Tous les ebooks Syngress en PDF et EPUB


490  résultat(s)
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
Ajouter à ma liste d'envies

How to Cheat at Microsoft Vista Administration


Jan Kanclirz


The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Securing SQL Server 2005
Ajouter à ma liste d'envies

How to Cheat at Securing SQL Server 2005


Mark Horninger


The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at VoIP Security
Ajouter à ma liste d'envies

How to Cheat at VoIP Security


Michael Gough , Thomas Porter Cissp Ccnp Ccda Ccs


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  The Real MCTS/MCITP Exam 70-620 Prep Kit
Ajouter à ma liste d'envies

The Real MCTS/MCITP Exam 70-620 Prep Kit


Anthony Piltzecker


This exam is designed to validate proficieny supporting Windows Vista client.This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  Reverse Engineering Code with IDA Pro
Ajouter à ma liste d'envies

Reverse Engineering Code with IDA Pro


Ioactive


If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
43,41
Télécharger le livre :  How to Cheat at Securing Linux
Ajouter à ma liste d'envies

How to Cheat at Securing Linux


James Stanger


Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  InfoSecurity 2008 Threat Analysis
Ajouter à ma liste d'envies

InfoSecurity 2008 Threat Analysis


Colby Derodeff , Seth Fogie , Michael Gregg , Craig Schiller


An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  OS X Exploits and Defense
Ajouter à ma liste d'envies

OS X Exploits and Defense


Collectif


Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  Managing Catastrophic Loss of Sensitive Data
Ajouter à ma liste d'envies

Managing Catastrophic Loss of Sensitive Data


Constantine Photopoulos


Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  The Real MCTS/MCITP Exam 70-643 Prep Kit
Ajouter à ma liste d'envies

The Real MCTS/MCITP Exam 70-643 Prep Kit


Collectif


This exam is designed to validate Windows Server 2008 applications platform configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  The Real MCTS/MCITP Exam 70-642 Prep Kit
Ajouter à ma liste d'envies

The Real MCTS/MCITP Exam 70-642 Prep Kit


Brien Posey


This exam is designed to validate Windows Server 2008 network infrastructure configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642.This is a test for new certification seekers, not for those who are...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  The Real MCTS/MCITP Exam 70-649 Prep Kit
Ajouter à ma liste d'envies

The Real MCTS/MCITP Exam 70-649 Prep Kit


Brien Posey


This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSEs) AD, Network Infrastructure, and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  The Best Damn Cybercrime and Digital Forensics Book Period
Ajouter à ma liste d'envies

The Best Damn Cybercrime and Digital Forensics Book Period


Anthony Reyes , Jack Wiles


Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
48,71
Télécharger le livre :  The Best Damn Server Virtualization Book Period
Ajouter à ma liste d'envies

The Best Damn Server Virtualization Book Period


Rogier Dittner , David Rule


Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  Web Application Vulnerabilities
Ajouter à ma liste d'envies

Web Application Vulnerabilities


Steven Palmer


In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them,...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
Télécharger le livre :  The Best Damn Firewall Book Period
Ajouter à ma liste d'envies

The Best Damn Firewall Book Period


Thomas W Shinder


The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.Compiled from the best of the Syngress firewall library and authored by product...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
48,71
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
Ajouter à ma liste d'envies

How to Cheat at Deploying and Securing RFID


Paul Sanghera , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Administering Office Communications Server 2007
Ajouter à ma liste d'envies

How to Cheat at Administering Office Communications Server 2007


Anthony Piltzecker


Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Configuring Open Source Security Tools
Ajouter à ma liste d'envies

How to Cheat at Configuring Open Source Security Tools


Collectif


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators
Ajouter à ma liste d'envies

Techno Security's Guide to Managing Risks for IT Managers, Auditors, and Investigators


Collectif


"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,89
<< < 1011121314 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés