136 livres(s)
Télécharger le livre :  Measuring and Managing Information Risk
Ajouter à ma liste d'envies

Measuring and Managing Information Risk


Jack Freund , Jack Jones


Using the factor analysis of information risk (FAIR) methodology developed over ten years and adopted by corporations worldwide, Measuring and Managing Information Risk provides a proven and credible framework for understanding, measuring, and analyzing information risk...

Parution : 2014-08-23
Format(s) : PDF, epub sans DRM
J'achète
41,09
Télécharger le livre :  Windows Performance Analysis Field Guide
Ajouter à ma liste d'envies

Windows Performance Analysis Field Guide


Clint Huffman


Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Parution : 2014-08-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Ajouter à ma liste d'envies

Cyber Crime and Cyber Terrorism Investigator's Handbook


Babak Akhgar , Francesca Bosco , Andrew Staniforth


Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Parution : 2014-07-16
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Collaboration with Cloud Computing
Ajouter à ma liste d'envies

Collaboration with Cloud Computing


Ric Messier


Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...

Parution : 2014-04-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Applied Network Security Monitoring
Ajouter à ma liste d'envies

Applied Network Security Monitoring


Chris Sanders , Jason Smith


Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...

Parution : 2013-11-26
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Investigating Internet Crimes
Ajouter à ma liste d'envies

Investigating Internet Crimes


Art Bowker , Todd G. Shipley


Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Social Media Security
Ajouter à ma liste d'envies

Social Media Security


Michael Cross


Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...

Parution : 2013-11-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Unified Communications Forensics
Ajouter à ma liste d'envies

Unified Communications Forensics


Nicholas Mr. Grant , Joseph Ii Shaw


Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by...

Parution : 2013-10-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Security and IT Infrastructure Protection
Ajouter à ma liste d'envies

Cyber Security and IT Infrastructure Protection


John R. Vacca


This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...

Parution : 2013-08-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Managing Information Security
Ajouter à ma liste d'envies

Managing Information Security


John R. Vacca


Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Parution : 2013-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Introduction to Cyber-Warfare
Ajouter à ma liste d'envies

Introduction to Cyber-Warfare


Andrew Ruef , Paulo Shakarian , Jana Shakarian


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...

Parution : 2013-05-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Windows 2012 Server Network Security
Ajouter à ma liste d'envies

Windows 2012 Server Network Security


Derrick Rountree


Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...

Parution : 2013-03-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Logging and Log Management
Ajouter à ma liste d'envies

Logging and Log Management


Chris Phillips , Anton Chuvakin , Kevin Schmidt


Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  The Hacker's Guide to OS X
Ajouter à ma liste d'envies

The Hacker's Guide to OS X


Alijohn Ghassemlouei , Robert Bathurst , Russ Rogers


Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Violent Python
Ajouter à ma liste d'envies

Violent Python


Tj O'connor


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Client-Side Attacks and Defense
Ajouter à ma liste d'envies

Client-Side Attacks and Defense


Sean-Philip Oriyano , Robert Shimonski


Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...

Parution : 2012-09-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Attacks
Ajouter à ma liste d'envies

Cyber Attacks


Edward Amoroso


Cyber Attacks, Student Edition, offers a technical, architectural, and management approach to solving the problems of protecting national infrastructure. This approach includes controversial themes such as the deliberate use of deception to trap intruders. This volume...

Parution : 2012-03-29
Format(s) : epub sans DRM
J'achète
42,19
Télécharger le livre :  Quantifying the User Experience
Ajouter à ma liste d'envies

Quantifying the User Experience


James R Lewis , Jeff Sauro


Quantifying the User Experience: Practical Statistics for User Research offers a practical guide for using statistics to solve quantitative problems in user research. Many designers and researchers view usability and design as qualitative activities, which do not...

Parution : 2012-03-16
Format(s) : PDF, epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
41,09
Télécharger le livre :  Low Tech Hacking
Ajouter à ma liste d'envies

Low Tech Hacking


Collectif


Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the...

Parution : 2011-12-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Security for Microsoft Windows System Administrators
Ajouter à ma liste d'envies

Security for Microsoft Windows System Administrators


Derrick Rountree


Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is...

Parution : 2011-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés