Syngress imprint: 289 books

by Sean-Philip Oriyano, Robert Shimonski
Language: English
Release Date: September 28, 2012

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich internet applications, and file...
by Timothy Virtue, Justin Rainey
Language: English
Release Date: December 11, 2014

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC². The new HCISPP certification, focused on health care information security and privacy, is similar to the CISSP, but has only six...

Threat Forecasting

Leveraging Big Data for Predictive Analysis

by John Pirc, David DeSanto, Iain Davison
Language: English
Release Date: May 17, 2016

Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting future breaches, how to use security...

Federal Cloud Computing

The Definitive Guide for Cloud Service Providers

by Matthew Metheny
Language: English
Release Date: January 5, 2017

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security...

E-discovery: Creating and Managing an Enterprisewide Program

A Technical Guide to Digital Investigation and Litigation Support

by Karen A. Schuler
Language: English
Release Date: April 18, 2011

One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic Discovery Survey, it is now a $2...

Hacking Web Intelligence

Open Source Intelligence and Web Reconnaissance Concepts and Techniques

by Sudhanshu Chauhan, Nutan Kumar Panda
Language: English
Release Date: April 13, 2015

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough...

Handbook of System Safety and Security

Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems

by
Language: English
Release Date: October 2, 2016

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the...

Nagios 3 Enterprise Network Monitoring

Including Plug-Ins and Hardware Devices

by John Strand, Jonathan Gines, Derrick Bennett
Language: English
Release Date: July 4, 2008

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you. Once up and running, you'll see...

Hacking the Code

Auditor's Guide to Writing Secure Code for the Web

by Mark Burnett
Language: English
Release Date: May 10, 2004

Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis....

Securing SQL Server

Protecting Your Database from Attackers

by Denny Cherry
Language: English
Release Date: December 27, 2010

Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus private IP addresses; accessing...

Securing the Smart Grid

Next Generation Power Grid Security

by Tony Flick, Justin Morehouse
Language: English
Release Date: November 3, 2010

Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications...

Applied Cyber Security and the Smart Grid

Implementing Security Controls into the Modern Power Infrastructure

by Eric D. Knapp, Raj Samani
Language: English
Release Date: February 26, 2013

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the...

Hacking Wireless Access Points

Cracking, Tracking, and Signal Jacking

by Jennifer Kurtz
Language: English
Release Date: December 8, 2016

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology...

Implementing Digital Forensic Readiness

From Reactive to Proactive Process

by Jason Sachowski
Language: English
Release Date: February 29, 2016

Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization. It demonstrates how digital forensics...
First 4 5 6 7 8 9 1011 12 13 14 15 16 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy