Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - Threatscape and Best Practices
     
    741

    Expert analysis of threatscape and attack vectors.

  • av Henry (Founder Dalziel
    581

  • av Henry (Founder Dalziel
    581

  • av Henry (Founder Dalziel
    537

  • - Algorithms for OSINT
    av Robert (Research Fellow at the Internet Commerce Security Laboratory Layton
    461

    Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.

  • av Kevin Cardwell
    617

  • av Henry (Founder Dalziel
    581

  • av Henry (Founder Dalziel
    581

  • av Henry (Founder Dalziel
    411

    In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.

  • - Innovative Solutions for a Modernized Grid
    av Florian Skopik
    1 561

  • - Technical, Legal, Business and Management Issues
    av Raymond (Fulbright Scholar and Senior Lecturer Choo
    1 667

  • - Threats and Countermeasures
    av Michael T. (CISSP Raggo
    457

  • - Open Source Intelligence and Web Reconnaissance Concepts and Techniques
    av Sudhanshu (Security Analyst for iViZ Techno Solutions Chauhan
    597

    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals seeking to find the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment, i.e. Reconnaissance, is not given enough attention by security professionals, hackers and penetration testers. Often, the information present openly is as critical as the confidential data. Hacking Web Intelligence dives deep into the technical aspects of information gathering and assembling it for actionable intelligence. . Hacking Web Intelligence shows you how to dig into the web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. . Hacking Web Intelligence provides an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization and much more.

  • - From Reactive to Proactive Process
    av Jason (CISSP-ISSAP Sachowski
    937

  • - Testing and Analyzing Using Open Source and Low-Cost Tools
    av Chris (Senior Methodologist for Spirent Communications) Chapman
    617

  • av Jeremy ((Security+ Faircloth
    937

  • - Defending the Domain Name System
    av Allan (Allan Liska Liska
    507

  • - Advanced Digital Forensic Analysis of the Windows Registry
    av Harlan (DFIR analyst Carvey
    721

  • av Bill (Bill Gardner OSCP Gardner
    621

  • - Leveraging Big Data for Predictive Analysis
    av John (Director Pirc
    707

  • - Protecting Your Database from Attackers
    av Denny ((MCSA Cherry
    757

  • - New Tools for Protection and Forensics
    av Henry (Founder Dalziel
    417

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensicsis the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • - For Mobile and Stationary Devices
    av Iraj Sadegh Amiri
    937

  • - Crafting a Custom Career Path to Get the Job You Really Want
    av Josh (Senior Security Consultant More
    421

    Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren't always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.