Tous les ebooks Syngress en PDF et EPUB


227  résultat(s)
Télécharger le livre :  OS X Incident Response
Ajouter à ma liste d'envies

OS X Incident Response


Jaron Bradley


OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Parution : 2016-05-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Hiding Behind the Keyboard
Ajouter à ma liste d'envies

Hiding Behind the Keyboard


John Bair , Brett Shavers


Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use...

Parution : 2016-03-14
Format(s) : PDF, ePub
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Network Performance and Security
Ajouter à ma liste d'envies

Network Performance and Security


Chris Chapman


Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Parution : 2016-03-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Windows Registry Forensics
Ajouter à ma liste d'envies

Windows Registry Forensics


Harlan Carvey


Windows Registry Forensics: Advanced Digital Forensic Analysis of theWindows Registry, Second Edition, provides the most in-depth guide to forensic investigations involvingWindows Registry. This book is one-of-a-kind, giving the background of the Registry to help users...

Parution : 2016-03-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Implementing Digital Forensic Readiness
Ajouter à ma liste d'envies

Implementing Digital Forensic Readiness


Jason Sachowski


Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization....

Parution : 2016-02-29
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Preserving Electronic Evidence for Trial
Ajouter à ma liste d'envies

Preserving Electronic Evidence for Trial


Ann D. Zeigler , Ernesto F. Rojas


The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and...

Parution : 2016-02-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Parution : 2015-12-08
Format(s) : PDF
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Ajouter à ma liste d'envies

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Parution : 2015-12-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Automating Open Source Intelligence
Ajouter à ma liste d'envies

Automating Open Source Intelligence


Robert Layton , Paul A Watters


Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As...

Parution : 2015-12-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)
Ajouter à ma liste d'envies

Practical Deployment of Cisco Identity Services Engine (ISE)


Andy Richter , Jeremy Wood


With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Operating System Forensics
Ajouter à ma liste d'envies

Operating System Forensics


Ric Messier


Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Google Hacking for Penetration Testers
Ajouter à ma liste d'envies

Google Hacking for Penetration Testers


Justin Brown , Bill Gardner , Johnny Long


Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks
Ajouter à ma liste d'envies

Theoretical and Experimental Methods for Defending Against DDoS Attacks


Iraj Sadegh Amiri , Mohammad Reza Khalifeh Soltanian


Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Parution : 2015-11-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  A Study of Black Hole Attack Solutions
Ajouter à ma liste d'envies

A Study of Black Hole Attack Solutions


Iraj Sadegh Amiri , Elahe Fazeldehkordi , Oluwatobi Ayodeji Akanbi


Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Parution : 2015-11-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Thor's OS Xodus
Ajouter à ma liste d'envies

Thor's OS Xodus


Timothy "Thor" Mullen


Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X...

Parution : 2015-10-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Professional Penetration Testing
Ajouter à ma liste d'envies

Professional Penetration Testing


Thomas Wilhelm


Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...

Parution : 2015-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Smart Grid Security
Ajouter à ma liste d'envies

Smart Grid Security


Florian Skopik , Paul Dr. Smith


The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...

Parution : 2015-08-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
90,68
Télécharger le livre :  Python Passive Network Mapping
Ajouter à ma liste d'envies

Python Passive Network Mapping


Chet Hosmer


Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a...

Parution : 2015-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  The Cloud Security Ecosystem
Ajouter à ma liste d'envies

The Cloud Security Ecosystem


Raymond Choo , Ryan Ko


Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the...

Parution : 2015-06-01
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
90,68
Télécharger le livre :  Hacking Web Intelligence
Ajouter à ma liste d'envies

Hacking Web Intelligence


Sudhanshu Chauhan , Nutan Kumar Panda


Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is,...

Parution : 2015-04-13
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés