Tous les ebooks Syngress en PDF et EPUB


152  résultat(s)
Télécharger le livre :  Hacking Wireless Access Points
Ajouter à ma liste d'envies

Hacking Wireless Access Points


Jennifer Kurtz


Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field...

Parution : 2016-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Advanced Persistent Security
Ajouter à ma liste d'envies

Advanced Persistent Security


Araceli Treu Gomes , Ira Winkler


Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...

Parution : 2016-11-30
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Data Hiding Techniques in Windows OS
Ajouter à ma liste d'envies

Data Hiding Techniques in Windows OS


Nihad Ahmad Hassan , Rami Hijazi


- "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of...

Parution : 2016-09-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Cyber Guerilla
Ajouter à ma liste d'envies

Cyber Guerilla


Jelle Van Haaster , Martijn Sprengers , Rickey Gevers


Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla...

Parution : 2016-06-13
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  DNS Security
Ajouter à ma liste d'envies

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Parution : 2016-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Protecting Patient Information
Ajouter à ma liste d'envies

Protecting Patient Information


Paul Cerrato


Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the...

Parution : 2016-04-14
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Digital Forensics
Ajouter à ma liste d'envies

Digital Forensics


John Sammons


Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Parution : 2015-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Securing SQL Server
Ajouter à ma liste d'envies

Securing SQL Server


Denny Cherry


SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In SecuringSQL Server, Third Edition, you will learn about the potential...

Parution : 2015-04-27
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Augmented Reality Law, Privacy, and Ethics
Ajouter à ma liste d'envies

Augmented Reality Law, Privacy, and Ethics


Brian Wassom


Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Securing VoIP
Ajouter à ma liste d'envies

Securing VoIP


Regis J. Jr (Bud) Bates


Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...

Parution : 2014-11-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Designing and Building Security Operations Center
Ajouter à ma liste d'envies

Designing and Building Security Operations Center


David Nathans


Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...

Parution : 2014-11-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Windows Performance Analysis Field Guide
Ajouter à ma liste d'envies

Windows Performance Analysis Field Guide


Clint Huffman


Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Parution : 2014-08-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Ajouter à ma liste d'envies

Cyber Crime and Cyber Terrorism Investigator's Handbook


Babak Akhgar , Francesca Bosco , Andrew Staniforth


Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Parution : 2014-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Social Engineering Penetration Testing
Ajouter à ma liste d'envies

Social Engineering Penetration Testing


Richard Ackroyd , Gavin Watson , Andrew Mason


Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now,Social Engineering Penetration Testing gives you the practical methodology and...

Parution : 2014-04-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Collaboration with Cloud Computing
Ajouter à ma liste d'envies

Collaboration with Cloud Computing


Ric Messier


Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...

Parution : 2014-04-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Applied Network Security Monitoring
Ajouter à ma liste d'envies

Applied Network Security Monitoring


Chris Sanders , Jason Smith


Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...

Parution : 2013-11-26
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Investigating Internet Crimes
Ajouter à ma liste d'envies

Investigating Internet Crimes


Art Bowker , Todd G. Shipley


Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Social Media Security
Ajouter à ma liste d'envies

Social Media Security


Michael Cross


Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...

Parution : 2013-11-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Unified Communications Forensics
Ajouter à ma liste d'envies

Unified Communications Forensics


Nicholas Mr. Grant , Joseph Ii Shaw


Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by...

Parution : 2013-10-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés