Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - Study Guide
    av Joshua (Senior Vice President for Security Technology Feldman
    380,-

  • - Building an Information Security Risk Management Program from the Ground Up
    av Evan (Omgeo Wheeler
    546,-

    Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.

  • - How to Own a Continent
    av Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell
    796,-

    A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

  • - Mastering FortiOS
    av Kenneth (Senior Security Engineer at Fortinet Tam
    796,-

    Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.

  • av Denny ((MCSA Cherry
    470,-

  • av Ric (GSEC Messier
    730,-

  • av Derrick ((CISSP Rountree
    730,-

  • av Stephen D. (CISSP-ISSAP Gantz & Daniel R. (Daniel Philpott Philpott
    980,-

  • av Josh (Senior Security Consultant More
    470,-

    Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This title shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, or making decisions too quickly.

  • av Gareth R. (Citrix Consultant for Citrix Gold and Platinum Partners. Microsoft and Citrix trainer.) James
    746,-

    Guides you through the tasks of implementing XenDesktop for your company. This book addresses how to implement a Virtual Desktop Infrastructure (VDI) solution using Citrix XenDesktop. It includes technical details required for you to evaluate how Citrix XenDesktop would integrate into your existing environment.

  • av Stephen Pearson
    896,-

    Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. This book presents the tools, training, and techniques from this practice. It outlines pre- and post-blast investigations.

  • av James C (Deputy Director of Global Security Development for Computer Sciences Foster
    800,-

    Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in C/C++, Java, Perl and NASL; Sockets - the technology that allows programs and scripts to communicate over a network is sockets; and, Shellcode which is commonly defined as bytecode converted from Assembly.

  • - An Excerpt from Malware Forensic Field Guide for Linux Systems
    av Eoghan (Eoghan Casey Casey
    326,-

    Includes companions for any digital and computer forensic investigator and analyst. This title is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. It addresses malware artifact discovery and extraction from a live Linux system.

  • av Mark (Cheif Information Security Officer at Interoute) Osborne
    656,-

    Managers responsible for IT/Security departments from mall office environments up to enterprise networks need to have an understanding of all IT security issues to effectively manage their departments. This book covers the basic concepts and practices of security, and provides basic information about the technical details of many of the products.

  • - Leveraging Social Networking While Mitigating Risk
    av Michael (Hospital for Special Surgery) Cross
    746,-

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. This book acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.

  • av O.A. (Graduate student in Computer Science at Texas Tech University) Akanbi
    960,-

  •  
    730,-

    Offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.

  • - A Practical Guide to Secure Computing
    av Peter (Internet-Standard.com Loshin
    470,-

    Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.

  • - Exploiting OS X from the Root Up
    av Alijohn (Cyber Security Specialist and Certified Ethical Hacker) Ghassemlouei
    726,-

    A guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. It discusses the basics of the OS X environment and its vulnerabilities. It also includes useful tips and strategies for exploiting and compromising OS X systems.

  • av Julie JCH (Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University) Ryan
    470,-

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for personal and enterprise email environments.

  • - Methodologies, Tools, and Techniques for Incident Analysis and Response
    av Joe (Joe Fichera is a Certified Computer Examiner (CCE) and member of the ISFCE. He also holds EnCE Fichera
    726,-

    Provides information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. This title focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns.

  • - How to Own the Box
    av Syngress
    786,-

    Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

  • - Understanding the Danger and How to Protect Your Organization
    av Eric (Independant network security consultant and speaker Cole
    730,-

    Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; and critical information on how to respond and recover from an intrusion.

  • - Keeping Your VoIP Network Safe
    av Regis J. Jr (TC International Consulting (Bud) Bates
    726,-

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

  • - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
    av Johnny (Security Researcher Long
    730,-

    In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, the authors get paid to uncover weaknesses in those systems and exploit them. This book reveals those secrets.

  • - A Digital Forensic Investigator's Guide to Virtual Environments
    av Greg (Futurist and Strategic Forecaster in Emerging Technologies) Kipper
    896,-

    Virtualization creates new and difficult challenges for forensic investigations. This book offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. It also explains the process of virtualization and the different types of virtualized environments.

  • - Cross Site Scripting Exploits and Defense
    av Seth (Vice President Fogie
    880,-

    Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to sensitive data theft and monetary losses.

  • av Eric (Eric Seagren Seagren
    670,-

    Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available software.

  • av Shancang (Senior Lecturer in the cyber security research Unit Li
    636,-

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.