327 livres(s)
Télécharger le livre :  The Basics of Hacking and Penetration Testing
Ajouter à ma liste d'envies

The Basics of Hacking and Penetration Testing


Patrick Engebretson


The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.The book teaches students how to properly utilize and interpret the results of...

Parution : 2013-06-24
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  The Basics of Web Hacking
Ajouter à ma liste d'envies

The Basics of Web Hacking


Josh Pauli


The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system,...

Parution : 2013-06-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Introduction to Cyber-Warfare
Ajouter à ma liste d'envies

Introduction to Cyber-Warfare


Andrew Ruef , Paulo Shakarian , Jana Shakarian


Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...

Parution : 2013-05-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  The Wireshark Field Guide
Ajouter à ma liste d'envies

The Wireshark Field Guide


Robert Shimonski


The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that...

Parution : 2013-05-14
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  Windows Server 2012 Security from End to Edge and Beyond
Ajouter à ma liste d'envies

Windows Server 2012 Security from End to Edge and Beyond


Yuri Diogenes , Debra Littlejohn Shinder , Thomas W Shinder


Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies forWindows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and...

Parution : 2013-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
60,08
Télécharger le livre :  Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Ajouter à ma liste d'envies

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data


James M. Aquilina , Eoghan Casey , Cameron H. Malin


Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide forLinux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and...

Parution : 2013-04-12
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Windows 2012 Server Network Security
Ajouter à ma liste d'envies

Windows 2012 Server Network Security


Derrick Rountree


Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...

Parution : 2013-03-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Applied Cyber Security and the Smart Grid
Ajouter à ma liste d'envies

Applied Cyber Security and the Smart Grid


Eric D. Knapp , Raj Samani


Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and...

Parution : 2013-02-26
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Placing the Suspect Behind the Keyboard
Ajouter à ma liste d'envies

Placing the Suspect Behind the Keyboard


Brett Shavers


Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a...

Parution : 2013-02-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Cybercrime Investigative Case Management
Ajouter à ma liste d'envies

Cybercrime Investigative Case Management


Brett Shavers


Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected...

Parution : 2013-01-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Cybercrime Case Presentation
Ajouter à ma liste d'envies

Cybercrime Case Presentation


Brett Shavers


Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an...

Parution : 2013-01-15
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Advanced Persistent Threat
Ajouter à ma liste d'envies

Advanced Persistent Threat


Eric Cole


The newest threat to security has been categorized as the Advanced Persistent Threat or APT.The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
46,37
Télécharger le livre :  Blackhatonomics
Ajouter à ma liste d'envies

Blackhatonomics


Daniel Molina , Will Gragido , Nick Selby , John Pirc


Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  FISMA and the Risk Management Framework
Ajouter à ma liste d'envies

FISMA and the Risk Management Framework


Daniel R. Philpott , Stephen D. Gantz


FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
55,86
Télécharger le livre :  Logging and Log Management
Ajouter à ma liste d'envies

Logging and Log Management


Chris Phillips , Anton Chuvakin , Kevin Schmidt


Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  The Hacker's Guide to OS X
Ajouter à ma liste d'envies

The Hacker's Guide to OS X


Alijohn Ghassemlouei , Robert Bathurst , Russ Rogers


Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Federal Cloud Computing
Ajouter à ma liste d'envies

Federal Cloud Computing


Matthew Metheny


Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy,...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  UTM Security with Fortinet
Ajouter à ma liste d'envies

UTM Security with Fortinet


Collectif


Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased...

Parution : 2012-12-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  The Basics of Cyber Warfare
Ajouter à ma liste d'envies

The Basics of Cyber Warfare


Jason Andress , Steve Winterfeld


The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive...

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Violent Python
Ajouter à ma liste d'envies

Violent Python


Tj O'connor


Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....

Parution : 2012-12-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
<< < 34567 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés