Syngress imprint: 289 books

by David Maynor
Language: English
Release Date: April 18, 2011

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully...
by Derrick Rountree
Language: English
Release Date: December 31, 2012

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials...

Perl Scripting for Windows Security

Live Response, Forensic Analysis, and Monitoring

by Harlan Carvey
Language: English
Release Date: April 18, 2011

I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve...
by John R. Vacca
Language: English
Release Date: August 22, 2013

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions...

Digital Forensics

Threatscape and Best Practices

by
Language: English
Release Date: December 7, 2015

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners...

Hiding Behind the Keyboard

Uncovering Covert Communication Methods with Forensic Analysis

by John Bair, Brett Shavers
Language: English
Release Date: March 14, 2016

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use the Internet for legitimate...

Malware Forensics

Investigating and Analyzing Malicious Code

by Cameron H. Malin, James M. Aquilina, Eoghan Casey
Language: English
Release Date: August 8, 2008

Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of live forensics, where investigators...

DNS Security

Defending the Domain Name System

by Allan Liska, Geoffrey Stowe
Language: English
Release Date: June 10, 2016

DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as...

iPhone and iOS Forensics

Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices

by Andrew Hoog, Katie Strzempka
Language: English
Release Date: July 25, 2011

iPhone and iOS Forensics is a guide to the forensic acquisition and analysis of iPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner, so that...
by Matthew Neely, Alex Hamerstone, Chris Sanyk
Language: English
Release Date: December 31, 2012

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration Testing describes the many...

FISMA and the Risk Management Framework

The New Practice of Federal Cyber Security

by Stephen D. Gantz, Daniel R. Philpott
Language: English
Release Date: December 31, 2012

If you are responsible for meeting federal information security requirements such as FISMA, this book is all you need to know to get a system authorized. Now in the first full revision of FISMA since its inception in 2002, a new wave of stronger security measures are now available through the efforts...

You: For Sale

Protecting Your Personal Data and Privacy Online

by Stuart Sumner
Language: English
Release Date: August 20, 2015

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and tracked. Every day billions of people...

PCI Compliance

Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin, Ph.D.
Language: English
Release Date: April 18, 2011

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary...
by Mike Shema
Language: English
Release Date: February 20, 2010

Seven Deadliest Wireless Technologies Attacks draws attention to the vagaries of Web security by discussing the seven deadliest vulnerabilities exploited by attackers. Each chapter presents examples of different attacks conducted against Web sites. The methodology behind the attack is explored, showing...
First 9 10 11 12 13 14 1516 17 18 19 20 21
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy