338 livres(s)
Télécharger le livre :  Deploying Secure Containers for Training and Development
Ajouter à ma liste d'envies

Deploying Secure Containers for Training and Development


Henry Dalziel , Jon Schipp


In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Parution : 2015-12-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Essential Skills for Hackers
Ajouter à ma liste d'envies

Essential Skills for Hackers


Kevin Cardwell , Henry Dalziel


Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Parution : 2015-12-09
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Parution : 2015-12-08
Format(s) : PDF
Éditeur : Syngress
J'achète
45,53
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Ajouter à ma liste d'envies

Cyber Security Awareness for Corporate Directors and Board Members


Henry Dalziel , David Willson


Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Parution : 2015-12-08
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Ajouter à ma liste d'envies

Security Controls Evaluation, Testing, and Assessment Handbook


Leighton Johnson


Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Parution : 2015-12-07
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
57,19
Télécharger le livre :  Digital Forensics
Ajouter à ma liste d'envies

Digital Forensics


John Sammons


Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Parution : 2015-12-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
38,11
Télécharger le livre :  Breaking into Information Security
Ajouter à ma liste d'envies

Breaking into Information Security


Anthony J. Stieber , Chris Liu , Josh More


Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...

Parution : 2015-12-05
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)
Ajouter à ma liste d'envies

Practical Deployment of Cisco Identity Services Engine (ISE)


Andy Richter , Jeremy Wood


With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
54,01
Télécharger le livre :  Operating System Forensics
Ajouter à ma liste d'envies

Operating System Forensics


Ric Messier


Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
54,01
Télécharger le livre :  Google Hacking for Penetration Testers
Ajouter à ma liste d'envies

Google Hacking for Penetration Testers


Justin Brown , Bill Gardner , Johnny Long


Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...

Parution : 2015-11-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
45,53
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks
Ajouter à ma liste d'envies

Theoretical and Experimental Methods for Defending Against DDoS Attacks


Iraj Sadegh Amiri , Mohammad Reza Khalifeh Soltanian


Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Parution : 2015-11-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
54,01
Télécharger le livre :  A Study of Black Hole Attack Solutions
Ajouter à ma liste d'envies

A Study of Black Hole Attack Solutions


Iraj Sadegh Amiri , Elahe Fazeldehkordi , Oluwatobi Ayodeji Akanbi


Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Parution : 2015-11-03
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
54,01
Télécharger le livre :  Professional Penetration Testing
Ajouter à ma liste d'envies

Professional Penetration Testing


Thomas Wilhelm


Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...

Parution : 2015-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
57,19
Télécharger le livre :  You: For Sale
Ajouter à ma liste d'envies

You: For Sale


Stuart Sumner


Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...

Parution : 2015-08-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Smart Grid Security
Ajouter à ma liste d'envies

Smart Grid Security


Florian Skopik , Paul Dr. Smith


The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...

Parution : 2015-08-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
91,11
Télécharger le livre :  Infosec Management Fundamentals
Ajouter à ma liste d'envies

Infosec Management Fundamentals


Henry Dalziel


Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business...

Parution : 2015-08-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Next Generation Red Teaming
Ajouter à ma liste d'envies

Next Generation Red Teaming


Henry Dalziel


Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....

Parution : 2015-08-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Dissecting the Hack
Ajouter à ma liste d'envies

Dissecting the Hack


Jayson E Street


Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor,Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a...

Parution : 2015-07-20
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
30,69
Télécharger le livre :  Python Passive Network Mapping
Ajouter à ma liste d'envies

Python Passive Network Mapping


Chet Hosmer


Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a...

Parution : 2015-06-10
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
54,01
Télécharger le livre :  The Cloud Security Ecosystem
Ajouter à ma liste d'envies

The Cloud Security Ecosystem


Raymond Choo , Ryan Ko


Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the...

Parution : 2015-06-01
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
91,11
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés