Tous les ebooks Syngress en PDF et EPUB


44  résultat(s)
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Ajouter à ma liste d'envies

How to Cheat at Securing a Wireless Network


Lee Barken , Chris Hurley


Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Parution : 2006-08-22
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,87
Télécharger le livre :  Winternals Defragmentation, Recovery, and Administration Field Guide
Ajouter à ma liste d'envies

Winternals Defragmentation, Recovery, and Administration Field Guide


Dave Kleiman , Laura E Hunter


The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system...

Parution : 2006-06-19
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
37,05
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Ajouter à ma liste d'envies

How to Cheat at Managing Microsoft Operations Manager 2005


Anthony Piltzecker


Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Parution : 2006-03-01
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,87
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Ajouter à ma liste d'envies

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure


Brian Barber , Michael Cross , Hal Kurz , Melissa M. Meyer


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2006-02-08
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Writing Security Tools and Exploits
Ajouter à ma liste d'envies

Writing Security Tools and Exploits


James C Foster


Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Parution : 2006-01-05
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
32,85
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Ajouter à ma liste d'envies

How to Cheat at Designing Security for a Windows Server 2003 Network


Chris Peiris , Chris Ruston


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2005-12-15
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  How to Cheat at Managing Windows Server Update Services
Ajouter à ma liste d'envies

How to Cheat at Managing Windows Server Update Services


B. Barber


Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Parution : 2005-12-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Software Piracy Exposed
Ajouter à ma liste d'envies

Software Piracy Exposed


Ron Honick


This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy...

Parution : 2005-10-07
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Nessus, Snort, and Ethereal Power Tools
Ajouter à ma liste d'envies

Nessus, Snort, and Ethereal Power Tools


Jay Beale , Brian Caswell , Noam Rathaus , Gilbert Ramirez


Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix...

Parution : 2005-09-14
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
35,99
Télécharger le livre :  Stealing the Network: How to Own an Identity
Ajouter à ma liste d'envies

Stealing the Network: How to Own an Identity


Collectif


The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Parution : 2005-08-24
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Network+ Study Guide & Practice Exams
Ajouter à ma liste d'envies

Network+ Study Guide & Practice Exams


Robert Shimonski


The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware,...

Parution : 2005-06-17
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,87
Télécharger le livre :  InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Ajouter à ma liste d'envies

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul


Aaron W Bayles , Ed Brindley , Chris Hurley , Johnny Long


"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Parution : 2005-06-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Ajouter à ma liste d'envies

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives


Eric Cole , Michael Nordfelt , Sandra Ring , Ted Fair


Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

Parution : 2005-03-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Apple I Replica Creation
Ajouter à ma liste d'envies

Apple I Replica Creation


Tom Owad


The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...

Parution : 2005-02-17
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Microsoft Log Parser Toolkit
Ajouter à ma liste d'envies

Microsoft Log Parser Toolkit


Mark Burnett , Gabriele Giuseppini


Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find...

Parution : 2005-02-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Hacking a Terror Network: The Silent Threat of Covert Channels
Ajouter à ma liste d'envies

Hacking a Terror Network: The Silent Threat of Covert Channels


Matthew G Devost , Russ Rogers


Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically...

Parution : 2005-01-27
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Game Console Hacking
Ajouter à ma liste d'envies

Game Console Hacking


Joe Grand , Albert Yarusso


The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base...

Parution : 2004-11-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  Wireless Hacking: Projects for Wi-Fi Enthusiasts
Ajouter à ma liste d'envies

Wireless Hacking: Projects for Wi-Fi Enthusiasts


Lee Barken


Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include...

Parution : 2004-10-29
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
35,99
Télécharger le livre :  CYA Securing IIS 6.0
Ajouter à ma liste d'envies

CYA Securing IIS 6.0


Chris Peiris , Ken Schaefer


A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The...

Parution : 2004-05-23
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
Télécharger le livre :  CYA Securing Exchange Server 2003
Ajouter à ma liste d'envies

CYA Securing Exchange Server 2003


Mark Fugatt , Pattrick Santry , Henrik Walther


A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential...

Parution : 2004-05-21
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,93
<< < 123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés