Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • af Susan (MCSE Snedaker
    610,95 kr.

    Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.

  • af Dan (President of Assurance Technology Managment Bendell
    659,95 kr.

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This book offers a look at the SonicWALL firewall product line. It covers various aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls.

  • af Syngress
    677,95 kr.

    A guide to protecting your Windows 2000 Network. It covers methods of attack and hacker secrets. It is suitable for IT professionals who want to run secure networks, or build secure software.

  • af Syngress
    688,95 kr.

    A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.

  • af Al (Senior Consultant for SBC\Callisma) Muller
    660,95 kr.

    Details the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. This work discusses the requirements for a server virtualization and consolidation project and the cost savings surrounding such an effort.

  • af Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell
    537,95 kr.

    Tackles one of the fastest growing crimes in the world: identity theft. This book features real-world network attack methodologies and hacking techniques within a context of original fictional accounts.

  • - Detect, Exploit, Prevent
    af Jason Deckard
    486,95 kr.

    A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

  • - Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega
    af Joe (President and CEO of Grand Idea Studio Grand
    568,95 kr.

    Offers hard-core gamers specific instructions on how to crack into their console and make it do things it was never designed to do. This book provides a guide to hacking popular video gaming consoles.

  • af Syngress
    784,95 kr.

    Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN, and management solutions. This title lets you understand NGX R65 operational changes. It features SVN architecture, VPN-1 features, and VPN-1 Power VSX. It tells how to deploy SmartClients and SmartManagement.

  • af Chris Hurley
    552,95 kr.

    Describes different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. This book also explains how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques.

  • af Mark Fugatt
    533,95 kr.

    A road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features, the book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. It explains the options within each menu, and identifies the potential problems.

  • - A Guide to Wireless Security
    af Chris (Senior Penetration Tester Hurley
    659,95 kr.

    The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide.

  • - Amazing Projects You Can Build in Under an Hour
    af Syngress
    358,95 kr.

    Lego Mindstorms lets you design and program robots that can do just about anything. This illustrated title provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. It is specifically targeted at new users of the Lego Mindstorms RIS 2.0.

  • - Case Studies for Implementing the NSA IAM
    af Syngress
    908,95 kr.

    The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. This book shows how to do a complete security assessment based on the NSA's guidelines.

  • af David Wall
    750,95 kr.

    Intended for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network, this book covers the product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network.

  • af Chris (IT Specialist with the University of Pennsylvania Peiris
    539,95 kr.

    A road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features, this book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the features. It includes "Reality Check" sidebars, which present cost/benefit analyses of situations where there is no single "right" answer.

  • - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
    af Gabriele (Software Design Engineer Giuseppini
    559,95 kr.

    Provides information on Microsoft's log parser tool. This book contains several customized, working scripts and templates useful for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. It teaches readers how the various queries within Log Parser work, and more.

  • - By Spammer-X
    af Spammer-X Spammer-X
    658,95 kr.

    Offers a technically explicit expose of the inner workings of the SPAM economy.

  • af Syngress
    802,95 kr.

    Includes coverage of the additions to the PIX Firewall family, including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. This guide instructs the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting, and more.

  • af Drew (Instructor for Black Hat Training Miller
    655,95 kr.

    Shows readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. This book details methods for attacking and defending physical security devices.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.