Tous les ebooks Syngress en PDF et EPUB


490  résultat(s)
Télécharger le livre :  How to Cheat at Configuring Open Source Security Tools
Ajouter à ma liste d'envies

How to Cheat at Configuring Open Source Security Tools


Collectif


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at Configuring Exchange Server 2007
Ajouter à ma liste d'envies

How to Cheat at Configuring Exchange Server 2007


Henrik Walther


The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  How to Cheat at Securing Your Network
Ajouter à ma liste d'envies

How to Cheat at Securing Your Network


Ido Dubrawsky


Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Digital Forensics with Open Source Tools
Ajouter à ma liste d'envies

Digital Forensics with Open Source Tools


Harlan Carvey , Cory Altheide


Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a...

Parution : 2011-03-29
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
43,20
Télécharger le livre :  XBOX 360 Forensics
Ajouter à ma liste d'envies

XBOX 360 Forensics


Steven Bolt


XBOX 360 Forensics is a complete investigation guide for theXBOX game console. Because theXBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to...

Parution : 2011-02-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Web Application Obfuscation
Ajouter à ma liste d'envies

Web Application Obfuscation


Eduardo Alberto Vela Nava , Gareth Heyes , David Lindsay , Mario Heiderich


Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Parution : 2011-01-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cybercrime and Espionage
Ajouter à ma liste d'envies

Cybercrime and Espionage


Will Gragido , John Pirc


Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently...

Parution : 2011-01-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Windows Registry Forensics
Ajouter à ma liste d'envies

Windows Registry Forensics


Harlan Carvey


Windows Registry Forensics provides the background of theWindows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are...

Parution : 2011-01-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  Securing SQL Server
Ajouter à ma liste d'envies

Securing SQL Server


Denny Cherry


Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus...

Parution : 2010-12-27
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Eleventh Hour CISSP
Ajouter à ma liste d'envies

Eleventh Hour CISSP


Eric Conrad , Joshua Feldman , Seth Misenar


Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information...

Parution : 2010-12-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
24,21
Télécharger le livre :  Managed Code Rootkits
Ajouter à ma liste d'envies

Managed Code Rootkits


Erez Metula


Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...

Parution : 2010-11-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Securing the Smart Grid
Ajouter à ma liste d'envies

Securing the Smart Grid


Justin Morehouse , Tony Flick


Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...

Parution : 2010-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Ninja Hacking
Ajouter à ma liste d'envies

Ninja Hacking


Jason Andress , Thomas Wilhelm


Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...

Parution : 2010-11-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Citrix XenDesktop Implementation
Ajouter à ma liste d'envies

Citrix XenDesktop Implementation


Gareth R. James


Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...

Parution : 2010-10-29
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  A Guide to Kernel Exploitation
Ajouter à ma liste d'envies

A Guide to Kernel Exploitation


Enrico Perla , Massimiliano Oldani


A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows....

Parution : 2010-10-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
47,42
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtainCISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a...

Parution : 2010-09-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Practical Lock Picking
Ajouter à ma liste d'envies

Practical Lock Picking


Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...

Parution : 2010-09-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
32,65
Télécharger le livre :  Metrics and Methods for Security Risk Management
Ajouter à ma liste d'envies

Metrics and Methods for Security Risk Management


Carl Young


Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for...

Parution : 2010-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Microsoft Windows Server 2008 R2 Administrator's Reference
Ajouter à ma liste d'envies

Microsoft Windows Server 2008 R2 Administrator's Reference


Dustin Hannifin


Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...

Parution : 2010-08-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
36,87
Télécharger le livre :  Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Ajouter à ma liste d'envies

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition


Brian Baskin , Marcus J. Carey , Kent Nabors , Jayson E Street


Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they...

Parution : 2010-08-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
24,21
<< < 1112131415 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés