Syngress imprint: 289 books

by Leigh Metcalf, William Casey
Language: English
Release Date: June 7, 2016

Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as...

Blackhatonomics

An Inside Look at the Economics of Cybercrime

by Will Gragido, Daniel Molina, John Pirc
Language: English
Release Date: December 31, 2012

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind...
by Thomas Porter, CISSP, CCNP
Language: English
Release Date: April 18, 2011

The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the basics of attack methodologies...
by Brian Caswell, Jay Beale, Andrew Baker
Language: English
Release Date: April 11, 2007

This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and...

RFID+ Study Guide and Practice Exams

Study Guide and Practice Exams

by Paul Sanghera
Language: English
Release Date: April 18, 2011

Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes the following study elements: Exam objectives...
by Allan Liska
Language: English
Release Date: December 10, 2014

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective. Today's...
by Henry Dalziel
Language: English
Release Date: December 5, 2014

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is...

Digital Forensics Processing and Procedures

Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

by Andrew Jones, David Lilburn Watson
Language: English
Release Date: August 30, 2013

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics...

Risk Management Framework

A Lab-Based Approach to Securing Information Systems

by James Broad
Language: English
Release Date: July 3, 2013

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance...

Mobile Security and Privacy

Advances, Challenges and Future Research Directions

by Man Ho Au, Raymond Choo
Language: English
Release Date: September 14, 2016

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life...
by
Language: English
Release Date: October 13, 2011

The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth today. It has been adopted as a...
by Mark Horninger
Language: English
Release Date: April 18, 2011

The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product that, for the average SysAdmin, will present a difficult migration path from earlier versions...

Thor's OS Xodus

Why And How I Left Windows For OS X

by Timothy "Thor" Mullen
Language: English
Release Date: October 28, 2015

Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with...
by Darren Quick, Ben Martini, Raymond Choo
Language: English
Release Date: November 16, 2013

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment,...
First 14 15 16 17 18 19 2021
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy