Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - Including IPv6
    af Syngress
    800,95 kr.

    Focuses on planning and configuring networks and devices for IP 6. This book covers how to: increase the IP address size from 32 bits to 128 bits; support more levels of addressing hierarchy; support an increased number of addressable nodes; and, support simpler auto-configuration of addresses.

  • af Syngress
    689,95 kr.

    TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. This book teaches how to prevent, detect, troubleshoot and correct TCP/IP network problems. It focuses on identifying problem areas, including correcting protocol errors, DNS route problems, application faults and slow response times.

  • af Syngress
    643,95 kr.

    Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations. This book provides step-by-step instructions on how to install and deploy a fixed wireless network.

  • - Building Multi Protocol Label Switching Networks
    af Syngress
    734,95 kr.

    Introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. This book discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, and more.

  • af Chris (Senior Penetration Tester Hurley
    512,95 kr.

    Offers the busy network administrator with solutions to securing the wireless network. This book provides the basic tools and instruction to maintain a secure network while allowing acceptable access to users.

  • af Thomas W. (Senior Cyber Security Scientist Edgar
    1.050,95 kr.

    Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.Presents research methods from a cyber security science perspectiveCatalyzes the rigorous research necessary to propel the cyber security field forwardProvides a guided method selection for the type of research being conducted, presented in the context of real-world usage

  • - Building Better Tools
    af Cism, GPEN, GPEN) Andress, mfl.
    253,95 - 603,95 kr.

  • - Attack Analysis on Audio Watermarking
    af Sogand Ghorbani & Iraj Sadegh Amiri
    788,95 kr.

  • af Zhe-Ming (Professor Lu
    513,95 kr.

  • - A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies
    af Ira ((CISSP) Winkler & Araceli (Intelligence and Investigations Subject Manager Treu Gomes
    592,95 kr.

  • - Cracking, Tracking, and Signal Jacking
    af Jennifer (Information Assurance Affiliate Faculty Kurtz
    584,95 kr.

    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, cameras, printers, headsets, fitness trackers, household appliances, and the number and types of wireless devices all continuing to increase dramatically. The book demonstrates a variety of ways that these vulnerabilities can be-and have been-exploited, and how the unfortunate consequences of such exploitations can be mitigated through the responsible use of technology. Explains how the wireless access points in common, everyday devices can expose us to hacks and threatsTeaches how wireless access points can be hacked, also providing the techniques necessary to protect and defend dataPresents concrete examples and real-world guidance on how to protect against wireless access point attacks

  • - A Decision-Maker's Guide to Risk, Prevention, and Damage Control
    af Paul (Clinician Cerrato
    583,95 kr.

  • - The Definitive Guide for Cloud Service Providers
    af Matthew (Chief Information Security Officer and Director of Cyber Security Operations Metheny
    848,95 kr.

  • - Cyber Risk and Risk Management, Cyber Security, Threat Analysis, Functional Safety, Software Systems, and Cyber Physical Systems
     
    2.251,95 kr.

  • - A Team Approach to the Litigation Hold, Data Collection, and Evidence Preservation
    af Ernesto F. (CISSP Rojas
    805,95 kr.

  • - The V3rb0t3n Network
    af Jayson E. (Principle Partner Street
    481,95 kr.

  • - Breaches are Certain, Impact is Not
    af Kevvie (Partner and National Cyber Response Leader for KPMG Canada Fowler
    813,95 kr.

  • - Computer and Mobile Device Safety Made Easy
    af John (Associate Professor and Director of the Digital Forensics and Information Assurance program Sammons
    429,95 kr.

    The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to-or themselves-secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.

  • - A Practical Approach to Investigation and Defense
    af Nihad Ahmad (IT Security & Digital Forensics Consultant Hassan
    614,95 kr.

  • - The Standard That Killed SSL
    af Branden R. (CISSP Williams
    348,95 kr.

  • - Threatscape and Best Practices
     
    585,95 kr.

    Expert analysis of threatscape and attack vectors.

  • af Henry (Founder Dalziel
    458,95 kr.

  • af Henry (Founder Dalziel
    460,95 kr.

  • af Henry (Founder Dalziel
    457,95 kr.

  • - Algorithms for OSINT
    af Robert (Research Fellow at the Internet Commerce Security Laboratory Layton
    479,95 kr.

    Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As OSINT has applications in crime fighting, state-based intelligence, and social research, this book provides recent advances in text mining, web crawling, and other algorithms that have led to advances in methods that can largely automate this process. The book is beneficial to both practitioners and academic researchers, with discussions of the latest advances in applications, a coherent set of methods and processes for automating OSINT, and interdisciplinary perspectives on the key problems identified within each discipline. Drawing upon years of practical experience and using numerous examples, editors Robert Layton, Paul Watters, and a distinguished list of contributors discuss Evidence Accumulation Strategies for OSINT, Named Entity Resolution in Social Media, Analyzing Social Media Campaigns for Group Size Estimation, Surveys and qualitative techniques in OSINT, and Geospatial reasoning of open data.

  • af Kevin Cardwell
    458,95 kr.

  • af Henry (Founder Dalziel
    458,95 kr.

  • af Henry (Founder Dalziel
    458,95 kr.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.