Télécharger le livre :  Meeting People via WiFi and Bluetooth

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon...
Editeur : Syngress
Parution : 2015-12-09

Format(s) : epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security Awareness for Lawyers

Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as...
Editeur : Syngress
Parution : 2015-12-09

Format(s) : epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members

Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...
Editeur : Syngress
Parution : 2015-12-08

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide

CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...
Editeur : Syngress
Parution : 2015-12-08

Format(s) : PDF
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook

Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...
Editeur : Syngress
Parution : 2015-12-07

Format(s) : PDF, epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics

Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...
Editeur : Syngress
Parution : 2015-12-07

Format(s) : epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Breaking into Information Security

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...
Editeur : Syngress
Parution : 2015-12-05

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Automating Open Source Intelligence

Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As...
Editeur : Syngress
Parution : 2015-12-03

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)

With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...
Editeur : Syngress
Parution : 2015-11-12

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Operating System Forensics

Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...
Editeur : Syngress
Parution : 2015-11-12

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers

Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...
Editeur : Syngress
Parution : 2015-11-12

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks

Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...
Editeur : Syngress
Parution : 2015-11-10

Format(s) : epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Study of Black Hole Attack Solutions

Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...
Editeur : Syngress
Parution : 2015-11-03

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thor's OS Xodus

Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X...
Editeur : Syngress
Parution : 2015-10-28

Format(s) : epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI DSS 3.1

PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes toPCI DSS 3.1,...
Editeur : Syngress
Parution : 2015-09-14

Format(s) : epub sans DRM
23,16

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...
Editeur : Syngress
Parution : 2015-08-31

Format(s) : epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  You: For Sale

Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...
Editeur : Syngress
Parution : 2015-08-20

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing Social Media in the Enterprise

Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks,...
Editeur : Syngress
Parution : 2015-08-11

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Smart Grid Security

The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...
Editeur : Syngress
Parution : 2015-08-11

Format(s) : epub sans DRM
90,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Next Generation Red Teaming

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....
Editeur : Syngress
Parution : 2015-08-10

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
<< < 12345 >