327 livres(s)
Télécharger le livre :  Cybercrime Investigation Case Studies
Ajouter à ma liste d'envies

Cybercrime Investigation Case Studies


Brett Shavers


Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real...

Parution : 2012-12-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
17,88
Télécharger le livre :  Network Intrusion Analysis
Ajouter à ma liste d'envies

Network Intrusion Analysis


Joe Fichera


Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and...

Parution : 2012-12-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
45,31
Télécharger le livre :  Keys to the Kingdom
Ajouter à ma liste d'envies

Keys to the Kingdom


Deviant Ollam


Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the...

Parution : 2012-12-06
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
46,37
Télécharger le livre :  Practical Lock Picking
Ajouter à ma liste d'envies

Practical Lock Picking


Deviant Ollam


Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking...

Parution : 2012-11-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
46,37
Télécharger le livre :  Hacking Web Apps
Ajouter à ma liste d'envies

Hacking Web Apps


Mike Shema


How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks...

Parution : 2012-10-22
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
46,37
Télécharger le livre :  Information Security Risk Assessment Toolkit
Ajouter à ma liste d'envies

Information Security Risk Assessment Toolkit


Mark Talabis , Jason Martin


In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those...

Parution : 2012-10-17
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
46,37
Télécharger le livre :  Client-Side Attacks and Defense
Ajouter à ma liste d'envies

Client-Side Attacks and Defense


Sean-Philip Oriyano , Robert Shimonski


Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...

Parution : 2012-09-28
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  CISSP Study Guide
Ajouter à ma liste d'envies

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common...

Parution : 2012-09-01
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Malware Forensics Field Guide for Windows Systems
Ajouter à ma liste d'envies

Malware Forensics Field Guide for Windows Systems


James M. Aquilina , Eoghan Casey , Cameron H. Malin


Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...

Parution : 2012-05-11
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
29,49
Télécharger le livre :  The Basics of Digital Forensics
Ajouter à ma liste d'envies

The Basics of Digital Forensics


John Sammons


The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to...

Parution : 2012-04-02
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
25,27
Télécharger le livre :  Windows Forensic Analysis Toolkit
Ajouter à ma liste d'envies

Windows Forensic Analysis Toolkit


Harlan Carvey


Windows Forensic Analysis Toolkit: Advanced Analysis Techniques forWindows 7 provides an overview of live and postmortem response collection and analysis methodologies forWindows 7. It considers the core investigative and analysis concepts that are critical to the work...

Parution : 2012-01-27
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Low Tech Hacking
Ajouter à ma liste d'envies

Low Tech Hacking


Collectif


Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the...

Parution : 2011-12-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Moving To The Cloud
Ajouter à ma liste d'envies

Moving To The Cloud


Dinkar Sitaram , Geetha Manjunath


Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe programming APIs...

Parution : 2011-11-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Coding for Penetration Testers
Ajouter à ma liste d'envies

Coding for Penetration Testers


Jason Andress , Ryan Linn


Coding for Penetration Testers discusses the use of various scripting languages in penetration testing. The book presents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languages. It also provides a...

Parution : 2011-11-04
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Security for Microsoft Windows System Administrators
Ajouter à ma liste d'envies

Security for Microsoft Windows System Administrators


Derrick Rountree


Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is...

Parution : 2011-11-03
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Nessus Network Auditing
Ajouter à ma liste d'envies

Nessus Network Auditing


Russ Rogers


The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth...

Parution : 2011-10-13
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  TechnoSecurity's Guide to E-Discovery and Digital Forensics
Ajouter à ma liste d'envies

TechnoSecurity's Guide to E-Discovery and Digital Forensics


Jack Wiles


TechnoSecurity's Guide to E-Discovery and Digital Forensics provides IT security professionals with the information (hardware, software, and procedural requirements) needed to create, manage and sustain a digital forensics lab and investigative team that can accurately...

Parution : 2011-10-13
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  Secrets Stolen, Fortunes Lost
Ajouter à ma liste d'envies

Secrets Stolen, Fortunes Lost


Christopher Burgess , Richard Power


The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately...

Parution : 2011-08-31
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
59,03
Télécharger le livre :  Nmap in the Enterprise
Ajouter à ma liste d'envies

Nmap in the Enterprise


Becky Pinkard , Angela Orebaugh


Nmap, or Network Mapper, is a free, open source tool that is available under the GNU General Public License as published by the Free Software Foundation. It is most often used by network administrators and IT security professionals to scan corporate networks, looking...

Parution : 2011-08-31
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  The Best Damn Exchange, SQL and IIS Book Period
Ajouter à ma liste d'envies

The Best Damn Exchange, SQL and IIS Book Period


Chris Adams , Mark Horninger , Henrik Walther


Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The...

Parution : 2011-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
51,64
<< < 45678 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés