Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • av Frank (Owner Thornton
    837

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. This book is suitable for those individuals that use the Linux operating system.

  • av Pawan K ((MCSE Bhardwaj
    677

    Helps system administrators learn more than hundred tips for automating daily system administration tasks using Windows command line scripts.

  • av Stacy (Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab) Prowell
    407

    Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay.

  • av Syngress
    707

    A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.

  • av Brian Wotring
    721

    Talks about the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book cover what you need to know to correctly deploy a centralized host integrity monitoring solution.

  • - Countdown to Darkness
    av Rob Shein
    761

    Contains portrayals of researching, developing, and defending the Internet from a malicious "Zero-Day" attack. This book, about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists, is useful for the security and IT community.

  • av Syngress
    707

    A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.

  • av Syngress
    657

    Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.

  • av Syngress
    887

    Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.

  • av Noam (Co-founder and CTO Rathaus
    911

    Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. This book teaches how fuzzing finds vulnerabilities. It shows how to eliminate buffer overflows and format strings.

  • av Frank (Owner Thornton
    721

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. This title discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.

  • av Tom (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) St Denis
    927

    Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography, this book discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms, the implementation of symmetric ciphers and other codes and finally, portable coding practices.

  • - Auditing the Hacker Mind
    av Marcus Sachs
    761

    The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

  • av Syngress
    707

    TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. This book teaches how to prevent, detect, troubleshoot and correct TCP/IP network problems. It focuses on identifying problem areas, including correcting protocol errors, DNS route problems, application faults and slow response times.

  • - Building Multi Protocol Label Switching Networks
    av Syngress
    871

    Introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. This book discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, and more.

  • av Thomas W. (Senior Cyber Security Scientist Edgar
    951

    Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.Presents research methods from a cyber security science perspectiveCatalyzes the rigorous research necessary to propel the cyber security field forwardProvides a guided method selection for the type of research being conducted, presented in the context of real-world usage

  • - Building Better Tools
    av Cism, GPEN, GPEN) Andress, m.fl.
    377 - 757

  • av Zhe-Ming (Professor Lu
    651

  • - A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
    av Araceli (Intelligence and Investigations Subject Manager Treu Gomes & Ira ((CISSP) Winkler
    491

  • - Cracking, Tracking, and Signal Jacking
    av Jennifer (Information Assurance Affiliate Faculty Kurtz
    741

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology. Explains how the wireless access points in common, everyday devices can expose us to hacks and threatsTeaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend dataPresents concrete examples and real-world guidance on how to protect against wireless access point attacks

  • - A Decision-Maker's Guide to Risk, Prevention, and Damage Control
    av Paul (Clinician Cerrato
    487

  • - The Definitive Guide for Cloud Service Providers
    av Matthew (Chief Information Security Officer and Director of Cyber Security Operations Metheny
    1 081

  • - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems
     
    2 881

  • - A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
    av Ernesto F. (CISSP Rojas
    991

  • - The V3rb0t3n Network
    av Jayson E. (Principle Partner Street
    617

  • - Breaches are Certain, Impact is Not
    av Kevvie (Partner and National Cyber Response Leader for KPMG Canada Fowler
    691

  • - Computer and Mobile Device Safety Made Easy
    av John (Associate Professor and Director of the Digital Forensics and Information Assurance program Sammons
    551

    The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

  • - A Practical Approach to Investigation and Defense
    av Digital Forensics Consultant Hassan & Nihad Ahmad (IT Security
    757

  • - The Standard That Killed SSL
    av Branden R. (CISSP Williams
    457

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.