Tous les ebooks Syngress en PDF et EPUB


227  résultat(s)
Télécharger le livre :  Introduction to Social Media Investigation
Ajouter à ma liste d'envies

Introduction to Social Media Investigation


Jennifer Golbeck


If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds...

Parution : 2015-03-14
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  HCISPP Study Guide
Ajouter à ma liste d'envies

HCISPP Study Guide


Justin Rainey , Timothy Virtue


The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC².The new HCISPP certification, focused on health care information security and privacy, is similar to...

Parution : 2014-12-11
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Industrial Network Security
Ajouter à ma liste d'envies

Industrial Network Security


Joel Thomas Langill , Eric D. Knapp


As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Building an Intelligence-Led Security Program
Ajouter à ma liste d'envies

Building an Intelligence-Led Security Program


Allan Liska


As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no...

Parution : 2014-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  A Machine-Learning Approach to Phishing Detection and Defense
Ajouter à ma liste d'envies

A Machine-Learning Approach to Phishing Detection and Defense


Iraj Sadegh Amiri , E. Fazeldehkordi , O.A. Akanbi


Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A...

Parution : 2014-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Optimizing IEEE 802.11i Resource and Security Essentials
Ajouter à ma liste d'envies

Optimizing IEEE 802.11i Resource and Security Essentials


Iraj Sadegh Amiri , Iman Saberi , Parisa Naraei


In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for...

Parution : 2014-12-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Information Security Analytics
Ajouter à ma liste d'envies

Information Security Analytics


Inez Miyamoto , Mark Talabis , Jason Martin , Robert Mcpherson


Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis...

Parution : 2014-11-25
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  PCI Compliance
Ajouter à ma liste d'envies

PCI Compliance


Anton Chuvakin , Branden R. Williams


Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has...

Parution : 2014-11-07
Format(s) : PDF
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Cyber Reconnaissance, Surveillance and Defense
Ajouter à ma liste d'envies

Cyber Reconnaissance, Surveillance and Defense


Robert Shimonski


At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being...

Parution : 2014-10-17
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  CSA Guide to Cloud Computing
Ajouter à ma liste d'envies

CSA Guide to Cloud Computing


Brian Honan , Jim Reavis , Raj Samani


CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years theCSA has been at the forefront of research...

Parution : 2014-09-22
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Hacking and Penetration Testing with Low Power Devices
Ajouter à ma liste d'envies

Hacking and Penetration Testing with Low Power Devices


Philip Polstra


Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...

Parution : 2014-09-02
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Information Hiding in Speech Signals for Secure Communication
Ajouter à ma liste d'envies

Information Hiding in Speech Signals for Secure Communication


Zhijun Wu


In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...

Parution : 2014-08-27
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Building an Information Security Awareness Program
Ajouter à ma liste d'envies

Building an Information Security Awareness Program


Bill Gardner , Valerie Thomas


The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...

Parution : 2014-08-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Python Forensics
Ajouter à ma liste d'envies

Python Forensics


Chet Hosmer


Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novicePython programmers to...

Parution : 2014-05-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  Windows Forensic Analysis Toolkit
Ajouter à ma liste d'envies

Windows Forensic Analysis Toolkit


Harlan Carvey


Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...

Parution : 2014-03-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Malware Forensics Field Guide for Linux Systems
Ajouter à ma liste d'envies

Malware Forensics Field Guide for Linux Systems


James M. Aquilina , Eoghan Casey , Cameron H. Malin


Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...

Parution : 2013-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Identity and Access Management
Ajouter à ma liste d'envies

Identity and Access Management


Ertem Osmanoglu


Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide...

Parution : 2013-11-19
Format(s) : ePub, PDF sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Cloud Storage Forensics
Ajouter à ma liste d'envies

Cloud Storage Forensics


Ben Martini , Raymond Choo , Darren Quick


To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in...

Parution : 2013-11-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  Introduction to Information Security
Ajouter à ma liste d'envies

Introduction to Information Security


Jonathan Spring , Timothy Shimeall


Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,35
Télécharger le livre :  Computer Incident Response and Forensics Team Management
Ajouter à ma liste d'envies

Computer Incident Response and Forensics Team Management


Leighton Johnson


Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need...

Parution : 2013-11-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
<< < 12345 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés