Syngress imprint: 289 books

Web Application Obfuscation

'-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'

by Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes
Language: English
Release Date: January 13, 2011

Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation...

Windows Registry Forensics

Advanced Digital Forensic Analysis of the Windows Registry

by Harlan Carvey
Language: English
Release Date: January 3, 2011

Windows Registry Forensics provides the background of the Windows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are discussed at length. Tools and techniques...
by Ryan Russell, Peter A Riley, Jay Beale
Language: English
Release Date: August 24, 2005

The first two books in this series “Stealing the Network: How to Own the Box” and “Stealing the Network: How to Own a Continent” have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment,...
by T. Bradley
Language: English
Release Date: November 8, 2006

Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves. Tony Bradley is the Guide for the About.com site for Internet...

The Hacker's Guide to OS X

Exploiting OS X from the Root Up

by Robert Bathurst, Russ Rogers, Alijohn Ghassemlouei
Language: English
Release Date: December 31, 2012

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive...
by Owen Bishop, B.Sc (Bristol.), B.Sc (Oxon.)
Language: English
Release Date: April 18, 2011

Teach your robot new tricks! With this projects-based approach you can program your Mindstorms NXT robot to solve a maze, build a house, run an obstacle course, and many other activities. Along the way you will learn the basics of programming structures and techniques using NXT-G and Microsoft VPL. For...

Microsoft Windows 7 Administrator's Reference

Upgrading, Deploying, Managing, and Securing Windows 7

by Jorge Orchilles
Language: English
Release Date: June 3, 2010

Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades. This reference explains how to deploy, use, and manage the operating system. The book is divided into 10 chapters. Chapter 1 introduces...

Citrix XenDesktop Implementation

A Practical Guide for IT Professionals

by Gareth R. James
Language: English
Release Date: October 29, 2010

Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop Client Settings. This book briefly...
by Brien Posey
Language: English
Release Date: April 18, 2011

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go quickly and smoothly. Learning...
by Jesse Varsalone
Language: English
Release Date: December 16, 2008

This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod...

The Wireshark Field Guide

Analyzing and Troubleshooting Network Traffic

by Robert Shimonski
Language: English
Release Date: May 14, 2013

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds...
by Tariq Azad
Language: English
Release Date: August 8, 2008

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for...

The Real MCTS/MCITP Exam 70-640 Prep Kit

Independent and Complete Self-Paced Solutions

by Anthony Piltzecker
Language: English
Release Date: April 18, 2011

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information...
by Justin Clarke-Salt
Language: English
Release Date: June 16, 2009

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award "SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents...
First 5 6 7 8 9 10 1112 13 14 15 16 17 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy