Tous les ebooks Syngress en PDF et EPUB


29  résultat(s)
Télécharger le livre :  Eleventh Hour CISSP®
Ajouter à ma liste d'envies

Eleventh Hour CISSP®


Eric Conrad , Joshua Feldman , Seth Misenar


Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
23,16
Télécharger le livre :  The Basics of Cyber Safety
Ajouter à ma liste d'envies

The Basics of Cyber Safety


Michael Cross , John Sammons


The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world.The book's author,...

Parution : 2016-08-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
23,16
Télécharger le livre :  Mobile Data Loss
Ajouter à ma liste d'envies

Mobile Data Loss


Michael T. Raggo


The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss....

Parution : 2015-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
23,16
Télécharger le livre :  PCI DSS 3.1
Ajouter à ma liste d'envies

PCI DSS 3.1


Branden R. Williams


PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes toPCI DSS 3.1,...

Parution : 2015-09-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
23,16
Télécharger le livre :  Detecting and Combating Malicious Email
Ajouter à ma liste d'envies

Detecting and Combating Malicious Email


Julie Jch Ryan , Cade Kamachi


Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...

Parution : 2014-10-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Targeted Cyber Attacks
Ajouter à ma liste d'envies

Targeted Cyber Attacks


Aditya Sood , Richard Enbody


Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...

Parution : 2014-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Digital Privacy
Ajouter à ma liste d'envies

The Basics of Digital Privacy


Denny Cherry


Who's watching you online? These days, it's hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect...

Parution : 2013-11-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Eleventh Hour CISSP
Ajouter à ma liste d'envies

Eleventh Hour CISSP


Eric Conrad , Joshua Feldman , Seth Misenar


Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are...

Parution : 2013-10-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Job Reconnaissance
Ajouter à ma liste d'envies

Job Reconnaissance


Josh More


There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new...

Parution : 2013-09-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Cloud Computing
Ajouter à ma liste d'envies

The Basics of Cloud Computing


Ileana Castrillo , Derrick Rountree


As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use...

Parution : 2013-09-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Practical Anonymity
Ajouter à ma liste d'envies

Practical Anonymity


Peter Loshin


For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...

Parution : 2013-07-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Hacking and Penetration Testing
Ajouter à ma liste d'envies

The Basics of Hacking and Penetration Testing


Patrick Engebretson


The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.The book teaches students how to properly utilize and interpret the results of...

Parution : 2013-06-24
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Web Hacking
Ajouter à ma liste d'envies

The Basics of Web Hacking


Josh Pauli


The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system,...

Parution : 2013-06-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Simple Steps to Data Encryption
Ajouter à ma liste d'envies

Simple Steps to Data Encryption


Peter Loshin


Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be...

Parution : 2013-04-30
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Assessing Vendors
Ajouter à ma liste d'envies

Assessing Vendors


Josh More


Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the...

Parution : 2013-04-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Cyber Warfare
Ajouter à ma liste d'envies

The Basics of Cyber Warfare


Jason Andress , Steve Winterfeld


The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive...

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Digital Forensics
Ajouter à ma liste d'envies

The Basics of Digital Forensics


John Sammons


The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to...

Parution : 2012-04-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Hacking and Penetration Testing
Ajouter à ma liste d'envies

The Basics of Hacking and Penetration Testing


Patrick Engebretson


The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is...

Parution : 2011-07-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Information Security
Ajouter à ma liste d'envies

The Basics of Information Security


Jason Andress


The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and...

Parution : 2011-07-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Zen and the Art of Information Security
Ajouter à ma liste d'envies

Zen and the Art of Information Security


Ira Winkler


While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
26,32
12 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés