Syngress imprint: 289 books

Microsoft Windows Server 2008 R2 Administrator's Reference

The Administrator's Essential Reference

by Dustin Hannifin
Language: English
Release Date: August 7, 2010

Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions; and discusses its deployment. After...

Microsoft Virtualization

Master Microsoft Server, Desktop, Application, and Presentation Virtualization

by Robert M Keefer, Jason Boomer, Thomas Olzak
Language: English
Release Date: June 4, 2010

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization serves a thorough reference for those considering a migration into the virtualized world. It provides the tools and explanations needed to create a fresh virtualization environment. Readers walk...

Managed Code Rootkits

Hooking into Runtime Environments

by Erez Metula
Language: English
Release Date: November 25, 2010

Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks, which are developed in intermediate...
by Henry Dalziel
Language: English
Release Date: August 10, 2015

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly...
by Brian Anderson, Barbara Anderson
Language: English
Release Date: June 3, 2010

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally susceptible to similar attacks. If you need to keep up with the latest hacks, attacks, and...

A Guide to Kernel Exploitation

Attacking the Core

by Massimiliano Oldani, Enrico Perla, B.Sc.
Language: English
Release Date: October 28, 2010

A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented...

Microsoft Log Parser Toolkit

A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool

by Gabriele Giuseppini, Mark Burnett
Language: English
Release Date: February 10, 2005

Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the...
by Laura P. Taylor, L. Taylor
Language: English
Release Date: December 18, 2006

The only book that instructs IT Managers to adhere to federally mandated certification and accreditation requirements. This book will explain what is meant by Certification and Accreditation and why the process is mandated by federal law. The different Certification and Accreditation laws will...

Federal Cloud Computing

The Definitive Guide for Cloud Service Providers

by Matthew Metheny
Language: English
Release Date: December 31, 2012

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You...
by Rob Kraus, Brian Barber, Mike Borkin
Language: English
Release Date: March 1, 2010

Seven Deadliest Microsoft Attacks explores some of the deadliest attacks made against Microsoft software and networks and how these attacks can impact the confidentiality, integrity, and availability of the most closely guarded company secrets. If you need to keep up with the latest hacks, attacks,...

Logging and Log Management

The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT ‘Noise’

by Anton Chuvakin, Kevin Schmidt, Chris Phillips
Language: English
Release Date: December 31, 2012

Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, network and security logging. Log management and log...

The Basics of Hacking and Penetration Testing

Ethical Hacking and Penetration Testing Made Easy

by Patrick Engebretson
Language: English
Release Date: June 24, 2013

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools...

Migrating to the Cloud

Oracle Client/Server Modernization

by Tom Laszewski, Prakash Nauduri
Language: English
Release Date: November 8, 2011

Migrating to the Cloud: Oracle Client/Server Modernization is a reference guide for migrating client/server applications to the Oracle cloud. Organized into 14 chapters, the book offers tips on planning, determining effort and budget, designing the Oracle cloud infrastructure, implementing the migration,...
by Leighton Johnson
Language: English
Release Date: December 7, 2015

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security...
First 3 4 5 6 7 8 910 11 12 13 14 15 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy