327 livres(s)
Télécharger le livre :  Research Methods for Cyber Security
Ajouter à ma liste d'envies

Research Methods for Cyber Security


David O. Manz , Thomas W. Edgar


Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question,...

Parution : 2017-04-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
87,51
Télécharger le livre :  Federal Cloud Computing
Ajouter à ma liste d'envies

Federal Cloud Computing


Matthew Metheny


Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards,...

Parution : 2017-01-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Advanced Persistent Security
Ajouter à ma liste d'envies

Advanced Persistent Security


Araceli Treu Gomes , Ira Winkler


Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...

Parution : 2016-11-30
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Contemporary Digital Forensic Investigations of Cloud and Mobile Applications
Ajouter à ma liste d'envies

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications


Kim-Kwang Raymond Choo , Ali Dehghantanha


Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and...

Parution : 2016-10-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
75,91
Télécharger le livre :  Building a Practical Information Security Program
Ajouter à ma liste d'envies

Building a Practical Information Security Program


Jason Andress , Mark Leary


Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate...

Parution : 2016-10-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Handbook of System Safety and Security
Ajouter à ma liste d'envies

Handbook of System Safety and Security


Edward Griffor


Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of...

Parution : 2016-10-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
150,86
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Ajouter à ma liste d'envies

Penetration Tester's Open Source Toolkit


Jeremy Faircloth


Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This...

Parution : 2016-09-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Mobile Security and Privacy
Ajouter à ma liste d'envies

Mobile Security and Privacy


Raymond Choo , Man Ho Au


Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security.Mobile devices and apps have...

Parution : 2016-09-14
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
75,91
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...

Parution : 2016-09-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Audio Content Security
Ajouter à ma liste d'envies

Audio Content Security


Iraj Sadegh Amiri , Sogand Ghorbani


Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...

Parution : 2016-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  DNS Security
Ajouter à ma liste d'envies

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Parution : 2016-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Data Breach Preparation and Response
Ajouter à ma liste d'envies

Data Breach Preparation and Response


Kevvie Fowler


Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...

Parution : 2016-06-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
53,75
Télécharger le livre :  Threat Forecasting
Ajouter à ma liste d'envies

Threat Forecasting


David Desanto , Will Gragido , Iain Davison , John Pirc


Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...

Parution : 2016-05-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  OS X Incident Response
Ajouter à ma liste d'envies

OS X Incident Response


Jaron Bradley


OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Parution : 2016-05-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Network Performance and Security
Ajouter à ma liste d'envies

Network Performance and Security


Chris Chapman


Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Parution : 2016-03-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Deploying Secure Containers for Training and Development
Ajouter à ma liste d'envies

Deploying Secure Containers for Training and Development


Henry Dalziel , Jon Schipp


In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Parution : 2015-12-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Essential Skills for Hackers
Ajouter à ma liste d'envies

Essential Skills for Hackers


Kevin Cardwell , Henry Dalziel


Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Parution : 2015-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Parution : 2015-12-08
Format(s) : PDF
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Ajouter à ma liste d'envies

Cyber Security Awareness for Corporate Directors and Board Members


Henry Dalziel , David Willson


Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Parution : 2015-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,54
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Ajouter à ma liste d'envies

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Parution : 2015-12-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
56,92
123 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés