Markedets billigste bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - for Computer Hacking Forensic Investigator
    af FL, USA.) Kleiman, Dave (International Association of Counter Terrorism and Security Professionals, mfl.
    853,95 kr.

    Suitable for security professionals, systems administrators, IT consultants, legal professionals, IT managers, police and law enforcement personnel studying for the CHFI (Computer Hacking Forensics Investigator) certification, and professionals needing the skills to gather the necessary evidence to prosecute, this title provides guidance for CHFI.

  • af Mark (A+ Horninger
    659,95 kr.

    A book for multi-tasked IT managers responsible for securing the version of SQL Server 2005. It provides the multi-tasked Sys Admin with the useful information needed to perform the daily tasks. It covers SQL Server 2005, which is a massive product with significant challenges for IT managers. It emphasizes best-practice security measures.

  • af Jan ((CCIE #12136-Security Kanclirz
    666,95 kr.

    Suitable for the multitasked SysAdmin, this book tells how you can automate Windows Vista installation. It also shows how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK). It tells how to install and maintain devices.

  • af Anthony Piltzecker
    800,95 kr.

    Shows you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have control over your servers and web sites using tools like IIS7, Windows Server Manager, and Windows PowerShell; and, secure your network with Network Access Protection and the Read-Only Domain Controller.

  • af Ira ((CISSP) Winkler
    405,95 kr.

    Describes the real security threats that you have to worry about, and more importantly, what to do about them. This book is suitable for the business, consumer, and technical users short on time but looking for information along with reader friendly analogies.

  • af Amber (CEO Schroader
    783,95 kr.

    Describes how alternate data storage devices (ADS) are used to both move and hide data. This book features case studies that demonstrate how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more.

  • - Including Vmware, Xen, and Microsoft Virtual Server
    af Rogier (MCSE NT4 Dittner
    844,95 kr.

    Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. This book details the requirements for such a project, and includes sample forms and templates, and delivers several physical to virtual migration strategies.

  • af James Foster
    688,95 kr.

    Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.

  • af Rob (Security Solutions Engineer for Juniper Networks Cameron
    645,95 kr.

    NetScreen is a firewall appliance. This book offers a look at the NetScreen firewall product line. It features various aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. It also covers advanced troubleshooting techniques and the NetScreen Security Manager.

  • af Anthony Piltzecker
    514,95 kr.

    Microsoft Operations Manager is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. This work delivers open and scalable enterprise-class operational management by providing event management, proactive monitoring and alerting, reporting and trend analysis, and more.

  • af Eric Cole
    480,95 kr.

    Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.

  • af Markus Daehne
    478,95 kr.

    Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members. Skype's Application Programming Interface (API) allows users to develop their own applications. This book helps the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC.

  • af Barry J (Founder and President of CPUG Stiefel
    670,95 kr.

    Protect your network from both internal and external threats. Check Point NGX VPN-1/Firewall-1 is a Check Point's flagship firewall software product. This book provides coverage of features of this product, allowing 3rd party partners to certify NGX add-on products quickly.

  • af Steven Andres
    794,95 kr.

    Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage of network design so administrators understand how they should design and protect their enterprises.

  • - Deploying Network and Host IPS
    af Michael Rash
    658,95 kr.

    Provides an introduction to the field of Intrusion Prevention and offers detailed information on various IPS methods and technologies. This book covers specific methods, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, and session sniping.

  • af Syngress
    660,95 kr.

    Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.

  • af David (Senior Researcher Maynor
    734,95 kr.

    Deals with the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. This book provides professional penetration testers and security researchers with an integrated suite of tools for discovering, running, and testing exploit code.

  • - Discover, Detect, and Eradicate the Internet's Greatest Threat
    af Paul (Director of Threat Research for Webroot Piccard
    651,95 kr.

    Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.

  • af Michael (Computer security consultant Gough
    646,95 kr.

    De-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.

  • af Michael Cross
    674,95 kr.

    Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers to defend their applications. This book defines Web application security, why it should be addressed in the lifecycle in development and quality assurance, and how it differs from other types of Internet security.

  • af Debra (MCSE Littlejohn Shinder
    493,95 kr.

    Written by an expert on Installing, Configuring, Managing and Troubleshooting ISA Server, this book can be used as a quick reference to ISA Server. It includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation.

  • - From Mischief to Malicious
    af Robert (Chief Scientist of Internet Security Systems Graham
    668,95 kr.

    An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.

  • af Brien (Freelance technical writer Posey
    802,95 kr.

    Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.

  • af Melissa (Vice President of Dane Holdings Craft
    665,95 kr.

    Covers Citrix MetaFrame Presentation Server 3.0 and Windows Server 2003 Terminal Services. This book shows how to manage applications from a central location and access them from anywhere, and also how to build scalable, flexible, and secure access solutions that reduce computing costs and increase the utility of your network.

  • af Syngress
    821,95 kr.

    Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.

  • af Larry (CEO/Chairman of Pluto Networks & Vice President of Advanced Network Technologies Chaffin
    789,95 kr.

    A guide to deploying Voice Over IP (VoIP) products. It begins with a discussion of the protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks.

  • af Dave (International Association of Counter Terrorism and Security Professionals Kleiman
    659,95 kr.

    Describes the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. This book introduces the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak. The companion web site includes many working scripts.

  • - Configure / Manage / Troubleshoot
    af Umer Khan
    662,95 kr.

    The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.

  • - In the Land of the Blind, the One-Eyed Man is King
    af Susan (MCSE Snedaker
    659,95 kr.

    Features the "80/20" Rule applied to managing a Windows Small Business Server 2003 network. This book offers concise coverage, with ready-to-use solutions, of the most commonly encountered W2K3 Server tasks and problems. It is written for the non-MCSE, with little technical training, who is responsible for running a small to medium sized network.

  • af Syngress
    675,95 kr.

    Bluetooth is the most exciting development in wireless computing. This title provides embedded applications developers with advanced tutorials and code listings written to the Bluetooth's specification, version 1.1.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.