28 livres(s)
Télécharger le livre :  Google Earth Forensics
Ajouter à ma liste d'envies

Google Earth Forensics


Michael Cross , Michael Harrington


Google Earth Forensics is the first book to explain how to useGoogle Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Introduction to US Cybersecurity Careers
Ajouter à ma liste d'envies

Introduction to US Cybersecurity Careers


Henry Dalziel


Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity...

Parution : 2014-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Defeat Advanced Malware
Ajouter à ma liste d'envies

How to Defeat Advanced Malware


Henry Dalziel


How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages...

Parution : 2014-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Hacking with Kali
Ajouter à ma liste d'envies

Hacking with Kali


Andrew Bindner , James Broad


Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...

Parution : 2013-12-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  The Basics of IT Audit
Ajouter à ma liste d'envies

The Basics of IT Audit


Stephen D. Gantz


The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the...

Parution : 2013-10-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information...

Parution : 2013-10-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Blackhatonomics
Ajouter à ma liste d'envies

Blackhatonomics


Daniel Molina , Will Gragido , Nick Selby , John Pirc


Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a...

Parution : 2011-11-04
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Parution : 2011-07-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Secure Your Network for Free
Ajouter à ma liste d'envies

Secure Your Network for Free


Eric Seagren


This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  How to Cheat at Configuring Exchange Server 2007
Ajouter à ma liste d'envies

How to Cheat at Configuring Exchange Server 2007


Henrik Walther


The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Building Robots with LEGO Mindstorms NXT
Ajouter à ma liste d'envies

Building Robots with LEGO Mindstorms NXT


Guilio Ferrari , Mario Ferrari


The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight,...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Linksys WRT54G Ultimate Hacking
Ajouter à ma liste d'envies

Linksys WRT54G Ultimate Hacking


Paul Asadoorian , Larry Pesce


This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Practical Lock Picking
Ajouter à ma liste d'envies

Practical Lock Picking


Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...

Parution : 2010-09-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
32,65
Télécharger le livre :  Microsoft Windows Server 2008 R2 Administrator's Reference
Ajouter à ma liste d'envies

Microsoft Windows Server 2008 R2 Administrator's Reference


Dustin Hannifin


Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...

Parution : 2010-08-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
36,87
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Ajouter à ma liste d'envies

How to Cheat at Securing a Wireless Network


Lee Barken , Chris Hurley


Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Parution : 2006-08-22
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Ajouter à ma liste d'envies

How to Cheat at Managing Microsoft Operations Manager 2005


Anthony Piltzecker


Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Parution : 2006-03-01
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Ajouter à ma liste d'envies

How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure


Brian Barber , Michael Cross , Hal Kurz , Melissa M. Meyer


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2006-02-08
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Writing Security Tools and Exploits
Ajouter à ma liste d'envies

Writing Security Tools and Exploits


James C Foster


Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Parution : 2006-01-05
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
32,69
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Ajouter à ma liste d'envies

How to Cheat at Designing Security for a Windows Server 2003 Network


Chris Peiris , Chris Ruston


Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Parution : 2005-12-15
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
34,76
12 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés