136 livres(s)
Télécharger le livre :  How to Cheat at Securing Linux
Ajouter à ma liste d'envies

How to Cheat at Securing Linux


James Stanger


Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Web Application Obfuscation
Ajouter à ma liste d'envies

Web Application Obfuscation


Eduardo Alberto Vela Nava , Gareth Heyes , David Lindsay , Mario Heiderich


Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Parution : 2011-01-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Managed Code Rootkits
Ajouter à ma liste d'envies

Managed Code Rootkits


Erez Metula


Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...

Parution : 2010-11-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Securing the Smart Grid
Ajouter à ma liste d'envies

Securing the Smart Grid


Justin Morehouse , Tony Flick


Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...

Parution : 2010-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Ninja Hacking
Ajouter à ma liste d'envies

Ninja Hacking


Jason Andress , Thomas Wilhelm


Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...

Parution : 2010-11-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Citrix XenDesktop Implementation
Ajouter à ma liste d'envies

Citrix XenDesktop Implementation


Gareth R. James


Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...

Parution : 2010-10-29
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Metrics and Methods for Security Risk Management
Ajouter à ma liste d'envies

Metrics and Methods for Security Risk Management


Carl Young


Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for...

Parution : 2010-08-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Managing Information Security
Ajouter à ma liste d'envies

Managing Information Security


John R. Vacca


Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Parution : 2010-03-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  PCI Compliance
Ajouter à ma liste d'envies

PCI Compliance


Anton Chuvakin , Branden R. Williams


PCI Compliance: Understand and Implement EffectivePCI Data Security Standard Compliance, Second Edition, discusses not only how to applyPCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security...

Parution : 2009-11-13
Format(s) : ePub, PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Handbook of Digital Forensics and Investigation
Ajouter à ma liste d'envies

Handbook of Digital Forensics and Investigation


Eoghan Casey


Handbook of Digital Forensics and Investigation builds on the success of theHandbook of Computer Crime Investigation, bringing together renowned experts in all areas of digital forensics and investigation to provide the consummate resource for practitioners in the...

Parution : 2009-10-07
Format(s) : epub sans DRM
Éditeur : Academic Press
J'achète
42,15
Télécharger le livre :  User Experience Re-Mastered
Ajouter à ma liste d'envies

User Experience Re-Mastered


Chauncey Wilson


User Experience Re-Mastered: Your Guide to Getting the Right Design provides an understanding of key design and development processes aimed at enhancing the user experience of websites and web applications. The book is organized into four parts. Part 1 deals with the...

Parution : 2009-09-11
Format(s) : epub sans DRM
Éditeur : Morgan Kaufmann
J'achète
42,15
Télécharger le livre :  Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Ajouter à ma liste d'envies

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit


Dale Liu


Three exams, two certifications, one complete Cisco training solution for networking professionals!The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material...

Parution : 2009-06-30
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
40,04
Télécharger le livre :  Cisco Router and Switch Forensics
Ajouter à ma liste d'envies

Cisco Router and Switch Forensics


Dale Liu


Cisco IOS (the software that runs the vast majority ofCisco routers and allCisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable...

Parution : 2009-06-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
40,04
Télécharger le livre :  SQL Injection Attacks and Defense
Ajouter à ma liste d'envies

SQL Injection Attacks and Defense


Justin Clarke-Salt


Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the...

Parution : 2009-05-05
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
40,04
Télécharger le livre :  Security in a Web 2.0+ World
Ajouter à ma liste d'envies

Security in a Web 2.0+ World


Carlos Curtis Solari


Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...

Parution : 2009-04-08
Format(s) : PDF
Éditeur : Wiley
J'achète
39,56
Télécharger le livre :  Nagios 3 Enterprise Network Monitoring
Ajouter à ma liste d'envies

Nagios 3 Enterprise Network Monitoring


Collectif


The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you....

Parution : 2008-07-04
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at IIS 7 Server Administration
Ajouter à ma liste d'envies

How to Cheat at IIS 7 Server Administration


Chris Adams , Brian Frederick , Pattrick Santry


According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new...

Parution : 2007-06-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Snort Intrusion Detection and Prevention Toolkit
Ajouter à ma liste d'envies

Snort Intrusion Detection and Prevention Toolkit


Andrew Baker , Jay Beale , Brian Caswell


This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend...

Parution : 2007-04-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  CD and DVD Forensics
Ajouter à ma liste d'envies

CD and DVD Forensics


Paul Crowley


CD and DVD Forensics will take the reader through all facets of handling, examining, and processingCD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate...

Parution : 2006-12-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Configuring Juniper Networks NetScreen and SSG Firewalls
Ajouter à ma liste d'envies

Configuring Juniper Networks NetScreen and SSG Firewalls


Anne Hemni , Rob Cameron , Chris Cantrell , Lisa Lorenzin


Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to...

Parution : 2006-12-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
<< < 23456 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés