Tous les ebooks Syngress en PDF et EPUB


152  résultat(s)
Télécharger le livre :  Security Risk Management
Ajouter à ma liste d'envies

Security Risk Management


Evan Wheeler


Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Parution : 2011-04-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Developer's Guide to Web Application Security
Ajouter à ma liste d'envies

Developer's Guide to Web Application Security


Michael Cross


Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Perl Scripting for Windows Security
Ajouter à ma liste d'envies

Perl Scripting for Windows Security


Harlan Carvey


I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, andI used a lot of Perl in both books. Okay…I'll come clean…I used nothing but Perl in...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
Ajouter à ma liste d'envies

How to Cheat at Microsoft Vista Administration


Jan Kanclirz


The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Google Hacking for Penetration Testers
Ajouter à ma liste d'envies

Google Hacking for Penetration Testers


Justin Brown , Bill Gardner , Johnny Long


This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Next Generation SSH2 Implementation
Ajouter à ma liste d'envies

Next Generation SSH2 Implementation


Dale Liu


New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
38,11
Télécharger le livre :  How to Cheat at Securing SQL Server 2005
Ajouter à ma liste d'envies

How to Cheat at Securing SQL Server 2005


Mark Horninger


The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Administering Office Communications Server 2007
Ajouter à ma liste d'envies

How to Cheat at Administering Office Communications Server 2007


Anthony Piltzecker


Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Stealing the Network
Ajouter à ma liste d'envies

Stealing the Network


Johnny Long , Ryan Russell , Timothy Mullen


The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  No Tech Hacking
Ajouter à ma liste d'envies

No Tech Hacking


Johnny Long


Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Botnets
Ajouter à ma liste d'envies

Botnets


James R. Binkley , Craig Schiller


The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Securing Your Network
Ajouter à ma liste d'envies

How to Cheat at Securing Your Network


Ido Dubrawsky


Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at VoIP Security
Ajouter à ma liste d'envies

How to Cheat at VoIP Security


Michael Gough , Thomas Porter Cissp Ccnp Ccda Ccs


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Configuring Open Source Security Tools
Ajouter à ma liste d'envies

How to Cheat at Configuring Open Source Security Tools


Collectif


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
Ajouter à ma liste d'envies

How to Cheat at Deploying and Securing RFID


Paul Sanghera , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Dr. Tom Shinder's ISA Server 2006 Migration Guide
Ajouter à ma liste d'envies

Dr. Tom Shinder's ISA Server 2006 Migration Guide


Thomas W Shinder


Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Securing Linux
Ajouter à ma liste d'envies

How to Cheat at Securing Linux


James Stanger


Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  How to Cheat at Configuring VmWare ESX Server
Ajouter à ma liste d'envies

How to Cheat at Configuring VmWare ESX Server


David Rule


A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,35
Télécharger le livre :  Web Application Obfuscation
Ajouter à ma liste d'envies

Web Application Obfuscation


Eduardo Alberto Vela Nava , Gareth Heyes , David Lindsay , Mario Heiderich


Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Parution : 2011-01-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
Télécharger le livre :  Securing SQL Server
Ajouter à ma liste d'envies

Securing SQL Server


Denny Cherry


Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus...

Parution : 2010-12-27
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,29
<< < 12345 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés