327 livres(s)
Télécharger le livre :  Integrating ISA Server 2006 with Microsoft Exchange 2007
Ajouter à ma liste d'envies

Integrating ISA Server 2006 with Microsoft Exchange 2007


Fergus Strachan


This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange...

Parution : 2011-08-31
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Check Point NGX R65 Security Administration
Ajouter à ma liste d'envies

Check Point NGX R65 Security Administration


Ralph Bonnell


Check Point NGX R65 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users.Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management...

Parution : 2011-08-31
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  The Real MCTS/MCITP Exam 70-646 Prep Kit
Ajouter à ma liste d'envies

The Real MCTS/MCITP Exam 70-646 Prep Kit


Anthony Piltzecker


This exam is designed to validate skills as a Windows Server 2008 Server Administrator.This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended...

Parution : 2011-08-31
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  The Official CHFI Study Guide (Exam 312-49)
Ajouter à ma liste d'envies

The Official CHFI Study Guide (Exam 312-49)


Dave Kleiman


This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The...

Parution : 2011-08-31
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Ajouter à ma liste d'envies

Penetration Tester's Open Source Toolkit


Jeremy Faircloth


Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Parution : 2011-08-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  iPhone and iOS Forensics
Ajouter à ma liste d'envies

iPhone and iOS Forensics


Andrew Hoog , Katie Strzempka


iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...

Parution : 2011-07-25
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Android Forensics
Ajouter à ma liste d'envies

Android Forensics


Andrew Hoog


Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...

Parution : 2011-07-21
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
56,92
Télécharger le livre :  Thor's Microsoft Security Bible
Ajouter à ma liste d'envies

Thor's Microsoft Security Bible


Timothy "Thor" Mullen


Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...

Parution : 2011-07-16
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
48,48
Télécharger le livre :  Cyber Warfare
Ajouter à ma liste d'envies

Cyber Warfare


Jason Andress , Steve Winterfeld


Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Parution : 2011-07-13
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
33,71
Télécharger le livre :  Security Risk Management
Ajouter à ma liste d'envies

Security Risk Management


Evan Wheeler


Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Parution : 2011-04-20
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
41,09
Télécharger le livre :  Building a Digital Forensic Laboratory
Ajouter à ma liste d'envies

Building a Digital Forensic Laboratory


Andrew Jones , Craig Valli


The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...

Parution : 2011-04-19
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
66,41
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
Ajouter à ma liste d'envies

How to Cheat at Microsoft Vista Administration


Jan Kanclirz


The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Secure Your Network for Free
Ajouter à ma liste d'envies

Secure Your Network for Free


Eric Seagren


This is the only book to clearly demonstrate how to get big dollar security for your network using freely available tools.This is a must have book for any company or person with a limited budget.Network security is in a constant struggle for budget to get things done....

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
34,76
Télécharger le livre :  How to Cheat at Securing SQL Server 2005
Ajouter à ma liste d'envies

How to Cheat at Securing SQL Server 2005


Mark Horninger


The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  How to Cheat at VoIP Security
Ajouter à ma liste d'envies

How to Cheat at VoIP Security


Michael Gough , Thomas Porter Cissp Ccnp Ccda Ccs


The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Microsoft Vista for IT Security Professionals
Ajouter à ma liste d'envies

Microsoft Vista for IT Security Professionals


Anthony Piltzecker


Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deployMicrosoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely...

Parution : 2011-04-18
Format(s) : PDF, epub sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  How to Cheat at Configuring VmWare ESX Server
Ajouter à ma liste d'envies

How to Cheat at Configuring VmWare ESX Server


David Rule


A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
42,15
Télécharger le livre :  Next Generation SSH2 Implementation
Ajouter à ma liste d'envies

Next Generation SSH2 Implementation


Dale Liu


New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
37,93
Télécharger le livre :  XSS Attacks
Ajouter à ma liste d'envies

XSS Attacks


Collectif


A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the...

Parution : 2011-04-18
Format(s) : PDF sans DRM
Éditeur : Syngress
J'achète
51,64
Télécharger le livre :  Stealing the Network
Ajouter à ma liste d'envies

Stealing the Network


Johnny Long , Ryan Russell , Timothy Mullen


The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book...

Parution : 2011-04-18
Format(s) : epub sans DRM
Éditeur : Syngress
J'achète
42,15
<< < 56789 >

Restez informé(e) des événements et promotions ebook

Paiements sécurisés

Paiements sécurisés