Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - Measuring the Vulnerability to Data Compromises
    av Carl (Managing Director and Chief Security Officer Young
    716,-

  • av Iraj Sadegh Amiri & Mohammad Reza Khalifeh (B.Eng (Electronics) Soltanian
    650,-

  • - Uncovering Covert Communication Methods with Forensic Analysis
    av Brett (Digital Forensics Practitioner Shavers & John (MFCE Bair
    576,-

  • av Derrick ((CISSP Rountree
    376,-

    Identity authentication and authorization are integral tasks in the digital world. This book describes technology behind and implementation of federated identity systems. It helps you decide if federated identity is good for your system or web service. It also helps you learn about internet authentication and federated authentication.

  • av Rob (CISSP Kraus
    416,-

    Pinpoints the dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure.

  • - Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
    av Yuri Diogenes
    980,-

    Shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. This book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.

  • - Hiding in Plain Sight Online
    av Peter (Internet-Standard.com Loshin
    466,-

    A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. It features step-by-step instructions for configuring and using anonymous networking software.

  • - An Inside Look at the Economics of Cybercrime
    av Will (Faculty Member of the IANS Institute where he specializes in advanced threat Gragido
    596,-

    Explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. This book takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

  • - Using Hacking Skills to Win the Job Hunt Game
    av Josh (Senior Security Consultant More
    466,-

    There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. This book explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It suggests how to research new possible job opportunities.

  • av Henry (Founder Dalziel
    446,-

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. . Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

  • av Henry (Founder Dalziel
    466,-

    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    av Brett (Digital Forensics Practitioner Shavers
    326,-

    Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. This title teaches you how to place the suspect behind the keyboard using case studies.

  • av Tom (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) St Denis
    756,-

    Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small. Introducing the reader to the concept of bignum algorithms, this book shows how efficient multiple precision algorithms can be implemented.

  • - An Excerpt from Placing The Suspect Behind The Keyboard
    av Brett (Digital Forensics Practitioner Shavers
    326,-

    Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. This title deals with this topic.

  • - Scripting and Analysis
    av Jaron (Senior Intrusion Analyst Bradley
    636,-

  • av Ron Honick
    650,-

    Talks about software piracy - what it is and how it's done. This book describes how software piracy is actually being carried out. It describes how software is actually stolen and traded over the internet. It discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software.

  • av Syngress
    846,-

    Provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. This work shows readers how to use these products to create a secure network with virtual private networking features. It also covers various objectives on Check Point's CCSA exam.

  • av Eric (Independant network security consultant and speaker Cole
    666,-

    Takes readers through the different issues involved in spying on someone online. This book begins with an explanation of reasons and ethics, covers the psychology of spying, and describes computer and network basics. It takes readers step-by-step through many common online activities, and also shows what can be done to compromise them.

  • av Melissa M. Meyer
    666,-

    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95 per cent of all companies running it. This book teaches readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements.

  • - Selection, Protection, Authentication
    av Mark (Independent researcher Burnett
    416,-

    Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.

  • av Lance (Chief Technology Officer of Secure Science Corporation James
    776,-

    Unveils the techniques phishers employ that enable them to commit fraudulent acts against the global financial industry. This work also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. It provides a view from both sides of the playing field, and is useful for the average internet user.

  • av James (Member of CompTIA’s Linux+ Advisory Committee Stanger
    680,-

    Helps you deploy a Linux system on the Internet in a variety of security roles. This book shows you how to use your Linux skills to provide the important security services such as encryption, authentication, access control, and logging. It covers hardening the operating system, implementing an intrusion detection system, and defending databases.

  • - How to Own a Shadow
    av Johnny (Security Researcher Long
    776,-

    Suitable for law enforcement and security professionals.

  • av Khai (Technical Documentation Manager Tran
    880,-

    Provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network.

  • av Craig (CISO for Portland State University and President of Hawkeye Security Training Schiller
    846,-

    Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such as: Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence and Payment Card Industry (PCI).

  • - On AODV Routing Protocol in MANET
    av Iraj Sadegh Amiri
    956,-

  • - Real-World Examples of AAA Deployments
    av Andy (Principle Network Security Engineer Richter
    740,-

    With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

  • - The Primer for Getting Started in Digital Forensics
    av John (Associate Professor and Director of the Digital Forensics and Information Assurance program Sammons
    390,-

    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides you with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. You''ll also learn how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness. The Second Edition also features expanded resources and references, including online resources that keep you current, sample legal documents, and suggested further reading. Learn what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for in an examSecond Edition features all-new coverage of hard drives, triage, network intrusion response, and electronic discovery; as well as updated case studies, expert interviews, and expanded resources and references

  • av David (SC Magazine Nathans
    726,-

  • - Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    av Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    746,-

    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.