Tous les ebooks Syngress en PDF et EPUB


152  résultat(s)
Télécharger le livre :  Cyber Security and IT Infrastructure Protection
Ajouter à ma liste d'envies

Cyber Security and IT Infrastructure Protection


John R. Vacca


This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...

Parution : 2013-08-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Managing Information Security
Ajouter à ma liste d'envies

Managing Information Security


John R. Vacca


Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Parution : 2013-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Introduction to Cyber-Warfare
Ajouter à ma liste d'envies

Introduction to Cyber-Warfare


Andrew Ruef , Paulo Shakarian , Jana Shakarian


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...

Parution : 2013-05-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Windows 2012 Server Network Security
Ajouter à ma liste d'envies

Windows 2012 Server Network Security


Derrick Rountree


Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...

Parution : 2013-03-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  The Hacker's Guide to OS X
Ajouter à ma liste d'envies

The Hacker's Guide to OS X


Alijohn Ghassemlouei , Robert Bathurst , Russ Rogers


Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Wireless Reconnaissance in Penetration Testing
Ajouter à ma liste d'envies

Wireless Reconnaissance in Penetration Testing


Alex Hamerstone , Chris Sanyk , Matthew Neely


In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Data Hiding
Ajouter à ma liste d'envies

Data Hiding


Chet Hosmer , Michael T. Raggo


As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Logging and Log Management
Ajouter à ma liste d'envies

Logging and Log Management


Chris Phillips , Anton Chuvakin , Kevin Schmidt


Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Augmented Reality
Ajouter à ma liste d'envies

Augmented Reality


Greg Kipper , Joseph Rampolla


With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Violent Python
Ajouter à ma liste d'envies

Violent Python


Tj O'connor


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Client-Side Attacks and Defense
Ajouter à ma liste d'envies

Client-Side Attacks and Defense


Sean-Philip Oriyano , Robert Shimonski


Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...

Parution : 2012-09-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Securing SQL Server
Ajouter à ma liste d'envies

Securing SQL Server


Denny Cherry


SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In SecuringSQL Server, 2e, readers learn about the potential attack vectors...

Parution : 2012-07-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Low Tech Hacking
Ajouter à ma liste d'envies

Low Tech Hacking


Collectif


Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the...

Parution : 2011-12-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Migrating to the Cloud
Ajouter à ma liste d'envies

Migrating to the Cloud


Prakash Nauduri , Tom Laszewski


Migrating to the Cloud: Oracle Client/Server Modernization is a reference guide for migrating client/server applications to the Oracle cloud. Organized into 14 chapters, the book offers tips on planning, determining effort and budget, designing the Oracle cloud...

Parution : 2011-11-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Security for Microsoft Windows System Administrators
Ajouter à ma liste d'envies

Security for Microsoft Windows System Administrators


Derrick Rountree


Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is...

Parution : 2011-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Industrial Network Security
Ajouter à ma liste d'envies

Industrial Network Security


Joel Thomas Langill , Eric D. Knapp


Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and OtherIndustrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of...

Parution : 2011-09-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Practical Oracle Security
Ajouter à ma liste d'envies

Practical Oracle Security


Aaron Ingram , Josh Shaul


This is the only practical, hands-on guide available to database administrators to secure their Oracle databases.This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable...

Parution : 2011-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Integrating ISA Server 2006 with Microsoft Exchange 2007
Ajouter à ma liste d'envies

Integrating ISA Server 2006 with Microsoft Exchange 2007


Fergus Strachan


This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange...

Parution : 2011-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Ajouter à ma liste d'envies

Penetration Tester's Open Source Toolkit


Jeremy Faircloth


Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Parution : 2011-08-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Securing the Cloud
Ajouter à ma liste d'envies

Securing the Cloud


Vic (J.R.) Winkler


Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The...

Parution : 2011-04-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
40,23
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés