Your cart

Your cart is empty

Browse All departments
  • R100 - R250 (1,644)
  • R250 - R500 (714)
  • R500+ (5,140)
  • -
Author / Contributor

Books > Computing & IT > Computer communications & networking > Network security

Stack Frames - A Look From Inside (Paperback, 1st ed.): Giuseppe Di Cataldo Stack Frames - A Look From Inside (Paperback, 1st ed.)
Giuseppe Di Cataldo
R866 R813 Discovery Miles 8 130 Save R53 (6%) Ships in 10 - 15 working days

Teaches you exactly how program memory content and organization is vital for computer security, especially Unix-like operating systems. You will learn how it is manipulated to take control of a computer system, as well as the countermeasures that system designers set up to avoid this. Neither a guide for hackers nor an all-out theory book, this book is ideal for anyone studying computer security who wants to learn by doing. Using a practical approach, you will understand how stack frames relate to hardware and software theory and the various GNU/Linux distributions, before moving on to Base 2, 8 and 16 notations, executables and libraries. Lastly you will go in-depth to understand the intricacies of stack frames. A vital resource for all computer security students and enthusiasts, add Stack Frames: A Look Inside to your library today. What You Will Learn In-depth knowledge on activation records of functions, and how this information can be used. A better understanding on how conventions used by compilers work. Clarify some concepts on libraries and their relationship with executable programs. Get, or recall, technical skills using compilers, debuggers, and other tools. Who This Book Is For The book is suitable for college students with a good knowledge of the C language, who are interested in deepening their study of the content and organization of program memory, namely the activation records of functions, as regards possible implications in computer security. A basic knowledge of both the Assembly language and the UNIX operating system is certainly helpful, as well as some practice with compilers and debuggers; but they are not compulsory.

Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications (Hardcover): Houbing Song, Glenn... Security and Privacy in Cyber-Physical Systems - Foundations, Principles, and Applications (Hardcover)
Houbing Song, Glenn Fink, Sabina Jeschke
R2,370 R2,132 Discovery Miles 21 320 Save R238 (10%) Ships in 10 - 15 working days

Written by a team of experts at the forefront of the cyber-physical systems (CPS) revolution, this book provides an in-depth look at security and privacy, two of the most critical challenges facing both the CPS research and development community and ICT professionals. It explores, in depth, the key technical, social, and legal issues at stake, and it provides readers with the information they need to advance research and development in this exciting area. Cyber-physical systems (CPS) are engineered systems that are built from, and depend upon the seamless integration of computational algorithms and physical components. Advances in CPS will enable capability, adaptability, scalability, resiliency, safety, security, and usability far in excess of what today s simple embedded systems can provide. Just as the Internet revolutionized the way we interact with information, CPS technology has already begun to transform the way people interact with engineered systems. In the years ahead, smart CPS will drive innovation and competition across industry sectors, from agriculture, energy, and transportation, to architecture, healthcare, and manufacturing. A priceless source of practical information and inspiration, Security and Privacy in Cyber-Physical Systems: Foundations, Principles and Applications is certain to have a profound impact on ongoing R&D and education at the confluence of security, privacy, and CPS.

Cybersecurity Workforce - Staffing Needs, Skills Requirements and Coding Procedures (Hardcover): Maximilian Biermann Cybersecurity Workforce - Staffing Needs, Skills Requirements and Coding Procedures (Hardcover)
Maximilian Biermann
R3,812 R2,774 Discovery Miles 27 740 Save R1,038 (27%) Ships in 10 - 15 working days

The security of federal information systems and data is critical to the nation's safety, prosperity, and well-being. However, federal systems and networks are inherently at risk because of their complexity, technological diversity, and geographic dispersion. Further, threats to federal information technology (IT) infrastructure continue to grow in number and sophistication, posing a risk to the reliable functioning of our government. A key component of the government's ability to mitigate and respond to cybersecurity threats is having a qualified, well-trained cybersecurity workforce. The objectives of chapter 1 are to determine the extent to which federal agencies have assigned work roles for positions performing IT, cybersecurity, or cyber-related functions and describe the steps federal agencies took to identify work roles of critical need. As reported in chapter 2, DHS has identified, categorized, and assigned employment codes to its cybersecurity positions and identified its cybersecurity workforce areas of critical need. Chapter 3 assessed whether: OPM developed a coding structure and procedures for assigning codes to cybersecurity positions and submitted a progress report to Congress; CFO Act agencies submitted complete, reliable baseline assessments of their cybersecurity workforces; and CFO Act agencies established procedures to assign codes to cybersecurity positions.

Demystifying Internet of Things Security - Successful IoT Device/Edge and Platform Security Deployment (Paperback, 1st ed.):... Demystifying Internet of Things Security - Successful IoT Device/Edge and Platform Security Deployment (Paperback, 1st ed.)
Sunil Cheruvu, Anil Kumar, Ned Smith, David M. Wheeler
R822 R645 Discovery Miles 6 450 Save R177 (22%) Ships in 7 - 11 working days

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the network Gather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platforms Understand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Counterterrorism and Open Source Intelligence (Hardcover, 2011 Ed.): Uffe Wiil Counterterrorism and Open Source Intelligence (Hardcover, 2011 Ed.)
Uffe Wiil
R3,520 R2,822 Discovery Miles 28 220 Save R698 (20%) Ships in 10 - 15 working days

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities.

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd Edition): Ben... CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide & Practice Tests Bundle (Paperback, 2nd Edition)
Ben Malisow
R1,730 R1,314 Discovery Miles 13 140 Save R416 (24%) Ships in 7 - 11 working days

This value-packed set for the serious (ISC)2 CCSP certification candidate combines the bestselling CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide, 2nd Edition with an updated collection of practice questions and practice exams in CCSP (ISC)2 Certified Cloud Security Professional Official Practice Tests, 2nd Edition to give you the best preparation ever for the high-stakes (ISC)2 CCSP exam. (ISC)2 CCSP Certified Cloud Security Professional Official Study Guide 2nd Edition is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes two unique practice exams to help you identify where you need to study more, electronic flashcards to reinforce your learning and give you last-minute test prep before the exam, and a searchable glossary in PDF format to give you instant access to the key terms you need to know for the exam. Add to that the thoroughly updated (ISC)2 CCSP Certified Cloud Security Professional Official Practice Tests, 2nd Edition, with two more complete exams and at least another 60 questions for each of the six domains and you'll be as ready as you can be for the CCSP exam.

Cyber Security Policy Guidebook (Hardcover, New): Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey... Cyber Security Policy Guidebook (Hardcover, New)
Jennifer L. Bayuk, Jason Healey, Paul Rohmeyer, Marcus H. Sachs, Jeffrey Schmidt, …
R1,989 R1,797 Discovery Miles 17 970 Save R192 (10%) Ships in 10 - 15 working days

Drawing upon a wealth of experience from academia, industry, and government service, "Cyber Security Policy Guidebook" details and dissects, in simple language, current organizational cyber security policy issues on a global scale--taking great care to educate readers on the history and current approaches to the security of cyberspace. It includes thorough descriptions--as well as the pros and cons--of a plethora of issues, and documents policy alternatives for the sake of clarity with respect to policy alone. The Guidebook also delves into organizational implementation issues, and equips readers with descriptions of the positive and negative impact of specific policy choices.

Inside are detailed chapters that: Explain what is meant by cyber security and cyber security policyDiscuss the process by which cyber security policy goals are setEducate the reader on decision-making processes related to cyber securityDescribe a new framework and taxonomy for explaining cyber security policy issuesShow how the U.S. government is dealing with cyber security policy issues

With a glossary that puts cyber security language in layman's terms--and diagrams that help explain complex topics--"Cyber Security Policy Guidebook" gives students, scholars, and technical decision-makers the necessary knowledge to make informed decisions on cyber security policy.

Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback): Raphael Hertzog, Mati Aharoni, Jim... Kali Linux Revealed - Mastering the Penetration Testing Distribution (Paperback)
Raphael Hertzog, Mati Aharoni, Jim O'Gorman
R595 Discovery Miles 5 950 Ships in 7 - 11 working days
Programming with STM32: Getting Started with the Nucleo Board and C/C++ (Paperback, Ed): Donald Norris Programming with STM32: Getting Started with the Nucleo Board and C/C++ (Paperback, Ed)
Donald Norris
R395 R284 Discovery Miles 2 840 Save R111 (28%) Ships in 10 - 15 working days

Create your own STM32 programs with ease! Get up and running programming the STM32 line of microcontrollers from STMicroelectronics using the hands-on information contained in this easy-to-follow guide. Written by an experienced electronics hobbyist and author, Programming with STM32: Getting Started with the Nucleo Board and C/C++ features start-to-finish projects that clearly demonstrate each technique. Discover how to set up a stable development toolchain, write custom programs, download your programs to the development board, and execute them. You will even learn how to work with external servos and LED displays! *Explore the features of STM32 microcontrollers from STMicroelectonics*Configure your Nucleo-64 Microcontroller development board*Establish a toolchain and start developing interesting applications *Add specialized code and create cool custom functions*Automatically generate C code using the STM32CubeMX application*Work with the ARM Cortex Microcontroller Software Interface Standard and the STM hardware abstraction layer (HAL).*Control servos, LEDs, and other hardware using PWM*Transfer data to and from peripheral devices using DMA*Generate waveforms and pulses through your microcontroller's DAC

Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed.... Guide to Vulnerability Analysis for Computer Networks and Systems - An Artificial Intelligence Approach (Hardcover, 1st ed. 2018)
Simon Parkinson, Andrew Crampton, Richard Hill
R1,411 R1,181 Discovery Miles 11 810 Save R230 (16%) Ships in 10 - 15 working days

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.

Cyber Privacy - Who Has Your Data  and Why You Should Care (Hardcover): April Falcon Doss Cyber Privacy - Who Has Your Data and Why You Should Care (Hardcover)
April Falcon Doss
R567 R454 Discovery Miles 4 540 Save R113 (20%) Ships in 7 - 11 working days

You're being tracked. Amazon, Google, Facebook, governments. No matter who we are or where we go, someone is collecting our data: to profile us, target us, assess us; to predict our behavior and analyze our attitudes; to influence the things we do and buy-even to impact our vote. If this makes you uneasy, it should. We live in an era of unprecedented data aggregation, and it's never been more difficult to navigate the trade-offs between individual privacy, personal convenience, national security, and corporate profits. Technology is evolving quickly, while laws and policies are changing slowly. You shouldn't have to be a privacy expert to understand what happens to your data. April Falcon Doss, a privacy expert and former NSA and Senate lawyer, has seen this imbalance in action. She wants to empower individuals and see policy catch up. In Cyber Privacy, Doss demystifies the digital footprints we leave in our daily lives and reveals how our data is being used-sometimes against us-by the private sector, the government, and even our employers and schools. She explains the trends in data science, technology, and the law that impact our everyday privacy. She tackles big questions: how data aggregation undermines personal autonomy, how to measure what privacy is worth, and how society can benefit from big data while managing its risks and being clear-eyed about its cost. It's high time to rethink notions of privacy and what, if anything, limits the power of those who are constantly watching, listening, and learning about us. This book is for readers who want answers to three questions: Who has your data? Why should you care? And most important, what can you do about it?

Applications of Secure Multiparty Computation (Hardcover): Peeter Laud, Liina Kamm Applications of Secure Multiparty Computation (Hardcover)
Peeter Laud, Liina Kamm
R2,236 Discovery Miles 22 360 Ships in 10 - 15 working days
Danger Keep Out Password Keeper - Security Internet Username & Password Keeper Logbook Passkey Record Journal Notebook Novelty... Danger Keep Out Password Keeper - Security Internet Username & Password Keeper Logbook Passkey Record Journal Notebook Novelty Birthday Gift for Dad (Paperback)
Dream Journals
R122 Discovery Miles 1 220 In stock
Large-Scale Data Analytics (Hardcover, 2014 ed.): Aris Gkoulalas-Divanis, Abderrahim Labbi Large-Scale Data Analytics (Hardcover, 2014 ed.)
Aris Gkoulalas-Divanis, Abderrahim Labbi
R3,140 R2,591 Discovery Miles 25 910 Save R549 (17%) Ships in 10 - 15 working days

This edited book collects state-of-the-art research related to large-scale data analytics that has been accomplished over the last few years. This is among the first books devoted to this important area based on contributions from diverse scientific areas such as databases, data mining, supercomputing, hardware architecture, data visualization, statistics, and privacy. There is increasing need for new approaches and technologies that can analyze and synthesize very large amounts of data, in the order of petabytes, that are generated by massively distributed data sources. This requires new distributed architectures for data analysis. Additionally, the heterogeneity of such sources imposes significant challenges for the efficient analysis of the data under numerous constraints, including consistent data integration, data homogenization and scaling, privacy and security preservation. The authors also broaden reader understanding of emerging real-world applications in domains such as customer behavior modeling, graph mining, telecommunications, cyber-security, and social network analysis, all of which impose extra requirements for large-scale data analysis. Large-Scale Data Analytics is organized in 8 chapters, each providing a survey of an important direction of large-scale data analytics or individual results of the emerging research in the field. The book presents key recent research that will help shape the future of large-scale data analytics, leading the way to the design of new approaches and technologies that can analyze and synthesize very large amounts of heterogeneous data. Students, researchers, professionals and practitioners will find this book an authoritative and comprehensive resource.

Industry of Anonymity - Inside the Business of Cybercrime (Hardcover): Jonathan Lusthaus Industry of Anonymity - Inside the Business of Cybercrime (Hardcover)
Jonathan Lusthaus
R859 R776 Discovery Miles 7 760 Save R83 (10%) Ships in 10 - 15 working days

The most extensive account yet of the lives of cybercriminals and the vast international industry they have created, deeply sourced and based on field research in the world's technology-crime hotspots. Cybercrime seems invisible. Attacks arrive out of nowhere, their origins hidden by layers of sophisticated technology. Only the victims are clear. But every crime has its perpetrator-specific individuals or groups sitting somewhere behind keyboards and screens. Jonathan Lusthaus lifts the veil on the world of these cybercriminals in the most extensive account yet of the lives they lead, and the vast international industry they have created. We are long past the age of the lone adolescent hacker tapping away in his parents' basement. Cybercrime now operates like a business. Its goods and services may be illicit, but it is highly organized, complex, driven by profit, and globally interconnected. Having traveled to cybercrime hotspots around the world to meet with hundreds of law enforcement agents, security gurus, hackers, and criminals, Lusthaus takes us inside this murky underworld and reveals how this business works. He explains the strategies criminals use to build a thriving industry in a low-trust environment characterized by a precarious combination of anonymity and teamwork. Crime takes hold where there is more technical talent than legitimate opportunity, and where authorities turn a blind eye-perhaps for a price. In the fight against cybercrime, understanding what drives people into this industry is as important as advanced security. Based on seven years of fieldwork from Eastern Europe to West Africa, Industry of Anonymity is a compelling and revealing study of a rational business model which, however much we might wish otherwise, has become a defining feature of the modern world.

Penetration Tester's Open Source Toolkit (Paperback, 4th edition): Jeremy Faircloth Penetration Tester's Open Source Toolkit (Paperback, 4th edition)
Jeremy Faircloth
R1,149 R1,001 Discovery Miles 10 010 Save R148 (13%) Ships in 10 - 15 working days

Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test results possible. Real-life scenarios are a major focus so that the reader knows which tool to use and how to use it for a variety of situations. This updated edition covers the latest technologies and attack vectors, including industry specific case studies and complete laboratory setup. Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented work as well or better than commercial tools and can be modified by the user for each situation if needed. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them. Penetration Tester's Open Source Toolkil, Fourth Edition bridges this gap providing the critical information that you need.

Cybersecurity For Dummies (Paperback): Joseph Steinberg Cybersecurity For Dummies (Paperback)
Joseph Steinberg
R514 R416 Discovery Miles 4 160 Save R98 (19%) Ships in 7 - 11 working days

Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized or criminal use of electronic data and the practice of ensuring the integrity, confidentiality, and availability of information. Being "cyber-secure" means that a person or organization has both protected itself against attacks by cyber criminals and other online scoundrels, and ensured that it has the ability to recover if it is attacked. If keeping your business or your family safe from cybersecurity threats is on your to-do list, Cybersecurity For Dummies will introduce you to the basics of becoming cyber-secure! You'll learn what threats exist, and how to identify, protect against, detect, and respond to these threats, as well as how to recover if you have been breached! The who and why of cybersecurity threats Basic cybersecurity concepts What to do to be cyber-secure Cybersecurity careers What to think about to stay cybersecure in the future Now is the time to identify vulnerabilities that may make you a victim of cyber-crime -- and to defend yourself before it is too late.

Microsoft Windows Security Essentials (Paperback): Darril Gibson Microsoft Windows Security Essentials (Paperback)
Darril Gibson
R822 R565 Discovery Miles 5 650 Save R257 (31%) Ships in 10 - 15 working days

Windows security concepts and technologies for IT beginners

IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built.

This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers

If you're new to IT and interested in entering the IT workforce, then "Microsoft Windows Security Essentials" is essential reading.

Computer Security -- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25,... Computer Security -- ESORICS 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part I (Paperback, 1st ed. 2015)
Gunther Pernul, Peter Y. A. Ryan, Edgar Weippl
R2,170 R2,018 Discovery Miles 20 180 Save R152 (7%) Ships in 10 - 15 working days

The two-volume set, LNCS 9326 and LNCS 9327 constitutes the refereed proceedings of the 20th European Symposium on Research in Computer Security, ESORICS 2015, held in Vienna, Austria, in September 2015. The 59 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers address issues such as networks and Web security; system security; crypto application and attacks; risk analysis; privacy; cloud security; protocols and attribute-based encryption; code analysis and side-channels; detection and monitoring; authentication; policies; and applied security.

Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.): Nihad A. Hassan Digital Forensics Basics - A Practical Guide Using Windows OS (Paperback, 1st ed.)
Nihad A. Hassan
R814 R636 Discovery Miles 6 360 Save R178 (22%) Ships in 7 - 11 working days

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You'll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigations Gather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10-specific feature forensics Utilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals

Cybersecurity Blue Team Toolkit (Paperback): Nadean H. Tanner Cybersecurity Blue Team Toolkit (Paperback)
Nadean H. Tanner
R907 R538 Discovery Miles 5 380 Save R369 (41%) Ships in 10 - 15 working days

A practical handbook to cybersecurity for both tech and non-tech professionals As reports of major data breaches fill the headlines, it has become impossible for any business, large or small, to ignore the importance of cybersecurity. Most books on the subject, however, are either too specialized for the non-technical professional or too general for positions in the IT trenches. Thanks to author Nadean Tanner's wide array of experience from teaching at a University to working for the Department of Defense, the Cybersecurity Blue Team Toolkit strikes the perfect balance of substantive and accessible, making it equally useful to those in IT or management positions across a variety of industries. This handy guide takes a simple and strategic look at best practices and tools available to both cybersecurity management and hands-on professionals, whether they be new to the field or looking to expand their expertise. Tanner gives comprehensive coverage to such crucial topics as security assessment and configuration, strategies for protection and defense, offensive measures, and remediation while aligning the concept with the right tool using the CIS Controls version 7 as a guide. Readers will learn why and how to use fundamental open source and free tools such as ping, tracert, PuTTY, pathping, sysinternals, NMAP, OpenVAS, Nexpose Community, OSSEC, Hamachi, InSSIDer, Nexpose Community, Wireshark, Solarwinds Kiwi Syslog Server, Metasploit, Burp, Clonezilla and many more. Up-to-date and practical cybersecurity instruction, applicable to both management and technical positions - Straightforward explanations of the theory behind cybersecurity best practices - Designed to be an easily navigated tool for daily use - Includes training appendix on Linux, how to build a virtual lab and glossary of key terms The Cybersecurity Blue Team Toolkit is an excellent resource for anyone working in digital policy as well as IT security professionals, technical analysts, program managers, and Chief Information and Technology Officers. This is one handbook that won't gather dust on the shelf, but remain a valuable reference at any career level, from student to executive.

Privacy in Location-Based Applications - Research Issues and Emerging Trends (Paperback, 2009 ed.): Claudio Bettini, Sushil... Privacy in Location-Based Applications - Research Issues and Emerging Trends (Paperback, 2009 ed.)
Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Sean X. Wang
R2,091 Discovery Miles 20 910 Ships in 7 - 11 working days

Location-based applications refer to those that use location data in a prominent manner. Location data can be very effective for service provisioning, enabling the birth of a new generation of information services. Although data security and privacy issues have been extensively investigated in several domains, current techniques are not readily applicable to location-based applications. Conciliating the effectiveness of these applications with privacy concerns constitutes a unique challenge, mostly due to the semantic richness of location and time information. Research in this field involves aspects of spatio-temporal reasoning, query processing, system security, statistical inference, and more importantly, anonymization techniques. Several research groups have been working in recent years to identify privacy attacks and defense techniques in this domain.

This state-of-the-art survey provides a solid ground for researchers approaching this topic to understand current achievements through a common categorization of privacy threats and defense techniques. This objective is particularly challenging considering the specific (and often implicit) assumptions that characterize the recent literature on privacy in location-based services.

The book also illustrates the many facets that make the study of this topic a particularly interesting research subject, including topics that go beyond privacy preserving transformations of service requests, and include access control, privacy preserving publishing of moving object data, privacy in the use of specific positioning technology, and privacy in vehicular network applications.

Hardware Security - A Hands-on Learning Approach (Paperback): Swarup Bhunia, Mark Tehranipoor Hardware Security - A Hands-on Learning Approach (Paperback)
Swarup Bhunia, Mark Tehranipoor
R2,024 R1,741 Discovery Miles 17 410 Save R283 (14%) Ships in 10 - 15 working days

Hardware Security: A Hands-On Learning Approach provides a broad, comprehensive and practical overview of hardware security that encompasses all levels of the electronic hardware infrastructure. It covers basic concepts like advanced attack techniques and countermeasures that are illustrated through theory, case studies and well-designed, hands-on laboratory exercises for each key concept. The book is ideal as a textbook for upper-level undergraduate students studying computer engineering, computer science, electrical engineering, and biomedical engineering, but is also a handy reference for graduate students, researchers and industry professionals. For academic courses, the book contains a robust suite of teaching ancillaries. Users will be able to access schematic, layout and design files for a printed circuit board for hardware hacking (i.e. the HaHa board) that can be used by instructors to fabricate boards, a suite of videos that demonstrate different hardware vulnerabilities, hardware attacks and countermeasures, and a detailed description and user manual for companion materials.

Data Science For Cyber-security (Hardcover): Niall M Adams, Nicholas A Heard, Patrick Rubin-delanchy, Mellisa Turcotte Data Science For Cyber-security (Hardcover)
Niall M Adams, Nicholas A Heard, Patrick Rubin-delanchy, Mellisa Turcotte
R2,635 R2,454 Discovery Miles 24 540 Save R181 (7%) Ships in 10 - 15 working days

Cyber-security is a matter of rapidly growing importance in industry and government. This book provides insight into a range of data science techniques for addressing these pressing concerns.The application of statistical and broader data science techniques provides an exciting growth area in the design of cyber defences. Networks of connected devices, such as enterprise computer networks or the wider so-called Internet of Things, are all vulnerable to misuse and attack, and data science methods offer the promise to detect such behaviours from the vast collections of cyber traffic data sources that can be obtained. In many cases, this is achieved through anomaly detection of unusual behaviour against understood statistical models of normality.This volume presents contributed papers from an international conference of the same name held at Imperial College. Experts from the field have provided their latest discoveries and review state of the art technologies.

Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition (Paperback, 3rd edition): Joel Scambray Hacking Exposed Windows: Microsoft Windows Security Secrets and Solutions, Third Edition (Paperback, 3rd edition)
Joel Scambray
R1,107 R850 Discovery Miles 8 500 Save R257 (23%) Ships in 7 - 11 working days

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. The latest Windows security attack and defense strategies "Securing Windows begins with reading this book." --James Costello (CISSP) IT Security Specialist, Honeywell Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomization

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
70 Tips and Tricks for Mastering the…
R. Sarma Danturthi Paperback R813 R636 Discovery Miles 6 360
Wtf Is My Password - Password Book…
Booki Nova Paperback R115 Discovery Miles 1 150
Hacking Exposed Computer Forensics
Aaron Philipp Hardcover R1,591 R1,206 Discovery Miles 12 060
Guide to Network Defense and…
Randy Weaver, Dean Farwood, … Paperback R1,157 R979 Discovery Miles 9 790
Critical Infrastructure Protection VIII…
Jonathan Butts, Sujeet Shenoi Hardcover R2,110 R1,943 Discovery Miles 19 430
IBM i Security Administration and…
Carol Woodbury Paperback R1,725 Discovery Miles 17 250
BTEC Level 3 National IT Student Book 1
Karen Anderson, Alan Jarvis, … Paperback  (1)
R860 Discovery Miles 8 600
Online Security for the Older Generation
Jim Gatenby Paperback R267 R175 Discovery Miles 1 750
Password Book - Logbook to keep track of…
Imaginary Planet Publishing Paperback R156 Discovery Miles 1 560
Cryptography - The Key to Digital…
Keith Martin Hardcover R573 R459 Discovery Miles 4 590