0
Your cart

Your cart is empty

Browse All departments
Price
  • R100 - R250 (13)
  • R250 - R500 (51)
  • R500+ (223)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Computer fraud & hacking

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn
R343 R278 Discovery Miles 2 780 Save R65 (19%) In stock

The shocking untold story of the elite secret society of hackers fighting to protect our privacy, our freedom, and even democracy itself. Cult of the Dead Cow is the tale of the oldest, most respected, and most famous American hacking group of all time. Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns. Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.

Deep Fakes and the Infocalypse - What You Urgently Need To Know (Paperback): Nina Schick Deep Fakes and the Infocalypse - What You Urgently Need To Know (Paperback)
Nina Schick 1
R215 R172 Discovery Miles 1 720 Save R43 (20%) Ships in 5 - 10 working days

It will soon be impossible to tell what is real and what is fake.

Recent advances in AI mean that by scanning images of a person (for example using Facebook), a powerful machine learning system can create new video images and place them in scenarios and situations which never actually happened. When combined with powerful voice AI, the results are utterly convincing.

So-called 'Deep Fakes' are not only a real threat for democracy but they take the manipulation of voters to new levels. They will also affect ordinary people. This crisis of misinformation we are facing has been dubbed the 'Infocalypse'.

Using her expertise from working in the field, Nina Schick reveals shocking examples of Deep Fakery and explains the dangerous political consequences of the Infocalypse, both in terms of national security and what it means for public trust in politics. She also unveils what it means for us as individuals, how Deep Fakes will be used to intimidate and to silence, for revenge and fraud, and how unprepared governments and tech companies are.

As a political advisor to select technology firms, Schick tells us what we need to do to prepare and protect ourselves. Too often we build the cool technology and ignore what bad guys can do with it before we start playing catch-up. But when it comes to Deep Fakes, we urgently need to be on the front foot.

Hacking Point of Sale - Payment Application Secrets, Threats, and Solutions (Paperback): Slava Gomzin Hacking Point of Sale - Payment Application Secrets, Threats, and Solutions (Paperback)
Slava Gomzin
R1,211 R1,112 Discovery Miles 11 120 Save R99 (8%) Ships in 10 - 15 working days

Must-have guide for professionals responsible for securing credit and debit card transactions

As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. "Hacking Point of Sale" is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more - it's packed with practical recommendations. This terrific resource goes beyond standard PCI compliance guides to offer real solutions on how to achieve better security at the point of sale.A unique book on credit and debit card security, with an emphasis on point-to-point encryption of payment transactions (P2PE) from standards to design to applicationExplores all groups of security standards applicable to payment applications, including PCI, FIPS, ANSI, EMV, and ISOExplains how protected areas are hacked and how hackers spot vulnerabilitiesProposes defensive maneuvers, such as introducing cryptography to payment applications and better securing application code

"Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions" is essential reading for security providers, software architects, consultants, and other professionals charged with addressing this serious problem.

Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed): Michele Slatalla Masters of Deception: the Gang That Ruled Cyberspace (Paperback, 1st HarperPerennial ed)
Michele Slatalla
R340 R317 Discovery Miles 3 170 Save R23 (7%) Ships in 7 - 11 working days

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Crime Dot Com - From Viruses to Vote Rigging, How Hacking Went Global (Hardcover): Geoff White Crime Dot Com - From Viruses to Vote Rigging, How Hacking Went Global (Hardcover)
Geoff White
R517 R464 Discovery Miles 4 640 Save R53 (10%) Ships in 10 - 15 working days

On 4 May 2000, an email that read 'kindly check the attached LOVELETTER' was sent from Philippines. Attached was a virus, the Love Bug, and within days it had paralysed banks, broadcasters and businesses across the globe. The age of Crime Dot Com had begun. Geoff White charts the astonishing development of hacking, from its birth among the ruins of the Eastern Bloc to its coming of age as the most pervasive threat to our connected world. He takes us inside the workings of real-life cybercrimes, revealing how the tactics of high-tech crooks are now being harnessed by nation states. From Ashley Madison to the 2016 US Presidential Election, Crime Dot Com is a thrilling account of hacking, past and present, and how we might protect ourselves from it.

Hands on Hacking (Paperback): Matthew Hickey, Jennifer Arcuri Hands on Hacking (Paperback)
Matthew Hickey, Jennifer Arcuri
R848 R671 Discovery Miles 6 710 Save R177 (21%) Ships in 7 - 11 working days

A fast, hands-on introduction to offensive hacking techniques Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world risks to computer networks and data. Readers will benefit from the author's years of experience in the field hacking into computer networks and ultimately training others in the art of cyber-attacks. This book holds no punches and explains the tools, tactics and procedures used by ethical hackers and criminal crackers alike. We will take you on a journey through a hacker's perspective when focused on the computer infrastructure of a target company, exploring how to access the servers and data. Once the information gathering stage is complete, you'll look for flaws and their known exploits--including tools developed by real-world government financed state-actors. - An introduction to the same hacking techniques that malicious hackers will use against an organization - Written by infosec experts with proven history of publishing vulnerabilities and highlighting security flaws - Based on the tried and tested material used to train hackers all over the world in the art of breaching networks - Covers the fundamental basics of how computer networks are inherently vulnerable to attack, teaching the student how to apply hacking skills to uncover vulnerabilities We cover topics of breaching a company from the external network perimeter, hacking internal enterprise systems and web application vulnerabilities. Delving into the basics of exploitation with real-world practical examples, you won't find any hypothetical academic only attacks here. From start to finish this book will take the student through the steps necessary to breach an organization to improve its security. Written by world-renowned cybersecurity experts and educators, Hands-On Hacking teaches entry-level professionals seeking to learn ethical hacking techniques. If you are looking to understand penetration testing and ethical hacking, this book takes you from basic methods to advanced techniques in a structured learning format.

Hacking For Dummies (Paperback, 6th Edition): Kevin Beaver Hacking For Dummies (Paperback, 6th Edition)
Kevin Beaver
R696 R426 Discovery Miles 4 260 Save R270 (39%) Ships in 10 - 15 working days

Stop hackers before they hack you! In order to outsmart a would-be hacker, you need to get into the hacker's mindset. And with this book, thinking like a bad guy has never been easier. In Hacking For Dummies, expert author Kevin Beaver shares his knowledge on penetration testing, vulnerability assessments, security best practices, and every aspect of ethical hacking that is essential in order to stop a hacker in their tracks. Whether you're worried about your laptop, smartphone, or desktop computer being compromised, this no-nonsense book helps you learn how to recognize the vulnerabilities in your systems so you can safeguard them more diligently--with confidence and ease. Get up to speed on Windows 10 hacks Learn about the latest mobile computing hacks Get free testing tools Find out about new system updates and improvements There's no such thing as being too safe--and this resourceful guide helps ensure you're protected.

The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback): Peter Kim The Hacker Playbook 3 - Practical Guide to Penetration Testing (Paperback)
Peter Kim
R588 Discovery Miles 5 880 Ships in 7 - 11 working days
Terrorism and Counterterrorism (Paperback, 6th New edition): Brigitte L. Nacos Terrorism and Counterterrorism (Paperback, 6th New edition)
Brigitte L. Nacos
R1,706 Discovery Miles 17 060 Ships in 10 - 15 working days

Focusing on the phenomenon of terrorism in the age of ISIS/ISIL, Terrorism and Counterterrorism investigates this form of political violence in an international and American context and in light of new and historical trends. In this comprehensive and highly readable text, renowned expert Brigitte Nacos clearly defines terrorism's diverse causes, actors, and strategies; outlines anti- and counterterrorist responses; and highlights terrorism's relationship with the public and media. Terrorism and Counterterrorism introduces students to the field's main debates and helps them critically assess our understanding of, and our strategies for, addressing this complex and enduring issue. New to the Sixth Edition: Additions to terrorist developments since 2016, including the rise and decline of ISIS in Iraq and Syria. A significant expansion of the analysis of intelligence gathering and the growth of the U.S. intelligence community in the post-9/11 era. Discussion of increasing activities of extremist groups in the so-called alt-right and the ANTIFA movement in the U.S. and abroad. More explanations for the making of terrorists, including rational choice theory and new research revealing childhood trauma as a risk factor. An enlarged chapter on women and children in terrorism to include suicide missions as family projects. A new section on human rights violations in counterterrorism.

Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback): Roger A. Grimes Hacking the Hacker - Learn From the Experts Who Take Down Hackers (Paperback)
Roger A. Grimes
R499 R356 Discovery Miles 3 560 Save R143 (29%) Ships in 10 - 15 working days

Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and other cybersecurity experts from around the world detail the threats, their defenses, and the tools and techniques they use to thwart the most advanced criminals history has ever seen. Light on jargon and heavy on intrigue, this book is designed to be an introduction to the field; final chapters include a guide for parents of young hackers, as well as the Code of Ethical Hacking to help you start your own journey to the top. Cybersecurity is becoming increasingly critical at all levels, from retail businesses all the way up to national security. This book drives to the heart of the field, introducing the people and practices that help keep our world secure. * Go deep into the world of white hat hacking to grasp just how critical cybersecurity is * Read the stories of some of the world's most renowned computer security experts * Learn how hackers do what they do no technical expertise necessary * Delve into social engineering, cryptography, penetration testing, network attacks, and more As a field, cybersecurity is large and multi-faceted yet not historically diverse. With a massive demand for qualified professional that is only going to grow, opportunities are endless. Hacking the Hacker shows you why you should give the field a closer look.

The Browser Hacker's Handbook (Paperback): Wade Alcorn, Christian Frichot, Michele Orru The Browser Hacker's Handbook (Paperback)
Wade Alcorn, Christian Frichot, Michele Orru 1
R1,125 R1,041 Discovery Miles 10 410 Save R84 (7%) Ships in 10 - 15 working days

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: * Bypassing the Same Origin Policy * ARP spoofing, social engineering, and phishing to access browsers * DNS tunneling, attacking web applications, and proxying all from the browser * Exploiting the browser and its ecosystem (plugins and extensions) * Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.

Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques (Paperback): Vinny Troia Hunting Cyber Criminals - A Hacker's Guide to Online Intelligence Gathering Tools and Techniques (Paperback)
Vinny Troia
R831 R653 Discovery Miles 6 530 Save R178 (21%) Ships in 7 - 11 working days

The skills and tools for collecting, verifying and correlating information from different types of systems is an essential skill when tracking down hackers. This book explores Open Source Intelligence Gathering (OSINT) inside out from multiple perspectives, including those of hackers and seasoned intelligence experts. OSINT refers to the techniques and tools required to harvest publicly available data concerning a person or an organization. With several years of experience of tracking hackers with OSINT, the author whips up a classical plot-line involving a hunt for a threat actor. While taking the audience through the thrilling investigative drama, the author immerses the audience with in-depth knowledge of state-of-the-art OSINT tools and techniques. Technical users will want a basic understanding of the Linux command line in order to follow the examples. But a person with no Linux or programming experience can still gain a lot from this book through the commentaries. This book's unique digital investigation proposition is a combination of story-telling, tutorials, and case studies. The book explores digital investigation from multiple angles: Through the eyes of the author who has several years of experience in the subject. Through the mind of the hacker who collects massive amounts of data from multiple online sources to identify targets as well as ways to hit the targets. Through the eyes of industry leaders. This book is ideal for: Investigation professionals, forensic analysts, and CISO/CIO and other executives wanting to understand the mindset of a hacker and how seemingly harmless information can be used to target their organization. Security analysts, forensic investigators, and SOC teams looking for new approaches on digital investigations from the perspective of collecting and parsing publicly available information. CISOs and defense teams will find this book useful because it takes the perspective of infiltrating an organization from the mindset of a hacker. The commentary provided by outside experts will also provide them with ideas to further protect their organization's data.

Penetration Testing (Paperback): Georgia Weidman Penetration Testing (Paperback)
Georgia Weidman
R1,030 R799 Discovery Miles 7 990 Save R231 (22%) Ships in 7 - 11 working days

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment - including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: Crack passwords and wireless network keys with brute-forcing and wordlists Test web applications for vulnerabilities Use the Metasploit Framework to launch exploits and write your own Metasploit modules Automate social-engineering attacks Bypass antivirus software Turn access to one machine into total control of the enterprise in the post exploitation phase You'll even explore writing your own exploits. Then it's on to mobile hacking - Weidman's particular area of research - with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Kingdom Of Lies - Unnerving Adventures In The World Of Cybercrime (Hardcover): Kate Fazzini Kingdom Of Lies - Unnerving Adventures In The World Of Cybercrime (Hardcover)
Kate Fazzini 1
R450 R366 Discovery Miles 3 660 Save R84 (19%) Ships in 10 - 15 working days

Would you say your phone is safe, or your computer? What about your car? Or your bank?

There is a global war going on and the next target could be anyone, from a global corporation to a randomly selected person. From cybercrime villages like Ramnicu Valcea in Romania to intellectual property theft campaigns in China, these are the true stories of the hackers behind some of the largest cyberattacks in history, and those committed to stopping them.

Kate Fazzini has met the hackers that create new cyberweapons, develop ransomware that can stop international banks in their tracks, and hack sports cars for good and ill. Kingdom of Lies is a fast-paced look at the technological innovations that were mere fantasy only a few years ago, but now make up an integral part of all our lives.

Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback): Joseph Menn Cult of the Dead Cow - How the Original Hacking Supergroup Might Just Save the World (Paperback)
Joseph Menn 1
R414 R336 Discovery Miles 3 360 Save R78 (19%) Ships in 10 - 15 working days

The Cult of the Dead Cow is the story of the oldest, most respected and most famous hacking group of all time. Its members invented the the concept of hacktivism, released both the top tool for cracking passwords and the reigning technique for controlling computers from afar, and spurred development of Snowden's anonymity tool of choice. With its origins in the earliest days of the Internet, the cDc is full of oddball characters--spies, activists, musicians, and politicians--who are now woven into the top ranks of the American establishment. Today, this small group and their followers represent the best hope for making technology a force for good instead of for surveillance and oppression. Like a modern (and real) illuminati, cDc members have had the ears of presidents, secretaries of defense, and the CEO of Google. The Cult of the Dead Cow shows how we got into the mess we find ourselves in today, where governments and corporations hold immense power over individuals, and and how we are finally fighting back.

Conquer the Web - The Ultimate Cybersecurity Guide (Paperback): Jonathan Reuvid Conquer the Web - The Ultimate Cybersecurity Guide (Paperback)
Jonathan Reuvid; Nick Wilding, Tim Mitchell, Maureen Kendal, Nick Ioannou
R383 R298 Discovery Miles 2 980 Save R85 (22%) Ships in 10 - 15 working days

This is the ultimate guide to protect your data on the web. From passwords to opening emails, everyone knows what they should do but do you do it? 'A must read for anyone looking to upskill their cyber awareness,' Steve Durbin, Managing Director, Information Security Forum Tons of malicious content floods the internet which can compromise your system and your device, be it your laptop, tablet or phone. How often do you make payments online? Do you have children and want to ensure they stay safe online? How often do you sit at a coffee shop and log onto their free WIFI? How often do you use social media on the train or bus? If you believe using an antivirus software will keep devices safe... you are wrong. This book will guide you and provide solutions to avoid common mistakes and to combat cyber attacks.This Guide covers areas such as: Building resilience into our IT Lifestyle Online Identity Cyber Abuse: Scenarios and Stories Protecting Devices Download and share Gaming, gamble and travel Copycat websites I Spy and QR Codes Banking, apps and Passwords Includes chapers from Nick Wilding, General Manager at AXELOS, Tim Mitchell, Content Director at Get Safe Online, Maureen Kendal, Director at Cybercare, Nick Ioannou, Founder of Boolean Logical, and CYBERAWARE. 'Conquer the Web is a full and comprehensive read for anyone wanting to know more about cyber-security. It takes it time to explain the many acronyms and jargon that are associated with our industry, and goes into detail where necessary.' Sarah Jane MD of Layer8 Ltd 'Online fraud, cyber bullying, identity theft and these are the unfortunate by products of the cyber age. The challenge is how do we protect ourselves in the online world? Conquer the Web provides practical guidance in an easy to understand language that allows readers to take a small number of steps that will greatly increase their online security. A must read for anyone looking to upskill their cyber awareness.' Steve Durbin MD of Information Security Forum Limited

Hackers and Hacking - A Reference Handbook (Hardcover, New): Thomas J. Holt, Bernadette H Schell Hackers and Hacking - A Reference Handbook (Hardcover, New)
Thomas J. Holt, Bernadette H Schell
R1,549 Discovery Miles 15 490 Ships in 7 - 11 working days

This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives

CEH Certified Ethical Hacker Bundle, Fourth Edition (Mixed media product, 4th edition): Matt Walker CEH Certified Ethical Hacker Bundle, Fourth Edition (Mixed media product, 4th edition)
Matt Walker
R1,257 R846 Discovery Miles 8 460 Save R411 (33%) In stock

Thoroughly revised to cover all CEH v10 exam objectives, this bundle includes two books, online resources, and a bonus quick review guide This fully updated, money-saving self-study set prepares you for the CEH v10 exam. You can start by reading CEH Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition to learn about every topic included in the v10 exam objectives. Next, you can reinforce what you've learned with the 650+ practice questions featured in CEH Certified Ethical Hacker Practice Exams, Fourth Edition. The CEH Certified Ethical Hacker Bundle, Fourth Edition also includes a bonus a quick review guide that can be used as the final piece for exam preparation. A bonus voucher code for four hours of lab time from Practice Labs, a virtual machine platform providing access to real hardware and software, can be combined with the two hours of lab time included with the All-in-One Exam Guide and provides the hands-on experience that's tested in the optional new CEH Practical exam. This edition features up-to-date coverage of all five phases of ethical hacking: reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. *In all, the bundle includes more than 1,000 accurate questions with detailed answer explanations*Online content includes customizable practice exam software containing 600 practice questions in total and voucher codes for six free hours of lab time from Practice Labs*Bonus Quick Review Guide only available with this bundle*This bundle is 22% cheaper than buying the two books separately and includes exclusive online content

Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback): Occupytheweb Linux Basics For Hackers - Getting Started with Networking, Scripting, and Security in Kali (Paperback)
Occupytheweb
R703 R552 Discovery Miles 5 520 Save R151 (21%) Ships in 7 - 11 working days
Hacking Exposed 7 (Paperback, 7th edition): Stuart McClure, Joel Scambray, George Kurtz Hacking Exposed 7 (Paperback, 7th edition)
Stuart McClure, Joel Scambray, George Kurtz
R1,072 R728 Discovery Miles 7 280 Save R344 (32%) Ships in 10 - 15 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest tactics for thwarting digital attacks "Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker's mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats." --Brett Wahlin, CSO, Sony Network Entertainment "Stop taking punches--let's change the game; it's time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries." --Shawn Henry, former Executive Assistant Director, FBI Bolster your system's security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker's latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive "countermeasures cookbook." Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself

Hands-On Ethical Hacking and Network Defense (Paperback, 2nd edition): James Corley, Kent Backman, Michael Simpson Hands-On Ethical Hacking and Network Defense (Paperback, 2nd edition)
James Corley, Kent Backman, Michael Simpson
R989 R841 Discovery Miles 8 410 Save R148 (15%) Ships in 15 - 25 working days

Hands-On Ethical Hacking and Network Defense, Second Edition provides an in-depth understanding of how to effectively protect computer networks. This book describes the tools and penetration testing methodologies used by ethical hackers and provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber attacks. Readers are provided with updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also included is a thorough update of the federal and state computer crime laws, as well as changes in penalties for illegal computer hacking. With cyber-terrorism and corporate espionage threatening the fiber of our world, the need for trained network security professionals continues to grow. Hands-On Ethical Hacking and Network Defense, Second Edition provides a structured knowledge base to prepare readers to be security professionals who understand how to protect a network by using the skills and tools of an ethical hacker.

Certified Ethical Hacker (CEH) Version 10 Cert Guide (Hardcover, 3rd edition): Omar Santos, Michael Gregg Certified Ethical Hacker (CEH) Version 10 Cert Guide (Hardcover, 3rd edition)
Omar Santos, Michael Gregg
R1,203 R856 Discovery Miles 8 560 Save R347 (29%) Ships in 10 - 15 working days

This book is a complete guide to prepare for the CompTIA PenTest+ certification exam.

Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Paperback): Peter W. Singer, Allan Friedman Cybersecurity and Cyberwar - What Everyone Needs to Know (R) (Paperback)
Peter W. Singer, Allan Friedman
R295 R237 Discovery Miles 2 370 Save R58 (20%) Ships in 10 - 15 working days

Dependence on computers has had a transformative effect on human society. Cybernetics is now woven into the core functions of virtually every basic institution, including our oldest ones. War is one such institution, and the digital revolution's impact on it has been profound. The American military, which has no peer, is almost completely reliant on high-tech computer systems. Given the Internet's potential for full-spectrum surveillance and information disruption, the marshaling of computer networks represents the next stage of cyberwar. Indeed, it is upon us already. The recent Stuxnet episode, in which Israel fed a malignant computer virus into Iran's nuclear facilities, is one such example. Penetration into US government computer systems by Chinese hackers-presumably sponsored by the Chinese government-is another. Together, they point to a new era in the evolution of human conflict. In Cybersecurity: What Everyone Needs to Know, noted experts Peter W. Singer and Allan Friedman lay out how the revolution in military cybernetics occurred and explain where it is headed. They begin with an explanation of what cyberspace is before moving on to discussions of how it can be exploited and why it is so hard to defend. Throughout, they discuss the latest developments in military and security technology. Singer and Friedman close with a discussion of how people and governments can protect themselves. In sum, Cybersecurity is the definitive account on the subject for the educated layman who wants to know more about the nature of war, conflict, and security in the twenty first century.

Intercept - The Secret History of Computers and Spies (Paperback): Gordon Corera Intercept - The Secret History of Computers and Spies (Paperback)
Gordon Corera 1
R270 R236 Discovery Miles 2 360 Save R34 (13%) Ships in 10 - 15 working days

The computer was born to spy, and now computers are transforming espionage. But who are the spies and who is being spied on in today's interconnected world? This is the exhilarating secret history of the melding of technology and espionage. Gordon Corera's compelling narrative, rich with historical details and characters, takes us from the Second World War to the internet age, revealing the astonishing extent of cyberespionage carried out today. Drawing on unique access to intelligence agencies, heads of state, hackers and spies of all stripes, INTERCEPT is a ground-breaking exploration of the new space in which the worlds of espionage, geopolitics, diplomacy, international business, science and technology collide. Together, computers and spies are shaping the future. What was once the preserve of a few intelligence agencies now matters for us all.

Cybersecurity for Beginners (Paperback, 2nd Revised edition): Raef Meeuwisse Cybersecurity for Beginners (Paperback, 2nd Revised edition)
Raef Meeuwisse
R424 Discovery Miles 4 240 Ships in 7 - 11 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Scams, Security and Over-Sharing…
Jon White Paperback R341 R278 Discovery Miles 2 780
CEH Certified Ethical Hacker All-in-One…
Matt Walker Paperback R1,195 R687 Discovery Miles 6 870
The Art of Deception - Controlling the…
Kevin D. Mitnick, William L Simon Hardcover R917 R621 Discovery Miles 6 210
Computer Crimes and Digital…
Ian Walden Hardcover  (1)
R3,529 Discovery Miles 35 290
CHFI Computer Hacking Forensic…
Charles Brooks Hardcover R881 R602 Discovery Miles 6 020
Understanding Cyber Warfare - Politics…
Christopher Whyte, Brian Mazanec Paperback R856 Discovery Miles 8 560
Adversarial and Uncertain Reasoning for…
Sushil Jajodia, George Cybenko, … Paperback R1,265 R1,158 Discovery Miles 11 580
Computer Forensics JumpStart
Michael G. Solomon, K. Rudolph, … Paperback R603 R424 Discovery Miles 4 240
Cyber Frauds, Scams and their Victims
Mark Button, Cassandra Cross Paperback R913 Discovery Miles 9 130
The Art of Intrusion - The Real Stories…
Kevin D. Mitnick, William L Simon Hardcover R905 R610 Discovery Miles 6 100

 

Partners