Syngress imprint: 289 books

by Jeremy Faircloth
Language: English
Release Date: September 20, 2016

Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing...
by Chet Hosmer
Language: English
Release Date: June 10, 2015

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive...

Securing VoIP

Keeping Your VoIP Network Safe

by Regis J. Jr (Bud) Bates
Language: English
Release Date: November 14, 2014

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business...
by Ido Dubrawsky
Language: English
Release Date: August 17, 2009

CompTIA Security+ Certification Study Guide: Exam SYO-201, Third Edition, offers a practical guide for those interested in pursuing CompTIA Security+ certification. The book is organized into six parts. Part 1 deals with general security issues including security threats; hardware and peripheral security...
by
Language: English
Release Date: July 16, 2014

Cyber Crime and Cyber Terrorism Investigator’s Handbook is a vital tool in the arsenal of today’s computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning...
by Jon Schipp, Henry Dalziel
Language: English
Release Date: December 10, 2015

In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. Provides information on using secure containers for training and develpoment.

Windows Forensic Analysis Toolkit

Advanced Analysis Techniques for Windows 8

by Harlan Carvey
Language: English
Release Date: March 11, 2014

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline,...

Mobile Data Loss

Threats and Countermeasures

by Michael T. Raggo
Language: English
Release Date: December 9, 2015

The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is...

Hack the Stack

Using Snort and Ethereal to Master The 8 Layers of An Insecure Network

by Michael Gregg, Stephen Watkins, George Mays
Language: English
Release Date: November 6, 2006

This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The...
by Debra Littlejohn Shinder, Thomas W Shinder
Language: English
Release Date: December 31, 2004

Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and ISAserver.org. Tom and Deb's book on...

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit

Database Implementation and Maintenance

by Mark Horninger
Language: English
Release Date: April 12, 2009

SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many...
by David Nathans
Language: English
Release Date: November 6, 2014

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and more significant every day,...

Smart Grid Security

Innovative Solutions for a Modernized Grid

by
Language: English
Release Date: August 11, 2015

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak...

The Basics of Cyber Safety

Computer and Mobile Device Safety Made Easy

by John Sammons, Michael Cross
Language: English
Release Date: August 20, 2016

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who...
First 11 12 13 14 15 16 1718 19 20 21
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy