Your cart

Your cart is empty

Browse All departments
  • R100 - R250 (1,645)
  • R250 - R500 (712)
  • R500+ (5,139)
  • -
Author / Contributor

Books > Computing & IT > Computer communications & networking > Network security

Practical OPNsense - Enterprise firewalls build on open source (Paperback): Markus Stubbig Practical OPNsense - Enterprise firewalls build on open source (Paperback)
Markus Stubbig
R683 Discovery Miles 6 830 Ships in 7 - 11 working days
Pacifying the Homeland - Intelligence Fusion and Mass Supervision (Paperback): Brendan McQuade Pacifying the Homeland - Intelligence Fusion and Mass Supervision (Paperback)
Brendan McQuade
R646 R514 Discovery Miles 5 140 Save R132 (20%) Ships in 10 - 15 working days

The United States has poured over a billion dollars into a network of interagency intelligence centers called "fusion centers." These centers were ostensibly set up to prevent terrorism, but politicians, the press, and policy advocates have criticized them for failing on this account. So why do these security systems persist? Pacifying the Homeland travels inside the secret world of intelligence fusion, looks beyond the apparent failure of fusion centers, and reveals a broader shift away from mass incarceration and toward a more surveillance- and police-intensive system of social regulation. Provided with unprecedented access to domestic intelligence centers, Brendan McQuade uncovers how the institutionalization of intelligence fusion enables decarceration without fully addressing the underlying social problems at the root of mass incarceration. The result is a startling analysis that contributes to the debates on surveillance, mass incarceration, and policing and challenges readers to see surveillance, policing, mass incarceration, and the security state in an entirely new light.

CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003) (Paperback,... CASP+ CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide, Second Edition (Exam CAS-003) (Paperback, Ed)
Nicholas Lane, Wm. Arthur Conklin, Gregory White, Dwayne Williams
R1,245 R833 Discovery Miles 8 330 Save R412 (33%) In stock

Complete coverage of every topic on the CompTIA Advanced Security Practitioner certification exam Take the challenging CASP exam from CompTIA with total confidence using this highly effective self-study exam guide. Published by the leader in CompTIA training and exam preparation, McGraw-Hill Education, the book covers all of the new CASP objectives and features more than 100 practice questions that match those on the live test in format, content, and tone. CASP CompTIA Advanced Security Practitioner Certification All-in-One Exam Guide (Exam CAS-003) offers clear explanations of complex concepts that ensure you will be ready for the test. You will gain the technical knowledge and skills required to conceptualize, engineer, integrate, and implement secure solutions across complex environments. Beyond exam prep, the book also serves as a valuable on-the-job reference for cybersecurity professionals. * Includes a 10% off the exam coupon-a $27 value* Written by expert trainer and experienced author Nick Lane* Online content includes 100+ realistic practice questions

Fundamentals of Computer Security (Hardcover, 2003 ed.): Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry Fundamentals of Computer Security (Hardcover, 2003 ed.)
Josef Pieprzyk, Thomas Hardjono, Jennifer Seberry
R2,151 Discovery Miles 21 510 Ships in 7 - 11 working days

This book presents modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts. Modern developments in cryptography are examined, starting from private-key and public-key encryption, going through hashing, digital signatures, authentication, secret sharing, group-oriented cryptography, pseudorandomness, key establishment protocols, zero-knowledge protocols, and identification, and finishing with an introduction to modern e-bussiness systems based on digital cash. Intrusion detection and access control provide examples of security systems implemented as a part of operating system. Database and network security is also discussed.This textbook is developed out of classes given by the authors at several universities in Australia over a period of a decade, and will serve as a reference book for professionals in computer security. The presentation is selfcontained. Numerous illustrations, examples, exercises, and a comprehensive subject index support the reader in accessing the material.

ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28,... ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings (Hardcover, 2015 ed.)
Hannes Federrath, Dieter Gollmann
R3,543 R2,852 Discovery Miles 28 520 Save R691 (20%) Ships in 10 - 15 working days

This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd Edition): Ben... CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd Edition)
Ben Malisow
R1,730 R1,314 Discovery Miles 13 140 Save R416 (24%) Ships in 7 - 11 working days

This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 2nd Edition with an updated collection of practice questions and practice exams in CCSP (ISC)2 Certified Cloud Security Professional Official Practice Tests, 2nd Edition to give you the best preparation ever for the high-stakes (ISC)2 CCSP exam. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide 2nd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes two unique practice exams to help you identify where you need to study more, electronic flashcards to reinforce your learning and give you last-minute test prep before the exam, and a searchable glossary in PDF format to give you instant access to the key terms you need to know for the exam. Add to that the thoroughly updated (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition, with two more complete exams and at least another 60 questions for each of the six domains and you'll be as ready as you can be for the CCSP exam.

Arista Warrior, 2e (Paperback, 2nd Revised edition): Gary A. Donahue Arista Warrior, 2e (Paperback, 2nd Revised edition)
Gary A. Donahue
R1,626 R952 Discovery Miles 9 520 Save R674 (41%) Ships in 10 - 15 working days

Arista Networks has become a key player in software-driven cloud networking solutions for large data center, storage, and computing environments, and is poised to make an impact in other areas as well. In this updated edition, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista's products. You'll learn why the company's network switches, software products, and Extensible Operating System (EOS) are so effective. Anyone who has or is pursuing networking certification (especially Arista's own!) or who is just curious about why Arista is better will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Pick up this in-depth guide and find out how Arista can help both you and your company. Topics in the second edition include: Configuration Management: config sessions, config replace, and config checkpoints CloudVision: Arista's management, workload orchestration, workflow automation, and configuration tool VXLAN: Layer 2 overlay networking FlexRoute: two million routes in hardware Tap Aggregation: make your switch or blade into a Tap Aggregation device Advanced Mirroring: mirror to a port-channel or even the CPU eAPI: Arista's fabulous extended Application Programmable Interface

The Network Security Test Lab - A Step-by-Step Guide (Paperback): Michael Gregg The Network Security Test Lab - A Step-by-Step Guide (Paperback)
Michael Gregg
R996 R925 Discovery Miles 9 250 Save R71 (7%) Ships in 10 - 15 working days

The ultimate hands-on guide to IT security and proactive defense The Network Security Test Lab is a hands-on, step-by-step guide to ultimate IT security implementation. Covering the full complement of malware, viruses, and other attack technologies, this essential guide walks you through the security assessment and penetration testing process, and provides the set-up guidance you need to build your own security-testing lab. You'll look inside the actual attacks to decode their methods, and learn how to run attacks in an isolated sandbox to better understand how attackers target systems, and how to build the defenses that stop them. You'll be introduced to tools like Wireshark, Networkminer, Nmap, Metasploit, and more as you discover techniques for defending against network attacks, social networking bugs, malware, and the most prevalent malicious traffic. You also get access to open source tools, demo software, and a bootable version of Linux to facilitate hands-on learning and help you implement your new skills. Security technology continues to evolve, and yet not a week goes by without news of a new security breach or a new exploit being released. The Network Security Test Lab is the ultimate guide when you are on the front lines of defense, providing the most up-to-date methods of thwarting would-be attackers. * Get acquainted with your hardware, gear, and test platform * Learn how attackers penetrate existing security systems * Detect malicious activity and build effective defenses * Investigate and analyze attacks to inform defense strategy The Network Security Test Lab is your complete, essential guide.

Swiped - How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Hardcover): Adam Levin, Beau... Swiped - How to Protect Yourself in a World Full of Scammers, Phishers, and Identity Thieves (Hardcover)
Adam Levin, Beau Friedlander; As told to Adam Levin, Beau Friedlander
R449 R385 Discovery Miles 3 850 Save R64 (14%) Ships in 10 - 15 working days

Identity fraud happens to everyone. So what do you do when it's your turn? Increasingly, identity theft is a fact of life. We might once have hoped to protect ourselves from hackers with airtight passwords and aggressive spam filters, and those are good ideas as far as they go. But with the breaches of huge organizations like Target, AshleyMadison.com, JPMorgan Chase, Sony, Anthem, and even the US Office of Personnel Management, more than a billion personal records have already been stolen, and chances are good that you're already in harm's way. This doesn't mean there's no hope. Your identity may get stolen, but it doesn't have to be a life-changing event. Adam Levin, a longtime consumer advocate and identity fraud expert, provides a method to help you keep hackers, phishers, and spammers from becoming your problem. Levin has seen every scam under the sun: fake companies selling "credit card insurance"; criminal, medical, and child identity theft; emails that promise untold riches for some personal information; catphishers, tax fraud, fake debt collectors who threaten you with legal action to confirm your account numbers; and much more. As Levin shows, these folks get a lot less scary if you see them coming. With a clearheaded, practical approach, Swiped is your guide to surviving the identity theft epidemic. Even if you've already become a victim, this strategic book will help you protect yourself, your identity, and your sanity.

Virtualization Security - Protecting Virtualized Environments (Paperback): Dave Shackleford Virtualization Security - Protecting Virtualized Environments (Paperback)
Dave Shackleford
R982 R657 Discovery Miles 6 570 Save R325 (33%) Ships in 10 - 15 working days

Securing virtual environments for VMware, Citrix, and Microsoft hypervisors

Virtualization changes the playing field when it comes to security. There are new attack vectors, new operational patterns and complexity, and changes in IT architecture and deployment life cycles. What's more, the technologies, best practices, and strategies used for securing physical environments do not provide sufficient protection for virtual environments. This book includes step-by-step configurations for the security controls that come with the three leading hypervisor--VMware vSphere and ESXi, Microsoft Hyper-V on Windows Server 2008, and Citrix XenServer.Includes strategy for securely implementing network policies and integrating virtual networks into the existing physical infrastructure Discusses vSphere and Hyper-V native virtual switches as well as the Cisco Nexus 1000v and Open vSwitch switches Offers effective practices for securing virtual machines without creating additional operational overhead for administrators Contains methods for integrating virtualization into existing workflows and creating new policies and processes for change and configuration management so that virtualization can help make these critical operations processes more effective

This must-have resource offers tips and tricks for improving disaster recovery and business continuity, security-specific scripts, and examples of how Virtual Desktop Infrastructure benefits security.

Casting Light on the Dark Web - A Guide for Safe Exploration (Hardcover): Matthew Beckstrom, Brady Lund Casting Light on the Dark Web - A Guide for Safe Exploration (Hardcover)
Matthew Beckstrom, Brady Lund
R755 Discovery Miles 7 550 Ships in 7 - 11 working days

Covers topics from what the dark web is, to how it works, to how you can use it, to some of the myths surrounding it. Casting Light on the Dark Web: A Guide for Safe Exploration is an easy-to-read and comprehensive guide to understanding how the Dark Web works and why you should be using it! Readers will be led on a tour of this elusive technology from how to download the platform for personal or public use, to how it can best be utilized for finding information. This guide busts myths and informs readers, while remaining jargon-free and entertaining. Useful for people of all levels of internet knowledge and experience.

Grokking Bitcoin (Paperback): Kalle Rosenbaum Grokking Bitcoin (Paperback)
Kalle Rosenbaum; Foreword by David A. Harding
R849 R508 Discovery Miles 5 080 Save R341 (40%) Ships in 10 - 15 working days

If you think Bitcoin is just an alternative currency for geeks, it's time to think again. Grokking Bitcoin opens up this powerful distributed ledger system, exploring the technology that enables applications both for Bitcoin-based financial transactions and using the blockchain for registering physical property ownership.

With this fully illustrated, easy-to-read guide, you'll finally understand how Bitcoin works, how you can use it, and why you can trust the blockchain.

Grokking Bitcoin explains why Bitcoin’s supporters trust it so deeply, and why you can too. This approachable book will introduce you to Bitcoin’s groundbreaking technology, which is the key to this world-changing system. This illustrated, easy-to-read guide prepares you for a new way of thinking with easy-to-follow diagrams and exercises. You’ll discover how Bitcoin mining works, how to accept Bitcoin, how to participate in the Bitcoin network, and how to set up a digital wallet.

Encyclopedia of Biometrics (Hardcover, 2nd ed. 2015): Stan Z. Li, Anil K. Jain Encyclopedia of Biometrics (Hardcover, 2nd ed. 2015)
Stan Z. Li, Anil K. Jain
R16,309 R15,487 Discovery Miles 154 870 Save R822 (5%) Ships in 10 - 15 working days

This encyclopedia provides a comprehensive reference to topics in biometrics including concepts, modalities, algorithms, devices, systems, security, performance testing, applications and standardization. With an A-Z format and over 1400 entries, it provides easy access to relevant information on all aspects of biometrics for those seeking entry into this broad field. Entries are written by experts in biometrics and related fields. Each entry includes a definition, key words, list of synonyms, list of related entries, illustration(s), applications and a bibliography. Most entries include useful literature references providing the reader with a portal to more detailed information. Comprehensive and tutorial, the Encyclopedia of Biometrics, 2nd Edition is a practical resource for experts in the field and professionals interested in aspects of biometrics.

Password Log - Internet Password Logbook Large Print With Tabs, discreet password book, password notebook with alphabetical... Password Log - Internet Password Logbook Large Print With Tabs, discreet password book, password notebook with alphabetical tabs - Colorful Macaw Cover (Paperback)
Norman M Pray
R126 Discovery Miles 1 260 Ships in 7 - 11 working days
Internet Security: How To Defend Against Attackers On The Web (Paperback, 2nd Revised edition): Mike Harwood Internet Security: How To Defend Against Attackers On The Web (Paperback, 2nd Revised edition)
Mike Harwood
R1,943 Discovery Miles 19 430 Ships in 10 - 15 working days

The Second Edition of Internet Security: How to Defend Against Attackers on the Web (formerly titled Security Strategies in Web Applications and Social Networking) provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, this book provides a comprehensive explanation of the evolutionary changes that have occurred in computing, communications, and social networking and discusses how to secure systems against all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the internet. Using examples and exercises, this book incorporates hands-on activities to prepare readers to successfully secure Web-enabled applications. New and Key Features of the Second Edition: NEW! - New Chapter 4, Securing Mobile Communications Provides a weatlh of exercises and real-world examples Details the latest internet threats and risks when connecting to the internet, as well as mitigating risk and securing applications Discusses penetration testing of production Web sites Examines mobile device and connectivity security

Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great... Shit I can't remember - Password manager book with alphabet tabs and discreet romantic watercolor design (5"x8") - a great gift for for kids, teenage girls, best friends, or mothers (Paperback)
Boss Girl Life
R151 Discovery Miles 1 510 Ships in 7 - 11 working days
Multilevel Modeling of Secure Systems in QoP-ML (Hardcover): Bogdan Ksiezopolski Multilevel Modeling of Secure Systems in QoP-ML (Hardcover)
Bogdan Ksiezopolski
R2,075 Discovery Miles 20 750 Ships in 10 - 15 working days

In order to perform effective analysis of today's information security systems, numerous components must be taken into consideration. This book presents a well-organized, consistent solution created by the author, which allows for precise multilevel analysis of information security systems and accounts for all of the significant details. Enabling the multilevel modeling of secure systems, the quality of protection modeling language (QoP-ML) approach provides for the abstraction of security systems while maintaining an emphasis on quality protection. This book introduces the basis of the QoP modeling language along with all the advanced analysis modules, syntax, and semantics. It delineates the steps used in cryptographic protocols and introduces a multilevel protocol analysis that expands current understanding. Introduces quality of protection evaluation of IT Systems Covers the financial, economic, and CO2 emission analysis phase Supplies a multilevel analysis of Cloud-based data centers Details the structures for advanced communication modeling and energy analysis Considers security and energy efficiency trade-offs for the protocols of wireless sensor network architectures Includes case studies that illustrate the QoP analysis process using the QoP-ML Examines the robust security metrics of cryptographic primitives Compares and contrasts QoP-ML with the PL/SQL, SecureUML, and UMLsec approaches by means of the SEQUAL framework The book explains the formal logic for representing the relationships between security mechanisms in a manner that offers the possibility to evaluate security attributes. It presents the architecture and API of tools that ensure automatic analysis, including the automatic quality of protection analysis tool (AQoPA), crypto metrics tool (CMTool), and security mechanisms evaluation tool (SMETool). The book includes a number of examples and case studies that illustrate the QoP analysis process by the QoP-ML. Every operation defined by QoP-ML is described within parameters of security metrics to help you better evaluate the impact of each operation on your system's security.

How to Talk to Your Kids About Pornography (Paperback): Educate and Empower Kids, Dina Alexander How to Talk to Your Kids About Pornography (Paperback)
Educate and Empower Kids, Dina Alexander; Illustrated by Jera Mehrdad
R300 R243 Discovery Miles 2 430 Save R57 (19%) Ships in 7 - 11 working days
Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 (Paperback,... Information Systems Security - 6th International Conference, ICISS 2010, Gandhinagar, India, December 17-19, 2010 (Paperback, 2010 ed.)
Somesh Jha, Anish Mathuria
R1,761 R1,266 Discovery Miles 12 660 Save R495 (28%) Ships in 10 - 15 working days

2.1 Web Application Vulnerabilities Many web application vulnerabilities havebeenwell documented andthemi- gation methods havealso beenintroduced [1]. The most common cause ofthose vulnerabilities isthe insu?cient input validation. Any data originated from o- side of the program code, forexample input data provided by user through a web form, shouldalwaysbeconsidered malicious andmustbesanitized before use.SQLInjection, Remote code execution orCross-site Scriptingarethe very common vulnerabilities ofthattype [3]. Below isabrief introduction toSQL- jection vulnerability though the security testingmethodpresented in thispaper is not limited toit. SQLinjectionvulnerabilityallowsanattackertoillegallymanipulatedatabase byinjectingmalicious SQL codes into the values of input parameters of http requests sentto the victim web site. 1: Fig.1. An example of a program written in PHP which contains SQL Injection v- nerability Figure 1 showsaprogram that uses the database query function mysql query togetuserinformationcorrespondingtothe userspeci?edby the GETinput- rameterusername andthen printtheresultto the clientbrowser.Anormalhttp request with the input parameter username looks like "http://example. com/ index.php?username=bob". The dynamically created database query at line2 is "SELECT * FROM users WHERE username='bob' AND usertype='user'". Thisprogram is vulnerabletoSQLInjection attacks because mysql query uses the input value of username without sanitizingmalicious codes. A malicious code can be a stringthatcontains SQL symbols ork- words.Ifan attacker sendarequest with SQL code ('alice'-') - jected "http://example.com/index.php?username=alice'-", the query becomes "SELECT* FROM users WHERE username='alice'--' AND usertype='user'".

Autonomic and Trusted Computing - 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings... Autonomic and Trusted Computing - 7th International Conference, ATC 2010, Xi'an, China, October 26-29, 2010, Proceedings (Paperback, Edition.)
Bing Xie, Juergen Branke, S. Masoud Sadjadi, Daqing Zhang, Xingshe Zhou
R1,759 R1,439 Discovery Miles 14 390 Save R320 (18%) Ships in 10 - 15 working days

Computing systems including hardware, software, communication, and networks are becoming increasingly large and heterogeneous. In short, they have become - creasingly complex. Such complexity is getting even more critical with the ubiquitous permeation of embedded devices and other pervasive systems. To cope with the growing and ubiquitous complexity, autonomic computing (AC) focuses on self-manageable computing and communication systems that exhibit self-awareness, self-configuration, self-optimization, self-healing, self-protection and other self-* properties to the maximum extent possible without human intervention or guidance. Organic computing (OC) additionally addresses adaptability, robustness, and c- trolled emergence as well as nature-inspired concepts for self-organization. Any autonomic or organic system must be trustworthy to avoid the risk of losing control and retain confidence that the system will not fail. Trust and/or distrust relationships in the Internet and in pervasive infrastructures are key factors to enable dynamic interaction and cooperation of various users, systems, and services. Trusted/ trustworthy computing (TC) aims at making computing and communication systems--as well as services--available, predictable, traceable, controllable, asse- able, sustainable, dependable, persistent, security/privacy protectable, etc. A series of grand challenges exists to achieve practical autonomic or organic s- tems with truly trustworthy services. Started in 2005, ATC conferences have been held at Nagasaki (Japan), Vienna (Austria), Three Gorges (China), Hong Kong (China), Oslo (Norway) and Brisbane (Australia). The 2010 proceedings contain the papers presented at the 7th International Conference on Autonomic and Trusted Computing (ATC 2010), held in Xi'an, China, October 26-29, 2010.

The Target Store Data Breaches - Examination and Insight (Hardcover): Marianna Hardy The Target Store Data Breaches - Examination and Insight (Hardcover)
Marianna Hardy
R3,193 Discovery Miles 31 930 Ships in 10 - 15 working days

In November and December of 2013, cyber-criminals breached the data security of Target, one of the largest U.S. retail chains, stealing the personal and financial information of millions of customers. On December 19, 2013, Target confirmed that some 40 million credit and debit card account numbers had been stolen. On January 10, 2014, Target announced that personal information, including the names, addresses, phone numbers, and email addresses of up to 70 million customers, was also stolen during the data breach. A report by the Senate Committee on Commerce in March 2014 concluded that Target missed opportunities to prevent the data breach. This book answers some frequently asked questions about the Target breach, including what is known to have happened in the breach, and what costs may result. It also examines some of the broader issues common to data breaches, including how the payment system works, how cybersecurity costs are shared and allocated within the payment system, who bears the losses in such breaches more generally, what emerging cybersecurity technologies may help prevent them, and what role the government could play in encouraging their adoption. The book addresses policy issues discussed in congressional hearings and describes some of the legislation that Congress has introduced to deal with these issues. This book also presents an explanation of how the Target breach occurred, based on media reports and expert analyses that have been published since Target publicly acknowledged this breach.

Learning Kali Linux - Security Testing, Penetration Testing & Ethical Hacking (Paperback): Ric Messier Learning Kali Linux - Security Testing, Penetration Testing & Ethical Hacking (Paperback)
Ric Messier
R1,170 R694 Discovery Miles 6 940 Save R476 (41%) Ships in 10 - 15 working days

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali's expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You'll also explore the vulnerabilities that make those tests necessary. Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You'll discover different techniques for extending Kali tools and creating your own toolset. Learn tools for stress testing network stacks and applications Perform network reconnaissance to determine what's available to attackers Execute penetration tests using automated exploit tools such as Metasploit Use cracking tools to see if passwords meet complexity requirements Test wireless capabilities by injecting frames and cracking passwords Assess web application vulnerabilities with automated or proxy-based tools Create advanced attack techniques by extending Kali tools or developing your own Use Kali Linux to generate reports once testing is complete

Information Security and Cryptology - ICISC 2009 - 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised... Information Security and Cryptology - ICISC 2009 - 12th International Conference, Seoul, Korea, December 2-4. 2009. Revised Selected Papers (Paperback, 2010 ed.)
Dong Hoon Lee, Seokhie Hong
R1,895 R1,549 Discovery Miles 15 490 Save R346 (18%) Ships in 10 - 15 working days

ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2-4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). The aim of this conference was to provide a forum for the presentation of new results in research, development, and applications in the ?eld of information security and cryptology. It also served as a place for research information exchange. The conference received 88 submissions from 22 countries, covering all areas of inf- mation security and cryptology. The review and selection processes were carried out in two stages by the Program Committee (PC) comprising 57 prominent - searchers via online meetings. First, at least three PC members blind-reviewed each paper, and papers co-authored by the PC members were reviewed by at least ?ve PC members. Second, individual review reports were revealed to PC members, and detailed interactive discussion on each paper followed. Through this process,thePC?nally selected 25papers from15countries. The acceptance rate was 28. 4%. The authors of selected papers had a few weeks to prepare for their ?nal versions based on the comments received from more than 80 ext- nal reviewers. The conference featured one tutorial and one invited talk. The tutorial was given by Amit Sahai from the University of California and the talk was given by Michel Abdalla from Ecole normale sup erieure.

Cybersecurity Blue Team Toolkit (Paperback): Nadean H. Tanner Cybersecurity Blue Team Toolkit (Paperback)
Nadean H. Tanner
R907 R538 Discovery Miles 5 380 Save R369 (41%) Ships in 10 - 15 working days

A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.

Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January... Advances in Digital Forensics IX - 9th IFIP WG 11.9 International Conference on Digital Forensics, Orlando, FL, USA, January 28-30, 2013, Revised Selected Papers (Hardcover, Revised edition)
Gilbert Peterson, Sujeet Shenoi
R2,650 R2,255 Discovery Miles 22 550 Save R395 (15%) Ships in 10 - 15 working days

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance - investigations of security breaches yield valuable information that can be used to design more secure systems. Advances in Digital Forensics IX describe original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: Themes and Issues, Forensic Models, Forensic Techniques, File system Forensics, Network Forensics, Cloud Forensics, Forensic Tools, and Advanced Forensic Techniques. This book is the ninth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-five edited papers from the Ninth Annual IFIP WG 11.9 International Conference on Digital Forensics, held in Orlando, Florida, USA in the winter of 2013. Advances in Digital Forensics IX is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is an Associate Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Corporate Computer Security, Global…
Randall Boyle, Raymond Panko Paperback R1,565 Discovery Miles 15 650
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Blue Team Field Manual (BTFM)
Ben Clark, Alan J White Paperback R298 Discovery Miles 2 980
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
The Web Application Hacker's Handbook…
Dafydd Stuttard, Marcus Pinto Paperback R1,164 R704 Discovery Miles 7 040
Password Logbook - Keep your usernames…
Dorothy J Hall Paperback R123 Discovery Miles 1 230
Cyber Security and Privacy - Third Cyber…
Frances Cleary, Massimo Felici Paperback R1,694 R1,213 Discovery Miles 12 130
Adversarial Machine Learning
Anthony D. Joseph, Blaine Nelson, … Hardcover R1,870 R1,577 Discovery Miles 15 770
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Business Data Networks and Security…
Julia Panko, Raymond Panko Paperback R1,585 Discovery Miles 15 850