Syngress imprint: 289 books

by Justin Clarke-Salt
Language: English
Release Date: May 5, 2009

Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the most dangerous...

Data Hiding

Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols

by Michael T. Raggo, Chet Hosmer
Language: English
Release Date: December 31, 2012

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques...
by Ken Dunham
Language: English
Release Date: November 12, 2008

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new devices like the iPhone. Examining code...

The Basics of Digital Forensics

The Primer for Getting Started in Digital Forensics

by John Sammons
Language: English
Release Date: April 2, 2012

The Basics of Digital Forensics provides a foundation for people new to the field of digital forensics. This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on...

Cyber Crime Investigations

Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors

by Kevin O'Shea, Richard Brittson, Anthony Reyes
Language: English
Release Date: April 18, 2011

Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking. The book begins with the chapter “What is Cyber Crime?” This introductory chapter describes the most common challenges faced by cyber investigators...
by Eric Cole, Michael Nordfelt, Sandra Ring
Language: English
Release Date: March 15, 2005

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers...
by Brett Shavers, Eric Zimmerman
Language: English
Release Date: August 10, 2013

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In...

Digital Forensics for Legal Professionals

Understanding Digital Evidence from the Warrant to the Courtroom

by Larry Daniel, Lars Daniel
Language: English
Release Date: October 14, 2011

Digital Forensics for Legal Professionals is a complete non-technical guide for legal professionals and students to understand digital forensics. In the authors’ years of experience in working with attorneys as digital forensics experts, common questions arise again and again: "What do I ask...

Securing SQL Server

Protecting Your Database from Attackers

by Denny Cherry
Language: English
Release Date: July 17, 2012

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, 2e, readers learn about the potential attack vectors that can be used to break...

Securing SQL Server

Protecting Your Database from Attackers

by Denny Cherry
Language: English
Release Date: April 27, 2015

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be...

The Basics of Digital Privacy

Simple Tools to Protect Your Personal Information and Your Identity Online

by Denny Cherry
Language: English
Release Date: November 21, 2013

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your...

Augmented Reality

An Emerging Technologies Guide to AR

by Greg Kipper, Joseph Rampolla
Language: English
Release Date: December 31, 2012

With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through...
by Henry Dalziel
Language: English
Release Date: December 5, 2014

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become...

Digital Triage Forensics

Processing the Digital Crime Scene

by Stephen Pearson, Richard Watson
Language: English
Release Date: July 13, 2010

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The DTF...
First 7 8 9 10 11 12 1314 15 16 17 18 19 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy