Syngress imprint: 289 books

Social Engineering Penetration Testing

Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason, Richard Ackroyd
Language: English
Release Date: April 11, 2014

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute...
by Kevin Cardwell, Henry Dalziel
Language: English
Release Date: December 9, 2015

Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like,...
by Henry Dalziel, Ajin Abraham
Language: English
Release Date: December 10, 2015

Risky Behaviours in the Top 400 iOS and Android Apps is a concise overview of the security threats posed by the top apps in iOS and Android apps. These apps are ubiquitous on a phones and other mobile devices, and are vulnerable to a wide range digital systems attacks, This brief volume provides security...
by Anthony Piltzecker
Language: English
Release Date: April 18, 2011

Microsoft Vista for IT Security Professionals is designed for the professional system administrators who need to securely deploy Microsoft Vista in their networks. Readers will not only learn about the new security features of Vista, but they will learn how to safely integrate Vista with their existing...

Executing Windows Command Line Investigations

While Ensuring Evidentiary Integrity

by Chet Hosmer, Joshua Bartolomie, Rosanne Pelli
Language: English
Release Date: June 11, 2016

The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage;...
by Jan Kanclirz Jr.
Language: English
Release Date: April 18, 2011

The Perfect Reference for the Multitasked SysAdmin The Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and management consoles. It also enhances...

Android Forensics

Investigation, Analysis and Mobile Security for Google Android

by Andrew Hoog
Language: English
Release Date: July 21, 2011

Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This book offers a thorough review of the Android platform, including the core hardware and software components,...
by Thomas W. Edgar, David O. Manz
Language: English
Release Date: April 19, 2017

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction...
by Henrik Walther, Mark Horninger, Chris Adams
Language: English
Release Date: August 31, 2011

Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools...
by Cory Altheide, Harlan Carvey
Language: English
Release Date: March 29, 2011

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a platform for performing computer...
by Robert Shimonski, Naomi Alpern, Michael Cross
Language: English
Release Date: August 6, 2009

CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental terminology needed to perform duties as a network technician and to pass the CompTIA Network+ exam. The...
by Julie JCH Ryan, Cade Kamachi
Language: English
Release Date: October 7, 2014

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious...

Practical Deployment of Cisco Identity Services Engine (ISE)

Real-World Examples of AAA Deployments

by Andy Richter, Jeremy Wood
Language: English
Release Date: November 12, 2015

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control...

Hacking with Kali

Practical Penetration Testing Techniques

by James Broad, Andrew Bindner
Language: English
Release Date: December 5, 2013

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version...
First 12 13 14 15 16 17 1819 20 21
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy