Télécharger le livre :  Securing VoIP

Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...
Editeur : Syngress
Parution : 2014-11-14

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance

Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has...
Editeur : Syngress
Parution : 2014-11-07

Format(s) : PDF
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Designing and Building Security Operations Center

Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...
Editeur : Syngress
Parution : 2014-11-06

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Reconnaissance, Surveillance and Defense

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being...
Editeur : Syngress
Parution : 2014-10-17

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Detecting and Combating Malicious Email

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...
Editeur : Syngress
Parution : 2014-10-07

Format(s) : PDF, epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CSA Guide to Cloud Computing

CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years theCSA has been at the forefront of research...
Editeur : Syngress
Parution : 2014-09-22

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking and Penetration Testing with Low Power Devices

Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...
Editeur : Syngress
Parution : 2014-09-02

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Hiding in Speech Signals for Secure Communication

In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...
Editeur : Syngress
Parution : 2014-08-27

Format(s) : PDF, epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Performance Analysis Field Guide

Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...
Editeur : Syngress
Parution : 2014-08-14

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building an Information Security Awareness Program

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...
Editeur : Syngress
Parution : 2014-08-12

Format(s) : PDF, epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook

Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...
Editeur : Syngress
Parution : 2014-07-16

Format(s) : PDF, epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Information Security

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...
Editeur : Syngress
Parution : 2014-05-20

Format(s) : epub sans DRM
29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Python Forensics

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novicePython programmers to...
Editeur : Syngress
Parution : 2014-05-19

Format(s) : epub sans DRM
55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Targeted Cyber Attacks

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...
Editeur : Syngress
Parution : 2014-04-18

Format(s) : PDF, epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Social Engineering Penetration Testing

Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now,Social Engineering Penetration Testing gives you the practical methodology and...
Editeur : Syngress
Parution : 2014-04-11

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Collaboration with Cloud Computing

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...
Editeur : Syngress
Parution : 2014-04-07

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Forensic Analysis Toolkit

Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...
Editeur : Syngress
Parution : 2014-03-11

Format(s) : epub sans DRM
56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...
Editeur : Syngress
Parution : 2013-12-07

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking with Kali

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...
Editeur : Syngress
Parution : 2013-12-05

Format(s) : epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Network Security Monitoring

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...
Editeur : Syngress
Parution : 2013-11-26

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
<< < 34567 >