Télécharger le livre :  Practical Anonymity

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...
Editeur : Syngress
Parution : 2013-07-19

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Risk Management Framework

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be...
Editeur : Syngress
Parution : 2013-07-03

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of...
Editeur : Syngress
Parution : 2013-06-27

Format(s) : epub sans DRM
63,25

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.The book teaches students how to properly utilize and interpret the results of...
Editeur : Syngress
Parution : 2013-06-24

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Web Hacking

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system,...
Editeur : Syngress
Parution : 2013-06-18

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Cyber-Warfare

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...
Editeur : Syngress
Parution : 2013-05-16

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Wireshark Field Guide

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that...
Editeur : Syngress
Parution : 2013-05-14

Format(s) : epub sans DRM
29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Simple Steps to Data Encryption

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be...
Editeur : Syngress
Parution : 2013-04-30

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies forWindows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and...
Editeur : Syngress
Parution : 2013-04-18

Format(s) : epub sans DRM
60,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide forLinux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and...
Editeur : Syngress
Parution : 2013-04-12

Format(s) : PDF, epub sans DRM
17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Assessing Vendors

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the...
Editeur : Syngress
Parution : 2013-04-10

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows 2012 Server Network Security

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...
Editeur : Syngress
Parution : 2013-03-19

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Cyber Security and the Smart Grid

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and...
Editeur : Syngress
Parution : 2013-02-26

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a...
Editeur : Syngress
Parution : 2013-02-01

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime Investigative Case Management

Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard.Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected...
Editeur : Syngress
Parution : 2013-01-15

Format(s) : epub sans DRM
17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime Case Presentation

Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an...
Editeur : Syngress
Parution : 2013-01-15

Format(s) : epub sans DRM
17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Advanced Persistent Threat

The newest threat to security has been categorized as the Advanced Persistent Threat or APT.The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Hacker's Guide to OS X

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Wireless Reconnaissance in Penetration Testing

In many penetration tests, there is a lot of useful information to be gathered from the radios used by organizations. These radios can include two-way radios used by guards, wireless headsets, cordless phones and wireless cameras. Wireless Reconnaissance in Penetration...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Federated Identity Primer

Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
21,05

Téléchargement immédiat
Dès validation de votre commande
<< < 56789 >