Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - The Killer Web Applications
    af Craig (CISO for Portland State University and President of Hawkeye Security Training Schiller
    656,95 kr.

    Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals using real world examples. It covers what they are, how they operate, and the environment and technology that makes them possible. It analyzes botnets for opportunities to detect, track, and remove them.

  • - Study Guide and Practice Exams
    af Paul (Educator Sanghera
    503,95 kr.

    A guide to CompTIA's RFID+ Security exam.

  • - Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
    af James Steele
    744,95 kr.

    Discusses the hard questions cyber crime investigators are asking. This book includes chapters that discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. It examines issues relating to cyber crime definitions, the electronic crime scene, and preparing and presenting a cyber crime investigation in court.

  • af William P (Former Deputy Director Crowell
    810,95 kr.

    Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape. This work details enterprise security management as it relates to incident detection and incident management.

  • af L. Taylor
    887,95 kr.

    Explains what is meant by Certification and Accreditation and why the process is mandated by federal law. This book cites and discusses the different Certification and Accreditation laws including the three leading types of C&A: NIST, NIAP, and DITSCAP. It also explains how to prepare for, perform, and document a C&A project.

  • - Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
    af Richard (Internationally recognized expert in the areas of Security Power
    902,95 kr.

    The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.

  • - True Stories of Insider Threats and Enterprise Security Management Countermeasures
    af Brian T (CISSP Contos
    640,95 kr.

    Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.

  • - Detect, Exploit, Prevent
    af Steven (Member of the FBI’s Infragard Organization and Penetration Tester of Critical Federal Network Infrastructure) Palmer
    806,95 kr.

    Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.

  • af David (Formerly UK's National Health Service Harley
    805,95 kr.

    Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.

  • - Own it...Just Like Windows or Linux!
    af Chris (Senior Penetration Tester Hurley
    790,95 kr.

    Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.

  • - Independent and Complete Self-Paced Solutions
    af Anthony Piltzecker
    825,95 kr.

    The Real MCTS/MCITP Exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. This title helps newcomers to Microsoft certification, study for and pass MCTS exam for Active Directory on their way to MCITP certification.

  • - Auditor's Guide to Writing Secure Code for the Web
    af Mark (Independent researcher Burnett
    680,95 kr.

    Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.

  • - Independent and Complete Self-Paced Solutions
    af Brien (Freelance technical writer Posey
    818,95 kr.

    The Microsoft Certified Technology Specialist (MCTS)/MCITP exam is designed to validate Windows Server 2008 network infrastructure configuration skills. It will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. This title addresses both newcomers to MS certification, and those who are upgrading from Windows 2003.

  • af Brian (Snort.org webmaster Caswell
    691,95 kr.

    A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.

  • af Anthony Piltzecker
    668,95 kr.

    Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.

  • af Chris (Senior Penetration Tester Hurley
    621,95 kr.

    Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.

  • af CISSP Porter
    643,95 kr.

    Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network. This book covers a variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems.

  • - Live Response, Forensic Analysis, and Monitoring
    af Harlan (DFIR analyst Carvey
    643,95 kr.

    Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.

  • af Jesse (Jesse Varsalone is a Cisco Certified Academy Instructor and holds the CCNA certification. Jesse is also a CISSP Varsalone
    766,95 kr.

    Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.

  • af Rob (Security Solutions Engineer for Juniper Networks Cameron
    820,95 kr.

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this configuration guide allows you to configure these appliances to allow remote and mobile access for employees.

  • - A Comprehensive Handbook
     
    798,95 kr.

    Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.

  • af Mario (Author of bestselling "Building Robots with LEGO Mindstorms" Ferrari
    526,95 kr.

    Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.

  • af Fergus (Founder and Director of Corporate OnSite Strachan
    662,95 kr.

    A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.

  • af Anthony (Retired Detective with the New York City Police Department’s Computer Crimes Squad Reyes
    792,95 kr.

    Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.

  • af Paul ((GCIA Asadoorian
    513,95 kr.

    Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.

  • af Brian Frederick & Chris Adams
    635,95 kr.

    According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and hosting Web applications and services. For the average SysAdmin, it presents a difficult migration path. This title aims to help the SysAdmin get IIS 7 up and running as quickly as possible.

  • af Ido (Chief Security Advisor Dubrawsky
    636,95 kr.

    Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. This book identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, and email threats.

  • - Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
    af Michael (President Gregg
    656,95 kr.

    Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers of a network. It includes chapters that focus on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. It features a chapter on the mythical eighth layer: the people layer.

  • af Andy Jones
    657,95 kr.

    Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.

  • af Thomas W (Member of Microsoft’s ISA Server Beta Team and Microsoft MVP for ISA Server Shinder
    673,95 kr.

    Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.