113 livres(s)
Télécharger le livre :  Advanced Persistent Security
Ajouter à ma liste d'envies

Advanced Persistent Security


Araceli Treu Gomes , Ira Winkler


Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...

Parution : 2016-11-30
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  DNS Security
Ajouter à ma liste d'envies

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Parution : 2016-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Digital Forensics
Ajouter à ma liste d'envies

Digital Forensics


John Sammons


Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Parution : 2015-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Augmented Reality Law, Privacy, and Ethics
Ajouter à ma liste d'envies

Augmented Reality Law, Privacy, and Ethics


Brian Wassom


Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position...

Parution : 2014-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Securing VoIP
Ajouter à ma liste d'envies

Securing VoIP


Regis J. Jr (Bud) Bates


Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...

Parution : 2014-11-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Designing and Building Security Operations Center
Ajouter à ma liste d'envies

Designing and Building Security Operations Center


David Nathans


Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...

Parution : 2014-11-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Windows Performance Analysis Field Guide
Ajouter à ma liste d'envies

Windows Performance Analysis Field Guide


Clint Huffman


Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Parution : 2014-08-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Ajouter à ma liste d'envies

Cyber Crime and Cyber Terrorism Investigator's Handbook


Babak Akhgar , Francesca Bosco , Andrew Staniforth


Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Parution : 2014-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Collaboration with Cloud Computing
Ajouter à ma liste d'envies

Collaboration with Cloud Computing


Ric Messier


Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...

Parution : 2014-04-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Applied Network Security Monitoring
Ajouter à ma liste d'envies

Applied Network Security Monitoring


Chris Sanders , Jason Smith


Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...

Parution : 2013-11-26
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Investigating Internet Crimes
Ajouter à ma liste d'envies

Investigating Internet Crimes


Art Bowker , Todd G. Shipley


Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Social Media Security
Ajouter à ma liste d'envies

Social Media Security


Michael Cross


Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...

Parution : 2013-11-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Unified Communications Forensics
Ajouter à ma liste d'envies

Unified Communications Forensics


Nicholas Mr. Grant , Joseph Ii Shaw


Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by...

Parution : 2013-10-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Security and IT Infrastructure Protection
Ajouter à ma liste d'envies

Cyber Security and IT Infrastructure Protection


John R. Vacca


This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...

Parution : 2013-08-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Managing Information Security
Ajouter à ma liste d'envies

Managing Information Security


John R. Vacca


Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Parution : 2013-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Introduction to Cyber-Warfare
Ajouter à ma liste d'envies

Introduction to Cyber-Warfare


Andrew Ruef , Paulo Shakarian , Jana Shakarian


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...

Parution : 2013-05-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Windows 2012 Server Network Security
Ajouter à ma liste d'envies

Windows 2012 Server Network Security


Derrick Rountree


Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...

Parution : 2013-03-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Logging and Log Management
Ajouter à ma liste d'envies

Logging and Log Management


Chris Phillips , Anton Chuvakin , Kevin Schmidt


Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  The Hacker's Guide to OS X
Ajouter à ma liste d'envies

The Hacker's Guide to OS X


Alijohn Ghassemlouei , Robert Bathurst , Russ Rogers


Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés