Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - Study Guide
    av Joshua (Senior Vice President for Security Technology Feldman
    396,-

  • - Building an Information Security Risk Management Program from the Ground Up
    av Evan (Omgeo Wheeler
    536,-

    Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.

  • - How to Own a Continent
    av Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell, Tom (Glasgow Caledonian University) Craig & Joe (President and CEO of Grand Idea Studio Grand
    780,-

    A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

  • - Keeping Your VoIP Network Safe
    av Regis J. Jr (TC International Consulting (Bud) Bates
    440,-

  • - Building Better Tools
    av Cism, GPEN, GPEN) Andress, m.fl.
    376 - 726,-

  • av Shancang (Senior Lecturer in the cyber security research Unit Li & Li Da (Professor Xu
    636,-

  • - Measuring the Vulnerability to Data Compromises
    av Carl (Managing Director and Chief Security Officer Young
    730,-

  • av Iraj Sadegh Amiri & Mohammad Reza Khalifeh (B.Eng (Electronics) Soltanian
    736,-

  • - Uncovering Covert Communication Methods with Forensic Analysis
    av Brett (Digital Forensics Practitioner Shavers & John (MFCE Bair
    600,-

  • av Henry (Founder Dalziel
    466,-

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. . Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

  • av Henry (Founder Dalziel
    486,-

    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

  • - Scripting and Analysis
    av Jaron (Senior Intrusion Analyst Bradley
    716,-

  • - Real-World Examples of AAA Deployments
    av Andy (Principle Network Security Engineer Richter & Jeremy (Network Engineer Wood
    830,-

    With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

  • - The Primer for Getting Started in Digital Forensics
    av John (Associate Professor and Director of the Digital Forensics and Information Assurance program Sammons
    359,-

    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides you with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. You''ll also learn how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness. The Second Edition also features expanded resources and references, including online resources that keep you current, sample legal documents, and suggested further reading. Learn what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for in an examSecond Edition features all-new coverage of hard drives, triage, network intrusion response, and electronic discovery; as well as updated case studies, expert interviews, and expanded resources and references

  • - Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    av Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    846,-

    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering

  • av Clint (Senior Premier Field Engineer at Microsoft) Huffman
    606,-

    Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems. This field guide gives you the tools and answers you need to improve Microsoft Windows performance, including: Save money on optimizing Windows performance with deep technical troubleshooting that tells you "What would Microsoft do to solve this?" Includes performance counter templates so you can collect the right data the first time.Learn how to solve performance problems using free tools from Microsoft such as the Windows Sysinternals tools and more.In a rush? Chapter 1 Start Here gets you on the quick path to solving the problem.Also covers earlier versions such as Windows 7 and Windows Server 2008 R2.

  • - Building Firewalls for Windows 2000
    av Syngress
    786,-

    Microsoft's flagship ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and Speed. This book provides the system administrators with an understanding of the features of this Internet Server.

  • - Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    av Syngress
    566,-

    Deals with specific e-mail clients, server environments, and anti-virus software. This book places emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. It also shows how to scan content and counter email address forgery attacks.

  • av Syngress
    710,-

    Gives guidance to install and configure Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. It does not cover the Active Directory function of Windows 2000.

  • av Syngress
    710,-

    SQL Server 2000 is one of the key components of .NET. This title addresses the needs of IT professionals migrating from the popular SQL 7 databases to the SQL 2000, as well as those who are starting from scratch. It covers key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000.

  • av Thomas W. (Senior Cyber Security Scientist Edgar
    950,-

    Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.Presents research methods from a cyber security science perspectiveCatalyzes the rigorous research necessary to propel the cyber security field forwardProvides a guided method selection for the type of research being conducted, presented in the context of real-world usage

  • av Zhe-Ming (Professor Lu & Shi-Ze (Professor Guo
    750,-

  • - A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
    av Ira ((CISSP) Winkler & Araceli (Intelligence and Investigations Subject Manager Treu Gomes
    560,-

  • - A Decision-Maker's Guide to Risk, Prevention, and Damage Control
    av Paul (Clinician Cerrato
    560,-

  • - Breaches are Certain, Impact is Not
    av Kevvie (Partner and National Cyber Response Leader for KPMG Canada Fowler
    690,-

  • - Algorithms for OSINT
    av Robert (Research Fellow at the Internet Commerce Security Laboratory Layton
    490,-

    Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.

  • av Henry (Founder Dalziel
    446,-

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.

  • - Open Source Intelligence and Web Reconnaissance Concepts and Techniques
    av Sudhanshu (Security Analyst for iViZ Techno Solutions Chauhan
    686,-

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.