Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - Analyzing and Troubleshooting Network Traffic
    av Robert (Director Shimonski
    509

    Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.

  • - The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
    av Kevin (is a team lead and senior software developer at SecureWorks Schmidt
    499,-

    Effectively analyzing large volumes of diverse logs can pose many challenges. This title helps to simplify this complex process using practical guidance and real-world examples. It includes information on different uses for logs - from system operations to regulatory compliance.

  • - Implementing Security Controls into the Modern Power Infrastructure
    av Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    582,99

    Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

  • - Attacking the Core
    av Enrico (Kernel Programmer Perla
    535,-

    Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.

  • av Sean-Philip (CISSP Oriyano
    709,-

    Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.

  • av Harlan (DFIR analyst Carvey
    620

    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.

  • - Ethical Hacking and Penetration Testing Made Easy
    av Patrick (Dakota State University Engebretson
    339

    Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.

  • - Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
    av Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    589,-

    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.

  • av B. (Senior Technology Consultant with Sierra Systems Consultants Inc. Barber
    639,-

    Over 95 per cent of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service (WSUS) is designed to provide patches and updates to every one of these computers. This book begins by describing the feature set of WSUS, and the benefits it provides to system administrators.

  • av Marcus Sachs
    689,-

    Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.

  • av Kent (Vice President of Information Security for a multi-billion dollar financial institution) Nabors, Brian (Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA)) Baskin, Jayson E (Principle Partner Street & m.fl.
    329

    Suitable for Hackers, IT professional, and Infosec aficionados as well as everyday people interested in computer security, this title takes the reader on a global trip through the world of computer security exploits. It shows you how to see the digital world just below the surface of daily life.

  • av Dan ((CISSP)) York
    405,-

    Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • av Carl (CCIE Timm
    405,-

    Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.

  • av Mike (Web Application Security Solutions Shema
    405,-

    Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • av Brad (Chief researcher of Renderlab.net) Haines
    405,-

    Pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. This book helps you discover the best ways to defend against these vicious hacks with step-by-step instructions and techniques to make your computer and network impenetrable.

  • - Exam XK0-003 Study Guide
    av Chris (managing consultant for Liberty Trio Happel
    369,-

    Keyed to the XK0-003 revision of the CompTIA Linux+exam, this book is streamlined to include only core certification information and is presented for ease of last-minute studying. It covers the main objectives of the exam with key concepts highlighted. It also includes 'Top Five toughest questions and answers to help you to prepare.

  • - Exam N10-004 Study Guide
    av Naomi (Consultant Alpern
    369,-

    Covers the main objectives of CompTIA Network+ exam, highlighting key concepts. This title features Exam Warnings that highlight particularly tough sections of the exam. It includes review of five toughest questions by topic.

  • - Exam SY0-201 Study Guide
    av Ido (Chief Security Advisor Dubrawsky
    369,-

    Focuses on the essentials needed to pass the Security+ certification exam. The book includes: Exam Objectives - Fast Track Review; Key words/definitions; Five Toughest questions and their answers; and, Exam Warnings - What to pay attention to. It also includes review of five toughest questions by topic.

  • - Identifying Patterns in the Chaos
    av Jacob (Contractor with a government agency filling the role of Intrusion Detection Team Lead) Babbin
    719

    Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing the 'Top 10' security logs that IT professionals should be regularly analyzing.

  • av Neil R. Wyler
    759,-

    Provide a detailed analysis of the timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. This book demonstrates and explores controversial network strike back and countermeasure techniques.

  • - Exam N10-004 2E
    av Robert (Director Shimonski
    885,-

    CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. This title covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools.

  • av Frank (Owner Thornton
    759,-

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this book presents a "How to Cheat" approach to the topic.

  • av Johnny (Security Researcher Long
    565,-

    Teaches readers how to use Instant Messaging and Phone calls over the Internet. This book covers the program Google Talk, from detailed information about each of its features, to an analysis of how it works. It also covers techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.

  • av Robert (Information security and management consultant and Senior Instructor for (ISC)^2 Slade
    505,-

    Presents a compilation of security terms and definitions that working security professionals and IT students will find helpful. This work covers malware, wireless technologies, and phishing. It also helps IT professionals and IT students to identify terms used in practice, in journals and articles, and on websites.

  • - Prevent Attacks from Outside and Inside Your Organization
    av Aaron (Senior Microsoft Consultant. COE Lead for Unified Communications Tiensivu
    829,-

    Describes various technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system. This book outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment.

  • - Investigating and Analyzing Malicious Code
    av Eoghan (Eoghan Casey Casey
    1 009

    Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.

  • - The Killer Web Applications
    av Craig (CISO for Portland State University and President of Hawkeye Security Training Schiller
    759,-

    Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals using real world examples. It covers what they are, how they operate, and the environment and technology that makes them possible. It analyzes botnets for opportunities to detect, track, and remove them.

  • - Study Guide and Practice Exams
    av Paul (Educator Sanghera
    599,-

    A guide to CompTIA's RFID+ Security exam.

  • - Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
    av James Steele
    869,-

    Discusses the hard questions cyber crime investigators are asking. This book includes chapters that discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. It examines issues relating to cyber crime definitions, the electronic crime scene, and preparing and presenting a cyber crime investigation in court.

  • - Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
    av Richard (Internationally recognized expert in the areas of Security Power
    1 039,-

    The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.