Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - Study Guide
    af Joshua (Senior Vice President for Security Technology Feldman
    272,95 kr.

  • - Building an Information Security Risk Management Program from the Ground Up
    af Evan (Omgeo Wheeler
    364,95 kr.

    Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.

  • - How to Own a Continent
    af Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell, Tom (Glasgow Caledonian University) Craig & Joe (President and CEO of Grand Idea Studio Grand
    549,95 kr.

    A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

  • - Mastering FortiOS
    af Kenneth (Senior Security Engineer at Fortinet Tam
    658,95 kr.

    Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.

  • af Denny ((MCSA Cherry
    355,95 kr.

  • af Ric (GSEC Messier
    582,95 kr.

  • af Derrick ((CISSP Rountree
    584,95 kr.

  • af Stephen D. (CISSP-ISSAP Gantz & Daniel R. (Daniel Philpott Philpott
    821,95 kr.

  • af Josh (Senior Security Consultant More
    348,95 kr.

    Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This title shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, or making decisions too quickly.

  • af Gareth R. (Citrix Consultant for Citrix Gold and Platinum Partners. Microsoft and Citrix trainer.) James
    610,95 kr.

    Guides you through the tasks of implementing XenDesktop for your company. This book addresses how to implement a Virtual Desktop Infrastructure (VDI) solution using Citrix XenDesktop. It includes technical details required for you to evaluate how Citrix XenDesktop would integrate into your existing environment.

  • af Stephen Pearson
    724,95 kr.

    Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. This book presents the tools, training, and techniques from this practice. It outlines pre- and post-blast investigations.

  • af Guilio (Author of bestselling "Building Robots with LEGO Mindstorms" Ferrari & Mario (Author of bestselling "Building Robots with LEGO Mindstorms" Ferrari
    565,95 kr.

    This reference covers the geometry, electronics, engineering, and programming required to build Lego Mindstorm robots. It explains how to integrate Lego Mindstorms kits with other Lego programmable bricks such as Scout and Cybermaster, as well as with non-robotic Lego Technics models.

  • af James C (Deputy Director of Global Security Development for Computer Sciences Foster
    691,95 kr.

    Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in C/C++, Java, Perl and NASL; Sockets - the technology that allows programs and scripts to communicate over a network is sockets; and, Shellcode which is commonly defined as bytecode converted from Assembly.

  • - An Excerpt from Malware Forensic Field Guide for Linux Systems
    af Eoghan (Eoghan Casey Casey
    244,95 kr.

    Includes companions for any digital and computer forensic investigator and analyst. This title is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. It addresses malware artifact discovery and extraction from a live Linux system.

  • af Mark (Cheif Information Security Officer at Interoute) Osborne
    537,95 kr.

    Managers responsible for IT/Security departments from mall office environments up to enterprise networks need to have an understanding of all IT security issues to effectively manage their departments. This book covers the basic concepts and practices of security, and provides basic information about the technical details of many of the products.

  • - Leveraging Social Networking While Mitigating Risk
    af Michael (Hospital for Special Surgery) Cross
    595,95 kr.

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. This book acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.

  • af O.A. (Graduate student in Computer Science at Texas Tech University) Akanbi
    775,95 kr.

  •  
    589,95 kr.

    Offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.

  • - A Practical Guide to Secure Computing
    af Peter (Internet-Standard.com Loshin
    349,95 kr.

    Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.

  • - Exploiting OS X from the Root Up
    af Robert (Cyber Security Researcher and Penetration Tester) Bathurst, Alijohn (Cyber Security Specialist and Certified Ethical Hacker) Ghassemlouei & Russ (Penetration Tester for a Federal Agency and Co-founder/Chief Executive Officer Rogers
    577,95 kr.

    A guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. It discusses the basics of the OS X environment and its vulnerabilities. It also includes useful tips and strategies for exploiting and compromising OS X systems.

  • af Cade Kamachi & Julie JCH (Associate Professor and Chair of Engineering Management and Systems Engineering at George Washington University) Ryan
    348,95 kr.

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for personal and enterprise email environments.

  • - Methodologies, Tools, and Techniques for Incident Analysis and Response
    af Steven (is a Computer Forensics Leader Bolt & Joe (Joe Fichera is a Certified Computer Examiner (CCE) and member of the ISFCE. He also holds EnCE Fichera
    579,95 kr.

    Provides information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. This title focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns.

  • - How to Own the Box
    af Syngress
    639,95 kr.

    Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.

  • - Understanding the Danger and How to Protect Your Organization
    af Eric (Independant network security consultant and speaker Cole
    589,95 kr.

    Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; and critical information on how to respond and recover from an intrusion.

  • - Keeping Your VoIP Network Safe
    af Regis J. Jr (TC International Consulting (Bud) Bates
    233,95 kr.

  • - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
    af Johnny (Security Researcher Long
    585,95 kr.

    In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, the authors get paid to uncover weaknesses in those systems and exploit them. This book reveals those secrets.

  • - Building Better Tools
    af Cism, GPEN, GPEN) Andress, mfl.
    254,95 - 508,95 kr.

  • - A Digital Forensic Investigator's Guide to Virtual Environments
    af Greg (Futurist and Strategic Forecaster in Emerging Technologies) Kipper & Diane (CCNA Barrett
    724,95 kr.

    Virtualization creates new and difficult challenges for forensic investigations. This book offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. It also explains the process of virtualization and the different types of virtualized environments.

  • - Cross Site Scripting Exploits and Defense
    af Petko D. Petkov, Robert (Founder of the Hackers.org Web Application Security Lab) Hansen, Anton (Sr. Security Engineer Rager, mfl.
    787,95 kr.

    Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to sensitive data theft and monetary losses.

  • af Eric (Eric Seagren Seagren
    540,95 kr.

    Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available software.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.