Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - A Strategic-Based Approach
    av Timothy (Timothy J. Shimeall Shimeall
    1 045,-

    Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.

  • av John R. (Information Technology Consultant and Researcher Vacca
    735,-

    Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.

  • - Techniques, Tactics and Tools for Security Practitioners
    av Jason (CISSP Andress
    595,-

    Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.

  • - Tools and Techniques to Attack the Web
    av Josh Pauli
    465,-

    Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.

  • av Brett (Digital Forensics Practitioner Shavers
    885,-

    A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.

  •  
    615,-

    Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.

  • av Susan (MCSE Snedaker
    945,-

    Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    av Brett (Digital Forensics Practitioner Shavers
    305,-

    Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

  • - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    av Brett (Digital Forensics Practitioner Shavers
    839,-

    Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.

  • - Understanding the Fundamentals of Cloud Computing in Theory and Practice
    av Derrick ((CISSP Rountree
    519,-

    Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.

  • - Collection, Detection, and Analysis
    av Chris (Senior Information Security Analyst at the DoD Sanders
    615,-

    A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.

  • - Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
    av David Lilburn (Head Watson
    1 035,-

    Includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody - from incident response through analysis in the lab.

  • - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
    av TJ O'Connor
    529,-

    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.

  • - Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    av Jason (CISSP Andress
    335,-

    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

  • av Leighton (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT)) Johnson
    1 099,-

  • av Justin Clarke-Salt
    829,-

    Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.

  • - Detecting and Preventing Web Application Security Problems
    av Mike (Web Application Security Solutions Shema
    725,-

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.

  • - Practical Assessments through Data Collection and Data Analysis
    av Mark (Chief Threat Scientist of Zvelo Inc) Talabis
    487,99

    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.

  • - Advances, Challenges and Future Research Directions
    av Man Ho (Assistant Professor Au & Raymond (Fulbright Scholar and Senior Lecturer Choo
    969,-

  • - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
    av Michael T. (CISSP Raggo
    719,-

    Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.

  • - Investigation, Analysis and Mobile Security for Google Android
    av Andrew (Former adjunct professor (assembly language) and owner of viaForensics) Hoog
    969,-

    Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).

  • - Analyzing and Troubleshooting Network Traffic
    av Robert (Director Shimonski
    519,-

    Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.

  • - The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
    av Kevin (is a team lead and senior software developer at SecureWorks Schmidt
    509,-

    Effectively analyzing large volumes of diverse logs can pose many challenges. This title helps to simplify this complex process using practical guidance and real-world examples. It includes information on different uses for logs - from system operations to regulatory compliance.

  • - Implementing Security Controls into the Modern Power Infrastructure
    av Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    649,-

    Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

  • - Attacking the Core
    av Enrico (Kernel Programmer Perla
    545,-

    Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.

  • av Sean-Philip (CISSP Oriyano
    725,-

    Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.

  • av Harlan (DFIR analyst Carvey
    689,-

    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.

  • - Ethical Hacking and Penetration Testing Made Easy
    av Patrick (Assistant Professor of Information Assurance & Senior Penetration Tester for security firm in the Midwest) Engebretson
    339,-

    Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.

  • - Practical Penetration Testing Techniques
    av James (President and Owner Broad
    595,-

    Introduces you the distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, this book walks you through creating a custom version of the Kali live distribution.

  • - Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
    av Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    599,-

    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.