Syngress imprint: 289 books

Practical Lock Picking

A Physical Penetration Tester's Training Guide

by Deviant Ollam
Language: English
Release Date: September 10, 2010

Practical Lock Picking: A Physical Penetration Tester’s Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open most of the locks they may encounter...

Industrial Network Security

Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

by Joel Thomas Langill, Eric D. Knapp
Language: English
Release Date: September 28, 2011

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems covers implementation guidelines for security measures of critical infrastructure. The book describes an approach to ensure the security of industrial networks by taking...
by Stacy Prowell, Rob Kraus, Mike Borkin
Language: English
Release Date: June 2, 2010

Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend against the attack. The book consists of seven chapters that deal with the following attacks: (i) denial...

Information Security Science

Measuring the Vulnerability to Data Compromises

by Carl Young
Language: English
Release Date: June 23, 2016

Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information...
by Robert Layton, Paul A Watters
Language: English
Release Date: December 3, 2015

Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime...
by Susan Snedaker
Language: English
Release Date: September 10, 2013

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant...

Next Generation SSH2 Implementation

Securing Data in Motion

by Dale Liu
Language: English
Release Date: April 18, 2011

New security risks, continuously evolving regulation and increasing security standards have created new and growing needs for secure internal information transfers, which SSH provides. This book addresses these new trends in depth, offering the most up-to-date information on the integration of SSH into...

Information Security Risk Assessment Toolkit

Practical Assessments through Data Collection and Data Analysis

by Mark Talabis, Jason Martin
Language: English
Release Date: October 17, 2012

In order to protect company’s information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those risks, and where to focus attention...
by Carl Young
Language: English
Release Date: August 21, 2010

Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for Security Risk Management...
by Fergus Strachan
Language: English
Release Date: August 31, 2011

This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange for raw beginners....
by Pawan K Bhardwaj
Language: English
Release Date: October 9, 2006

How to Cheat at Windows Systems Administrators using Command line scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows, Microsoft is trying to ease the administration...

Eleventh Hour Linux+

Exam XK0-003 Study Guide

by Graham Speake, Brian Barber, Chris Happel
Language: English
Release Date: November 4, 2009

Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam. The book begins with a review of important concepts that are needed for successful operating system installation. These include computer hardware, environment settings, partitions,...

SAP Security Configuration and Deployment

The IT Administrator's Guide to Best Practices

by Joey Hirao
Language: English
Release Date: November 18, 2008

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their...

Moving To The Cloud

Developing Apps in the New World of Cloud Computing

by Dinkar Sitaram, Geetha Manjunath
Language: English
Release Date: November 16, 2011

Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe programming APIs and compare the technologies that...
First 2 3 4 5 6 7 89 10 11 12 13 14 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy