| |
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes...
Editeur :
Syngress
Parution :
2011-04-18
epub sans DRM
|
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for theMetasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing....
Editeur :
Syngress
Parution :
2011-04-18
epub sans DRM
|
The Perfect Reference for the Multitasked System AdministratorsThe new version of Exchange is an ambitious overhaul that tries to balance the growing needs for performance, cost effectiveness, and security. For the average system administrator, it will present a...
Editeur :
Syngress
Parution :
2011-04-18
epub sans DRM
|
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics information to be compatible with the new set and to show how sound, sight,...
Editeur :
Syngress
Parution :
2011-04-18
epub sans DRM
|
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic...
Editeur :
Syngress
Parution :
2011-04-18
epub sans DRM
|
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
"This book contains some of the most up-to-date information available anywhere on a wide variety of topics related to Techno Security. As you read the book, you will notice that the authors took the approach of identifying some of the risks, threats, and vulnerabilities...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Learn to pull "digital fingerprints from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department of Defense in bleeding edge digital forensics techniques. This book...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the application of computer investigation and analysis techniques to perform an...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them,...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.Compiled from the best of the Syngress firewall library and authored by product...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place in real time. This includes instant messaging (IM), Voice over IP...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...
Editeur :
Syngress
Parution :
2011-04-18
PDF sans DRM
|