• (1)
  • (6)
  • (378)
  • (1)
  • (36)
  • (2)
  • (10)
  • (1)
  • (2)
  • (35)
  • (6)
  • (39)
  • (1)
  • (8)
  • (6)
  • (361)
  • (3)
  • (29)
  • (346)
  • (1)
  • (6)
  • (119)
  • (49)
  • (313)
Geografisk plats i boken
  • (2)

Förlag Syngress

Sökningen gav 378 träffar. Använd menyn till vänster för att förfina träfflistan.

  1. Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

    av Tj O'Connor

    Häftad, Engelska, 2012-12-17, ISBN 9781597499576

    Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Pytho...

  2. UTM Security with Fortinet: Mastering FortiOS

    av Kenneth Tam, Martn H Hoz Salvador, Ken Mcalpine, Rick Basile, Bruce Matsugu

    Häftad, Engelska, 2013-01-02, ISBN 9781597497473

    Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required s...

  3. Practical Deployment of Cisco Identity Services Engine (ISE)

    av Andy Richter

    Häftad, Engelska, 2015-11-27, ISBN 9780128044575

    With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy manag...

  4. The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice

    av Derrick Rountree, Ileana Castrillo

    Häftad, Engelska, 2013-11-08, ISBN 9780124059320

    As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people...

  5. Industrial Network Security

    av Eric D Knapp

    Häftad, Engelska, 2014-12-15, ISBN 9780124201149

    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second ...

  6. Eleventh Hour CISSP

    av Eric Conrad

    Häftad, Engelska, 2016-09-24, ISBN 9780128112489

    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification informatio...

  7. A Guide to Kernel Exploitation: Attacking the Core

    av Enrico Perla, Massimiliano Oldani

    Häftad, Engelska, 2010-10-29, ISBN 9781597494861

    The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a d...

  8. Applied Network Security Monitoring: Collection, Detection, and Analysis

    av Chris Sanders, Jason Smith

    Häftad, Engelska, 2014-01-23, ISBN 9780124172081
    (1 röst)

    Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network se...

  9. Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

    av Andrew Jones, Craig Valli

    Häftad, Engelska, 2008-11-24, ISBN 9781856175104

    The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic la...

  10. Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management

    av Anton Chuvakin, Kevin Schmidt, Chris Phillips

    Häftad, Engelska, 2012-12-31, ISBN 9781597496353

    Effectively analyzing large volumes of diverse logs can pose many challenges. Logging and Log Management helps to simplify this complex process using practical guidance and real-world examples. Packed with information you need to know for system, ...

  11. Security Risk Management

    av Evan Wheeler

    Häftad, Engelska, 2011-06-24, ISBN 9781597496155

    The goal of Security Risk Management is to teach you practical techniques that will be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. Security professionals often fall into the...

  12. Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements

    av David Lilburn Watson, Andrew Jones

    Häftad, Engelska, 2013-10-24, ISBN 9781597497428

    This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with down...

  13. Windows Registry Forensics

    av Harlan Carvey

    Häftad, Engelska, 2016-03-31, ISBN 9780128032916

    Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition , provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of t...

  14. The Best Damn IT Security Management Book Period

    av Susan Snedaker, Robert McCrie

    Häftad, Engelska, 2007-12-01, ISBN 9781597492270

    The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continui...

  15. CISSP Study Guide

    av Eric Conrad

    Häftad, Engelska, 2015-12-04, ISBN 9780128024379

    CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwi...

  16. The Basics of Information Security

    av Jason Andress

    Häftad, Engelska, 2014-07-14, ISBN 9780128007440

    As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to under...

  17. SQL Injection Attacks and Defense

    av Justin Clarke

    Häftad, Engelska, 2012-07-27, ISBN 9781597499637

    SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award " SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." -Richard Bejtlich, Tao Secu...

  18. Seven Deadliest Web Application Attacks

    av Mike Shema

    Häftad, Engelska, 2010-05-12, ISBN 9781597495431

    Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying o...

  19. Seven Deadliest Network Attacks

    av Stacy Prowell, Rob Kraus, Mike Borkin

    Häftad, Engelska, 2010-06-02, ISBN 9781597495493

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these ...

  20. X-Ways Forensics Practitioner's Guide

    av Brett Shavers, Eric Zimmerman

    Häftad, Engelska, 2013-10-04, ISBN 9780124116054

    The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and priv...

  21. The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

    av Patrick Engebretson

    Häftad, Engelska, 2013-09-18, ISBN 9780124116443
    (1 röst)

    The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which...

  22. Windows Performance Analysis Field Guide

    av Clint Huffman

    Häftad, Engelska, 2014-08-13, ISBN 9780124167018

    Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Fiel...

  23. The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

    av Steve Winterfeld, Jason Andress

    Häftad, Engelska, 2012-12-31, ISBN 9780124047372

    As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniqu...

  24. FISMA Compliance Handbook: Second Edition

    av Laura P Taylor

    Häftad, Engelska, 2013-10-09, ISBN 9780124058712

    This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal...

  25. Federated Identity Primer

    av Derrick Rountree

    Häftad, Engelska, 2012-12-10, ISBN 9780124071896

    Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more...

  26. Hacking with Kali: Practical Penetration Testing Techniques

    av James Broad, Andrew Bindner

    Häftad, Engelska, 2014-01-03, ISBN 9780124077492

    Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James ...

  27. Introduction to Cyber-Warfare: A Multidisciplinary Approach

    av Paulo Shakarian, Jana Shakarian, Andrew Ruef

    Häftad, Engelska, 2013-08-06, ISBN 9780124078147

    Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber w...

  28. Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace

    av Todd G Shipley, Art Bowker

    Häftad, Engelska, 2013-12-11, ISBN 9780124078178

    Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step ins...

  29. Accelerating MATLAB with GPU Computing: A Primer with Examples

    av Jung W Suh, Youngmin Kim

    Häftad, Engelska, 2013-12-17, ISBN 9780124080805

    Beyond simulation and algorithm development, many developers increasingly use MATLAB even for product deployment in computationally heavy fields. This often demands that MATLAB codes run faster by leveraging the distributed parallelism of Graphics...

  30. Cybercrime Case Presentation: An Excerpt from Placing The Suspect Behind The Keyboard

    av Brett Shavers

    Häftad, Engelska, 2013-02-06, ISBN 9780124095045

    Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey en...