113 livres(s)
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Ajouter à ma liste d'envies

WarDriving and Wireless Penetration Testing


Brian Baker , Chris Hurley , Russ Rogers , Frank Thornton


Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Parution : 2006-11-08
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
Ajouter à ma liste d'envies

Scripting VMware Power Tools: Automating Virtual Infrastructure Administration


Al Muller


This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail...

Parution : 2006-11-07
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Hack the Stack
Ajouter à ma liste d'envies

Hack the Stack


Collectif


This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found...

Parution : 2006-11-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Virtualization with Microsoft Virtual Server 2005
Ajouter à ma liste d'envies

Virtualization with Microsoft Virtual Server 2005


Collectif


A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the...

Parution : 2006-10-13
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Combating Spyware in the Enterprise
Ajouter à ma liste d'envies

Combating Spyware in the Enterprise


Paul Piccard


Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently...

Parution : 2006-08-04
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Video Conferencing over IP: Configure, Secure, and Troubleshoot
Ajouter à ma liste d'envies

Video Conferencing over IP: Configure, Secure, and Troubleshoot


Michael Gough


This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video...

Parution : 2006-06-07
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  RFID Security
Ajouter à ma liste d'envies

RFID Security


Chris Lanthem , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Parution : 2006-05-25
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Configuring SonicWALL Firewalls
Ajouter à ma liste d'envies

Configuring SonicWALL Firewalls


Dan Bendell


SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. TheSonicWALL firewall appliance has had the largest annual growth in the security...

Parution : 2006-05-25
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Practical VoIP Security
Ajouter à ma liste d'envies

Practical VoIP Security


Thomas Porter Cissp Ccnp Ccda Ccs


Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the...

Parution : 2006-03-31
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Security Log Management
Ajouter à ma liste d'envies

Security Log Management


Jacob Babbin


This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing...

Parution : 2006-01-27
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Securing IM and P2P Applications for the Enterprise
Ajouter à ma liste d'envies

Securing IM and P2P Applications for the Enterprise


Paul Piccard , Marcus Sachs


This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Parution : 2005-12-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Phishing Exposed
Ajouter à ma liste d'envies

Phishing Exposed


Lance James


Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...

Parution : 2005-11-21
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Configuring Check Point NGX VPN-1/Firewall-1
Ajouter à ma liste d'envies

Configuring Check Point NGX VPN-1/Firewall-1


Barry J Stiefel , Simon Desmeules


Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...

Parution : 2005-11-01
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at IT Project Management
Ajouter à ma liste d'envies

How to Cheat at IT Project Management


Susan Snedaker


This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...

Parution : 2005-10-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Configuring VMware ESX Server 2.5
Ajouter à ma liste d'envies

Configuring VMware ESX Server 2.5


Al Muller , Seburn Wilson


This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...

Parution : 2005-08-31
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Host Integrity Monitoring Using Osiris and Samhain
Ajouter à ma liste d'envies

Host Integrity Monitoring Using Osiris and Samhain


Brian Wotring


This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover...

Parution : 2005-07-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  Cisco PIX Firewalls
Ajouter à ma liste d'envies

Cisco PIX Firewalls


Umer Khan


Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX...

Parution : 2005-06-21
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Ajouter à ma liste d'envies

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services


Melissa Craft


Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery...

Parution : 2005-05-24
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Ajouter à ma liste d'envies

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals


James C Foster


The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...

Parution : 2005-04-26
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Aggressive Network Self-Defense
Ajouter à ma liste d'envies

Aggressive Network Self-Defense


Neil R. Wyler


Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark...

Parution : 2005-04-12
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
<< < 23456 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés