Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • av Allan (Allan Liska Liska
    935,-

  • - Executing Social Engineering Pen Tests, Assessments and Defense
    av Gavin (Professional Services Manager at RandomStorm) Watson
    565,-

    Social engineering attacks target the weakest link in an organization's security--human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors-- can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.

  • - A Workbench for Inventing and Sharing Digital Forensic Technology
    av Chet (President Hosmer
    939,-

  • - Understanding the Fundamentals of InfoSec in Theory and Practice
    av Jason (CISSP Andress
    389

  • - Multi-staged Attacks Driven by Exploits and Malware
    av Aditya (Aditya K. Sood Sood & Richard (Richard J. Enbody Enbody
    369,-

    Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively. A well-structured introduction into the world of targeted cyber-attacksIncludes analysis of real-world attacksWritten by cyber-security researchers and experts

  • - Advanced Analysis Techniques for Windows 8
    av Harlan (DFIR analyst Carvey
    989,-

  • av Darren (Darren Quick is an Electronic Evidence Specialist in the Electronic Crime Section of the South Australia Police Quick
    935,-

    To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. This title presents the evidence-based cloud forensic framework.

  • - While Ensuring Evidentiary Integrity
    av Chet (President Hosmer, Joshua (CEECS Bartolomie & Rosanne (PMP Pelli
    634

  • av Jelle (Netherlands Defense Academy and University of Amsterdam) Van Haaster
    485

  • - A Strategic-Based Approach
    av Timothy (Timothy J. Shimeall Shimeall
    1 025,-

    Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.

  • av John R. (Information Technology Consultant and Researcher Vacca
    719,-

    Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.

  • - Techniques, Tactics and Tools for Security Practitioners
    av Jason (CISSP Andress
    585,-

    Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.

  • - Tools and Techniques to Attack the Web
    av Josh Pauli
    459

    Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.

  • av Brett (Digital Forensics Practitioner Shavers
    869,-

    A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.

  •  
    615

    Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.

  • av Susan (MCSE Snedaker
    945

    Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    av Brett (Digital Forensics Practitioner Shavers
    299,-

    Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

  • - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    av Brett (Digital Forensics Practitioner Shavers
    825

    Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.

  • - Understanding the Fundamentals of Cloud Computing in Theory and Practice
    av Derrick ((CISSP Rountree
    509

    Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.

  • - Collection, Detection, and Analysis
    av Chris (Senior Information Security Analyst at the DoD Sanders
    605

    A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.

  • Spara 10%
    - A Physical Penetration Tester's Training Guide
    av Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    485

    Includes lessons that allow even beginners to acquire the knowledge they need quickly. This title features: full-color photos make learning as easy as picking a lock; companion website is filled with indispensible lock picking videos; and extensive appendix details tools and toolkits currently available for all your lock picking needs.

  • Spara 10%
    - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
    av TJ O'Connor
    485

    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.

  • - Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    av Jason (CISSP Andress
    329,-

    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

  • av Leighton (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT)) Johnson
    1 079,-

  • av Justin Clarke-Salt
    575

    Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.

  • - Detecting and Preventing Web Application Security Problems
    av Mike (Web Application Security Solutions Shema
    709,-

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.

  • Spara 10%
    - Practical Assessments through Data Collection and Data Analysis
    av Mark (Chief Threat Scientist of Zvelo Inc) Talabis
    485

    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.

  • - Advances, Challenges and Future Research Directions
    av Man Ho (Assistant Professor Au
    969

  • - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
    av Michael T. (CISSP Raggo
    705,-

    Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.

  • - Investigation, Analysis and Mobile Security for Google Android
    av Andrew (Former adjunct professor (assembly language) and owner of viaForensics) Hoog
    949,-

    Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.