Marknadens största urval
Snabb leverans

Böcker utgivna av Syngress Media,U.S.

Filter
Filter
Sortera efterSortera Populära
  • - True Stories of Insider Threats and Enterprise Security Management Countermeasures
    av Brian T (CISSP Contos
    759,-

    Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.

  • - Detect, Exploit, Prevent
    av Steven (Member of the FBI’s Infragard Organization and Penetration Tester of Critical Federal Network Infrastructure) Palmer
    925

    Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.

  • av David (Formerly UK's National Health Service Harley
    925

    Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.

  • - Own it...Just Like Windows or Linux!
    av Chris (Senior Penetration Tester Hurley
    925

    Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.

  • av Brian (Snort.org webmaster Caswell
    759,-

    A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.

  • av Anthony Piltzecker
    775,-

    Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.

  • av Chris (Senior Penetration Tester Hurley
    679

    Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.

  • - Live Response, Forensic Analysis, and Monitoring
    av Harlan (DFIR analyst Carvey
    759,-

    Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.

  • av Jesse (Jesse Varsalone is a Cisco Certified Academy Instructor and holds the CCNA certification. Jesse is also a CISSP Varsalone
    795,-

    Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.

  • av Mario (Author of bestselling "Building Robots with LEGO Mindstorms" Ferrari
    615,-

    Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.

  • av Fergus (Founder and Director of Corporate OnSite Strachan
    775,-

    A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.

  • av Anthony (Retired Detective with the New York City Police Department’s Computer Crimes Squad Reyes
    885,-

    Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.

  • av Paul ((GCIA Asadoorian
    599,-

    Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.

  • av Andy Jones
    689,-

    Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.

  • av Thomas W (Member of Microsoft’s ISA Server Beta Team and Microsoft MVP for ISA Server Shinder
    759,-

    Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.

  • av Mark (A+ Horninger
    645

    A book for multi-tasked IT managers responsible for securing the version of SQL Server 2005. It provides the multi-tasked Sys Admin with the useful information needed to perform the daily tasks. It covers SQL Server 2005, which is a massive product with significant challenges for IT managers. It emphasizes best-practice security measures.

  • av Anthony Piltzecker
    885,-

    Shows you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have control over your servers and web sites using tools like IIS7, Windows Server Manager, and Windows PowerShell; and, secure your network with Network Access Protection and the Read-Only Domain Controller.

  • av Ira ((CISSP) Winkler
    505,-

    Describes the real security threats that you have to worry about, and more importantly, what to do about them. This book is suitable for the business, consumer, and technical users short on time but looking for information along with reader friendly analogies.

  • av Amber (CEO Schroader
    909

    Describes how alternate data storage devices (ADS) are used to both move and hide data. This book features case studies that demonstrate how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more.

  • av James Foster
    779,-

    Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.

  • av Rob (Security Solutions Engineer for Juniper Networks Cameron
    739,-

    NetScreen is a firewall appliance. This book offers a look at the NetScreen firewall product line. It features various aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. It also covers advanced troubleshooting techniques and the NetScreen Security Manager.

  • av Eric Cole
    565,-

    Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.

  • av Markus Daehne
    565,-

    Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members. Skype's Application Programming Interface (API) allows users to develop their own applications. This book helps the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC.

  • av Steven Andres
    925

    Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage of network design so administrators understand how they should design and protect their enterprises.

  • - Deploying Network and Host IPS
    av Michael Rash
    719

    Provides an introduction to the field of Intrusion Prevention and offers detailed information on various IPS methods and technologies. This book covers specific methods, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, and session sniping.

  • av Syngress
    719

    Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.

  • - Discover, Detect, and Eradicate the Internet's Greatest Threat
    av Paul (Director of Threat Research for Webroot Piccard
    759,-

    Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.

  • av Michael (Computer security consultant Gough
    759,-

    De-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.

  • av Michael Cross
    775,-

    Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers to defend their applications. This book defines Web application security, why it should be addressed in the lifecycle in development and quality assurance, and how it differs from other types of Internet security.

  • av Debra (MCSE Littlejohn Shinder
    525,-

    Written by an expert on Installing, Configuring, Managing and Troubleshooting ISA Server, this book can be used as a quick reference to ISA Server. It includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation.

Gör som tusentals andra bokälskare

Prenumerera på vårt nyhetsbrev för att få fantastiska erbjudanden och inspiration för din nästa läsning.