113 livres(s)
Télécharger le livre :  Violent Python
Ajouter à ma liste d'envies

Violent Python


Tj O'connor


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Client-Side Attacks and Defense
Ajouter à ma liste d'envies

Client-Side Attacks and Defense


Sean-Philip Oriyano , Robert Shimonski


Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...

Parution : 2012-09-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Low Tech Hacking
Ajouter à ma liste d'envies

Low Tech Hacking


Collectif


Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the...

Parution : 2011-12-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Security for Microsoft Windows System Administrators
Ajouter à ma liste d'envies

Security for Microsoft Windows System Administrators


Derrick Rountree


Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is...

Parution : 2011-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Integrating ISA Server 2006 with Microsoft Exchange 2007
Ajouter à ma liste d'envies

Integrating ISA Server 2006 with Microsoft Exchange 2007


Fergus Strachan


This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange...

Parution : 2011-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Ajouter à ma liste d'envies

Penetration Tester's Open Source Toolkit


Jeremy Faircloth


Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Parution : 2011-08-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Security Risk Management
Ajouter à ma liste d'envies

Security Risk Management


Evan Wheeler


Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Parution : 2011-04-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
Ajouter à ma liste d'envies

How to Cheat at Microsoft Vista Administration


Jan Kanclirz


The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at Securing SQL Server 2005
Ajouter à ma liste d'envies

How to Cheat at Securing SQL Server 2005


Mark Horninger


The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at VoIP Security
Ajouter à ma liste d'envies

How to Cheat at VoIP Security


Michael Gough , Thomas Porter Cissp Ccnp Ccda Ccs


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at Configuring VmWare ESX Server
Ajouter à ma liste d'envies

How to Cheat at Configuring VmWare ESX Server


David Rule


A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Next Generation SSH2 Implementation
Ajouter à ma liste d'envies

Next Generation SSH2 Implementation


Dale Liu


New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Stealing the Network
Ajouter à ma liste d'envies

Stealing the Network


Johnny Long , Ryan Russell , Timothy Mullen


The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Developer's Guide to Web Application Security
Ajouter à ma liste d'envies

Developer's Guide to Web Application Security


Michael Cross


Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Dr. Tom Shinder's ISA Server 2006 Migration Guide
Ajouter à ma liste d'envies

Dr. Tom Shinder's ISA Server 2006 Migration Guide


Thomas W Shinder


Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at Securing Your Network
Ajouter à ma liste d'envies

How to Cheat at Securing Your Network


Ido Dubrawsky


Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Perl Scripting for Windows Security
Ajouter à ma liste d'envies

Perl Scripting for Windows Security


Harlan Carvey


I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, andI used a lot of Perl in both books. Okay…I'll come clean…I used nothing but Perl in...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Google Hacking for Penetration Testers
Ajouter à ma liste d'envies

Google Hacking for Penetration Testers


Justin Brown , Bill Gardner , Johnny Long


This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Botnets
Ajouter à ma liste d'envies

Botnets


James R. Binkley , Craig Schiller


The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at Configuring Open Source Security Tools
Ajouter à ma liste d'envies

How to Cheat at Configuring Open Source Security Tools


Collectif


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
<< < 1234 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés