. They want to know if the elaborate hacks in the stories are actually based on real-life, close-encounters. They want to know it all?.Did Jay Beale base his character on the movie "Real Genius"?.....Does FX ever smile?...How tall is Thor?...Is ?Blah? really Roelof Temmingh? Did the guys from Sensepost really receive death threats in South Africa for ?revealing too much?. But maybe most importantly?..they want to know: How does the story end?
"Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD" answers all these questions and more. Not only will longtime fans of the series find out how the story ends in the much anticipated "Final Chapter" (The "Final Chapter" will also be available separately as an E-Only product six months after publication of the Collector's Edition). They will get much more than this. The collector's edition also contains author-annotated versions of the entire series: How to Own the Box, How to Own a Continent, How to Own and Identity, and How to Own a Shadow. For the first time, the authors will reveal which of the stories and characters are actually based on fact. The authors will share e-mails they exchanged during the writing of the books....and even a few flames directed at one another! Fans of the series have always been attracted to the "rock stars" of the hacking underground who have contributed to the series over the years including: Dan Kaminsky (Effugas), Fyodor, Tim Mullen (Thor), Johnny Long, Ryan Russell (Blue Boar), Jay Beale, Joe Grand (Kingpin), Jeff Moss, and Kevin Mitnick...just to name a few. Friends and foes alike of the authors scour the internet for information on the authors, and some some have even successfully hacked into their computers and e-mail to find out more about them. Now...they can find out everything they ever wanted to know without risking federal prosecution in "Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD,"
In addition to "The Final Chapter" and the "Annotated Complete Series," the fanatics will also receive a DVD containing extended, personal interviews with the primary authors and editors of the series. The DVD also contains digital photographs from exclusive and secretive author dinners and meetings at Black Hat and Defcon.
Long time fans of the series as well as a new generation of hackers will be drawn to this unique collector's edition either for themselves or as a gift for their favorite hacker.
* Annotated by the original authors, readers find out for the first time which hacks and characters are real.
* The DVD contains exclusive, personal interviews with the rock star authors shot atBlack Hat and Defcon.
* Readers will finally learn the fate of "Knuth" in the much anticipated Final Chapter.

The Yards Between Us - A Memoir of Life, Love, and Football (Hardcover): Ryan Russell The Yards Between Us - A Memoir of Life, Love, and Football (Hardcover)
Ryan Russell
R768 R623 Discovery Miles 6 230 Save R145 (19%) Ships in 9 - 15 working days
70 Lessons learned from my father (Paperback): Russell Ryan, Russell Roger 70 Lessons learned from my father (Paperback)
Russell Ryan, Russell Roger
R273 R229 Discovery Miles 2 290 Save R44 (16%) Ships in 10 - 15 working days
Mastering Puppet 5 - Optimize enterprise-grade environment performance with Puppet (Paperback): Ryan Russell-Yates, Jason... Mastering Puppet 5 - Optimize enterprise-grade environment performance with Puppet (Paperback)
Ryan Russell-Yates, Jason Southgate
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

Leverage Puppet 5 for medium to large scale enterprise deployment. Key Features Use and deploy Puppet 5, irrespective the size of your organization Scaling, performance improvements, and managing multiple developer requests Troubleshooting techniques, tips and tricks to make the most of Puppet 5 Book DescriptionPuppet is a configuration management system and a language written for and by system administrators to manage a large number of systems efficiently and prevent configuration drift. The core topics this book addresses are Puppet's latest features and mastering Puppet Enterprise. You will begin by writing a new Puppet module, gaining an understanding of the guidelines and style of the Puppet community. Following on from this, you will take advantage of the roles and profiles pattern, and you will learn how to structure your code. Next, you will learn how to extend Puppet and write custom facts, functions, types, and providers in Ruby, and also use the new features of Hiera 5. You will also learn how to configure the new Code Manager component, and how to ensure code is automatically deployed to (multiple) Puppet servers. Next, you will learn how to integrate Puppet with Jenkins and Git to build an effective workflow for multiple teams, and use the new Puppet Tasks feature and the latest Puppet Orchestrator language extensions. Finally, you will learn how to scale and troubleshoot Puppet. By the end of the book, you will be able to deal with problems of scale and exceptions in your code, automate workflows, and support multiple developers working simultaneously. What you will learn Solve problems using modules and the roles and profiles pattern Extend Puppet with custom facts, functions, types, and providers Use Hiera 5 and Code Manager/r10k to separate code from data Continuously integrate your code using Jenkins, Git and automated testing Use exported resources and the new Puppet Orchestration features Explore Puppet Discovery features and their use Troubleshoot various parts of the Puppet Enterprise infrastructure Scale up and scale out Puppet infrastructure using various techniques Who this book is forIf you are a system administrator or developer who has used Puppet in production and are looking for ways to easily use Puppet in an enterprise environment, this book is for you. Some knowledge of writing simple configuration management modules would be necessary.

Stealing the Network - How to Own a Shadow (Paperback): Johnny Long, Timothy Mullen, Ryan Russell Stealing the Network - How to Own a Shadow (Paperback)
Johnny Long, Timothy Mullen, Ryan Russell
R1,641 Discovery Miles 16 410 Ships in 10 - 15 working days

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
. The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles
. The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth
. Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries"

Stealing the Network - How to Own an Identity (Paperback, Parental Adviso): Ryan Russell, Riley Eller, Jay Beale, Chris Hurley,... Stealing the Network - How to Own an Identity (Paperback, Parental Adviso)
Ryan Russell, Riley Eller, Jay Beale, Chris Hurley, Tom Parker, …
R1,398 Discovery Miles 13 980 Ships in 10 - 15 working days

The first two books in this series "Stealing the Network: How to Own the Box" and "Stealing the Network: How to Own a Continent" have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.
In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Cast upon a backdrop of "Evasion," surviving characters from "How to Own a Continent" find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
* The first two books in the series were best-sellers and have established a cult following within the Hacker and Infosec communities
* Identity theft is the fastest growing crime in the world, and financial loss from identity theft is expected to reach $2 trillion by the end of 2005
* All of the authors on thebook are world renowned, highly visible information security experts who present at all of the top security conferences including Black Hat, DefCon, and RSA and write for the most popular magazines and Web sites including Information Security Magazine, and SecurityFocus.com. All of these outlets will be used to promote the book

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Swiss Indigo Hepa Vacuum Filter
R169 Discovery Miles 1 690
Ergo Mouse Pad Wrist Rest Support
R399 R349 Discovery Miles 3 490
The Northman
Alexander Skarsgard, Nicole Kidman, … Blu-ray disc  (1)
R210 Discovery Miles 2 100
Red Elephant Horizon Backpack…
R486 Discovery Miles 4 860
Elecstor 18W In-Line UPS (Black)
R999 R404 Discovery Miles 4 040
Generic Pantum PC210 Compatible Toner…
R610 R200 Discovery Miles 2 000
The Papery A5 WOW 2025 Diary - Giraffe…
R349 R300 Discovery Miles 3 000
Hubert De Montandon Sometimes In The…
R745 R395 Discovery Miles 3 950
He Has Made Everything Beautiful Small…
Paperback R35 R29 Discovery Miles 290
Blood Brothers - To Battleground…
Deon Lamprecht Paperback  (1)
R290 R195 Discovery Miles 1 950

 

Partners