Tous les ebooks Syngress en PDF et EPUB


25  résultat(s)
Télécharger le livre :  How to Cheat at Configuring ISA Server 2004
Ajouter à ma liste d'envies

How to Cheat at Configuring ISA Server 2004


Debra Littlejohn Shinder , Thomas W Shinder


How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...

Parution : 2006-03-16
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Ajouter à ma liste d'envies

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft


Eric Cole , Sandra Ring


The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Parution : 2005-12-15
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Skype Me! From Single User to Small Enterprise and Beyond
Ajouter à ma liste d'envies

Skype Me! From Single User to Small Enterprise and Beyond


Markus Daehne


This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Parution : 2005-12-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Buffer Overflow Attacks
Ajouter à ma liste d'envies

Buffer Overflow Attacks


Jason Deckard


The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by...

Parution : 2005-01-29
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  The Mezonic Agenda: Hacking the Presidency
Ajouter à ma liste d'envies

The Mezonic Agenda: Hacking the Presidency


Herbert Thomson


The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography.The book tells the tale of criminal hackers attempting to compromise the results of...

Parution : 2004-09-23
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
29,49
<< < 12

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés