327 livres(s)
Télécharger le livre :  Identity and Access Management
Ajouter à ma liste d'envies

Identity and Access Management


Ertem Osmanoglu


Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide...

Parution : 2013-11-19
Format(s) : ePub, PDF sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Cloud Storage Forensics
Ajouter à ma liste d'envies

Cloud Storage Forensics


Ben Martini , Raymond Choo , Darren Quick


To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in...

Parution : 2013-11-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  Introduction to Information Security
Ajouter à ma liste d'envies

Introduction to Information Security


Jonathan Spring , Timothy Shimeall


Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,35
Télécharger le livre :  Investigating Internet Crimes
Ajouter à ma liste d'envies

Investigating Internet Crimes


Art Bowker , Todd G. Shipley


Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for...

Parution : 2013-11-12
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Computer Incident Response and Forensics Team Management
Ajouter à ma liste d'envies

Computer Incident Response and Forensics Team Management


Leighton Johnson


Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need...

Parution : 2013-11-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Social Media Security
Ajouter à ma liste d'envies

Social Media Security


Michael Cross


Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people's lives and is now...

Parution : 2013-11-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  The Basics of IT Audit
Ajouter à ma liste d'envies

The Basics of IT Audit


Stephen D. Gantz


The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the...

Parution : 2013-10-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  Unified Communications Forensics
Ajouter à ma liste d'envies

Unified Communications Forensics


Nicholas Mr. Grant , Joseph Ii Shaw


Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by...

Parution : 2013-10-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare, Second Edition, takes a comprehensive look at how and why digital warfare is waged. The book explores the participants, battlefields, and the tools and techniques used in today's digital conflicts. The concepts discussed gives students of information...

Parution : 2013-10-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Job Reconnaissance
Ajouter à ma liste d'envies

Job Reconnaissance


Josh More


There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new...

Parution : 2013-09-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Cloud Computing
Ajouter à ma liste d'envies

The Basics of Cloud Computing


Ileana Castrillo , Derrick Rountree


As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use...

Parution : 2013-09-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Digital Forensics Processing and Procedures
Ajouter à ma liste d'envies

Digital Forensics Processing and Procedures


Andrew Jones , David Lilburn Watson


This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody.This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written...

Parution : 2013-08-30
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Network and System Security
Ajouter à ma liste d'envies

Network and System Security


John R. Vacca


Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and...

Parution : 2013-08-26
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
50,59
Télécharger le livre :  Cyber Security and IT Infrastructure Protection
Ajouter à ma liste d'envies

Cyber Security and IT Infrastructure Protection


John R. Vacca


This book serves as a security practitioner's guide to today's most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It...

Parution : 2013-08-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Managing Information Security
Ajouter à ma liste d'envies

Managing Information Security


John R. Vacca


Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Parution : 2013-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  FISMA Compliance Handbook
Ajouter à ma liste d'envies

FISMA Compliance Handbook


Laura P. Taylor


This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of...

Parution : 2013-08-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  X-Ways Forensics Practitioner's Guide
Ajouter à ma liste d'envies

X-Ways Forensics Practitioner's Guide


Eric Zimmerman , Brett Shavers


The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners...

Parution : 2013-08-10
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Practical Anonymity
Ajouter à ma liste d'envies

Practical Anonymity


Peter Loshin


For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...

Parution : 2013-07-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Risk Management Framework
Ajouter à ma liste d'envies

Risk Management Framework


James Broad


The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be...

Parution : 2013-07-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Professional Penetration Testing
Ajouter à ma liste d'envies

Professional Penetration Testing


Thomas Wilhelm


Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of...

Parution : 2013-06-27
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
63,25
<< < 23456 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés