Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - Ethical Hacking and Penetration Testing Made Easy
    af Patrick (Assistant Professor of Information Assurance & Senior Penetration Tester for security firm in the Midwest) Engebretson
    371,95 kr.

    Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.

  • - Practical Penetration Testing Techniques
    af James (President and Owner Broad
    479,95 kr.

    Introduces you the distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, this book walks you through creating a custom version of the Kali live distribution.

  • - Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
    af Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    455,95 kr.

    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.

  • af T. (CISSP-ISSAP Bradley
    413,95 kr.

    In his role managing the content for a site and a weekly newsletter, the author has learned how to talk to people about computer security. Here, he provides the home user and the small office computer market with information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

  • af Al (Senior Consultant for SBC\Callisma) Muller
    651,95 kr.

    Contains simple and advanced scripting using ESX and Linux commands to provide virtual tools to automate administrative tasks of ESX Server. This book covers the native tools that VMware provides with ESX Server. It discusses the different scripting API's and how they can be leveraged to provide practical tools to manage a virtual infrastructure.

  • af B. (Senior Technology Consultant with Sierra Systems Consultants Inc. Barber
    540,95 kr.

    Over 95 per cent of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service (WSUS) is designed to provide patches and updates to every one of these computers. This book begins by describing the feature set of WSUS, and the benefits it provides to system administrators.

  • af Marcus Sachs
    656,95 kr.

    Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.

  • af Kent (Vice President of Information Security for a multi-billion dollar financial institution) Nabors, Brian (Deputy Lead Technical Engineer with the Defense Cyber Investigations Training Academy (DCITA)) Baskin, Jayson E (Principle Partner Street & mfl.
    237,95 kr.

    Suitable for Hackers, IT professional, and Infosec aficionados as well as everyday people interested in computer security, this title takes the reader on a global trip through the world of computer security exploits. It shows you how to see the digital world just below the surface of daily life.

  • af Cameron Malin
    723,95 kr.

    Offers a compendium of tools for computer forensics analysts and investigators, presented in a succinct outline format, with cross-references to supplemental appendices. This title is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

  • af Dan ((CISSP)) York
    338,95 kr.

    Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • af Carl (CCIE Timm
    329,95 kr.

    Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.

  • af Mike (Web Application Security Solutions Shema
    330,95 kr.

    Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • af Brad (Chief researcher of Renderlab.net) Haines
    331,95 kr.

    Pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. This book helps you discover the best ways to defend against these vicious hacks with step-by-step instructions and techniques to make your computer and network impenetrable.

  • af Brian (An avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.) Anderson
    338,95 kr.

    Details the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. This title helps you discover the best ways to defend against these vicious hacks with step-by-step instructions.

  • - Exam XK0-003 Study Guide
    af Chris (managing consultant for Liberty Trio Happel
    307,95 kr.

    Keyed to the XK0-003 revision of the CompTIA Linux+exam, this book is streamlined to include only core certification information and is presented for ease of last-minute studying. It covers the main objectives of the exam with key concepts highlighted. It also includes 'Top Five toughest questions and answers to help you to prepare.

  • - Exam N10-004 Study Guide
    af Naomi (Consultant Alpern
    314,95 kr.

    Covers the main objectives of CompTIA Network+ exam, highlighting key concepts. This title features Exam Warnings that highlight particularly tough sections of the exam. It includes review of five toughest questions by topic.

  • - Exam SY0-201 Study Guide
    af Ido (Chief Security Advisor Dubrawsky
    317,95 kr.

    Focuses on the essentials needed to pass the Security+ certification exam. The book includes: Exam Objectives - Fast Track Review; Key words/definitions; Five Toughest questions and their answers; and, Exam Warnings - What to pay attention to. It also includes review of five toughest questions by topic.

  • - Identifying Patterns in the Chaos
    af Jacob (Contractor with a government agency filling the role of Intrusion Detection Team Lead) Babbin
    646,95 kr.

    Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing the 'Top 10' security logs that IT professionals should be regularly analyzing.

  • af Syngress
    889,95 kr.

    Covers major Cisco Internetworking concepts and configurations. This book offers cross reference to Cisco internetworking topics that include: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. It also covers technologies that include: AVVID, SIP, MGCP, and more.

  • af Syngress
    852,95 kr.

    Offers coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. This book covers: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; and, supporting an increased number of addressable nodes.

  • af Neil R. Wyler
    655,95 kr.

    Provide a detailed analysis of the timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. This book demonstrates and explores controversial network strike back and countermeasure techniques.

  • - Exam N10-004 2E
    af Robert (Director Shimonski
    785,95 kr.

    CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. This title covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools.

  • af Frank (Owner Thornton
    653,95 kr.

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this book presents a "How to Cheat" approach to the topic.

  • af Johnny (Security Researcher Long
    465,95 kr.

    Teaches readers how to use Instant Messaging and Phone calls over the Internet. This book covers the program Google Talk, from detailed information about each of its features, to an analysis of how it works. It also covers techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.

  • af Robert (Information security and management consultant and Senior Instructor for (ISC)^2 Slade
    411,95 kr.

    Presents a compilation of security terms and definitions that working security professionals and IT students will find helpful. This work covers malware, wireless technologies, and phishing. It also helps IT professionals and IT students to identify terms used in practice, in journals and articles, and on websites.

  • - Prevent Attacks from Outside and Inside Your Organization
    af Aaron (Senior Microsoft Consultant. COE Lead for Unified Communications Tiensivu
    792,95 kr.

    Describes various technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system. This book outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment.

  • - Investigating and Analyzing Malicious Code
    af Eoghan (Eoghan Casey Casey
    903,95 kr.

    Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.

  • af Susan (MCSE Snedaker
    846,95 kr.

    Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries, this volume includes topics such as: Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design Integration.

  • af Johnny (Security Researcher) Long
    788,95 kr.

    Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying some of the risks, threats, and vulnerabilities, discussing the countermeasures to address them. It shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.

  • - Including Outlook Web, Mobile, and Voice Access
    af Henrik (Senior Microsoft Server Consultant Walther
    562,95 kr.

    A reference for the multitasked system administrators. It tries to balance the growing needs for performance, cost effectiveness, and security. It includes coverage of major release of Exchange Server. It emphasizes best-practice security measures for various areas and in particular the area of remote access via Outlook.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.