Syngress imprint: 289 books

Simple Steps to Data Encryption

A Practical Guide to Secure Computing

by Peter Loshin
Language: English
Release Date: April 30, 2013

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there...

Introduction to Cyber-Warfare

A Multidisciplinary Approach

by Paulo Shakarian, Jana Shakarian, Andrew Ruef
Language: English
Release Date: May 16, 2013

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective...
by Ric Messier
Language: English
Release Date: November 12, 2015

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the methodologies used, key...

Applied Network Security Monitoring

Collection, Detection, and Analysis

by Chris Sanders, Jason Smith
Language: English
Release Date: November 26, 2013

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle...

UTM Security with Fortinet

Mastering FortiOS

by Kenneth Tam, Martín H. Hoz Salvador, Ken McAlpine
Language: English
Release Date: December 31, 2012

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified...

The Basics of Web Hacking

Tools and Techniques to Attack the Web

by Josh Pauli
Language: English
Release Date: June 18, 2013

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles...
by Johnny Long, Bill Gardner, Justin Brown
Language: English
Release Date: November 12, 2015

Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified...

Hacking Web Apps

Detecting and Preventing Web Application Security Problems

by Mike Shema
Language: English
Release Date: October 22, 2012

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike...

Investigating Internet Crimes

An Introduction to Solving Crimes in Cyberspace

by Todd G. Shipley, Art Bowker
Language: English
Release Date: November 12, 2013

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including...
by Henry Dalziel
Language: English
Release Date: December 5, 2014

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol...

Practical Anonymity

Hiding in Plain Sight Online

by Peter Loshin
Language: English
Release Date: July 19, 2013

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons...
by Henry Dalziel
Language: English
Release Date: August 11, 2015

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range...

How to Defeat Advanced Malware

New Tools for Protection and Forensics

by Henry Dalziel
Language: English
Release Date: December 5, 2014

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by...

Coding for Penetration Testers

Building Better Tools

by Jason Andress, Ryan Linn
Language: English
Release Date: September 3, 2016

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where...
First 6 7 8 9 10 11 1213 14 15 16 17 18 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy