Télécharger le livre :  Infosec Management Fundamentals

Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business...
Editeur : Syngress
Parution : 2015-08-10

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dissecting the Hack

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor,Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a...
Editeur : Syngress
Parution : 2015-07-20

Format(s) : PDF, epub sans DRM
30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Python Passive Network Mapping

Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a...
Editeur : Syngress
Parution : 2015-06-10

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Cloud Security Ecosystem

Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosystem comprehensively discusses a range of cloud security topics from multi-disciplinary and international perspectives, aligning technical security implementations with the...
Editeur : Syngress
Parution : 2015-06-01

Format(s) : PDF, epub sans DRM
90,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing SQL Server

SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In SecuringSQL Server, Third Edition, you will learn about the potential...
Editeur : Syngress
Parution : 2015-04-27

Format(s) : PDF, epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking Web Intelligence

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is,...
Editeur : Syngress
Parution : 2015-04-13

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Social Media Investigation

If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds...
Editeur : Syngress
Parution : 2015-03-14

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  HCISPP Study Guide

The HCISPP certification is a globally-recognized, vendor-neutral exam for healthcare information security and privacy professionals, created and administered by ISC².The new HCISPP certification, focused on health care information security and privacy, is similar to...
Editeur : Syngress
Parution : 2014-12-11

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Earth Forensics

Google Earth Forensics is the first book to explain how to useGoogle Earth in digital forensic investigations. This book teaches you how to leverage Google's free tool to craft compelling location-based evidence for use in investigations and in the courtroom. It shows...
Editeur : Syngress
Parution : 2014-12-09

Format(s) : epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Augmented Reality Law, Privacy, and Ethics

Augmented Reality (AR) is the blending of digital information in a real-world environment. A common example can be seen during any televised football game, in which information about the game is digitally overlaid on the field as the players move and position...
Editeur : Syngress
Parution : 2014-12-09

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Digital Forensics

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to...
Editeur : Syngress
Parution : 2014-12-09

Format(s) : PDF, epub sans DRM
29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Industrial Network Security

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with...
Editeur : Syngress
Parution : 2014-12-09

Format(s) : epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building an Intelligence-Led Security Program

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no...
Editeur : Syngress
Parution : 2014-12-08

Format(s) : PDF, epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to US Cybersecurity Careers

Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Defeat Advanced Malware

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Optimizing IEEE 802.11i Resource and Security Essentials

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : PDF, epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Machine-Learning Approach to Phishing Detection and Defense

Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account numbers, and user logins and passwords, as well as other information entered via a web site. The authors of A...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Attack and Defend Your Website

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application,...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : PDF, epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Define and Build an Effective Cyber Threat Intelligence Capability

Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept ofIntelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees,...
Editeur : Syngress
Parution : 2014-12-05

Format(s) : PDF, epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security Analytics

Information Security Analytics gives you insights into the practice of analytics and, more importantly, how you can utilize analytic techniques to identify trends and outliers that may not be possible to identify using traditional security analysis...
Editeur : Syngress
Parution : 2014-11-25

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
<< < 23456 >