Norges billigste bøker

Bøker utgitt av Syngress Media,U.S.

Filter
Filter
Sorter etterSorter Populære
  • - From Mischief to Malicious
    av Robert (Chief Scientist of Internet Security Systems Graham
    714,-

    An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.

  • av Brien (Freelance technical writer Posey
    859,-

    Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.

  • av Syngress
    859,-

    Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.

  • av Larry (CEO/Chairman of Pluto Networks & Vice President of Advanced Network Technologies Chaffin
    859,-

    A guide to deploying Voice Over IP (VoIP) products. It begins with a discussion of the protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks.

  • av Dave (International Association of Counter Terrorism and Security Professionals Kleiman
    714,-

    Describes the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. This book introduces the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak. The companion web site includes many working scripts.

  • - Configure / Manage / Troubleshoot
    av Umer Khan
    714,-

    The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.

  • av Susan (MCSE Snedaker
    662,-

    Provides a concise system for managing IT projects, regardless of the size or complexity of the project. This work offers a fresh approach to IT project management, combining strategic business concepts with the practical instructions for developing and managing a successful IT project.

  • av Dan (President of Assurance Technology Managment Bendell
    714,-

    SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This book offers a look at the SonicWALL firewall product line. It covers various aspects of the SonicWALL product line from the SOHO devices to the Enterprise SonicWALL firewalls.

  • av Syngress
    645,-

    A guide to Ruby, a popular Object-Oriented Programming Language. It is designed for programmers and developer's looking to embrace the object-oriented features and functionality of this robust programming language. It helps readers learn how to develop, implement, organize and deploy applications using Ruby.

  • - Detect, Exploit, Prevent
    av Jason Deckard
    526,-

    A buffer overflow is an unexpected behavior that exists in certain programming languages. This book provides specific, real code examples on exploiting buffer overflow attacks from a hacker's perspective and defending against these attacks for the software developer.

  • - Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega
    av Joe (President and CEO of Grand Idea Studio Grand
    594,-

    Offers hard-core gamers specific instructions on how to crack into their console and make it do things it was never designed to do. This book provides a guide to hacking popular video gaming consoles.

  • av Mark Fugatt
    526,-

    A road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features, the book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. It explains the options within each menu, and identifies the potential problems.

  • - A Guide to Wireless Security
    av Chris (Senior Penetration Tester Hurley
    645,-

    The practice of WarDriving is a combination of hobby, sociological research, and security assessment. This book is written from the inside perspective of those who have created the tools that make WarDriving possible and those who gather, analyze, and maintain data on all secured and open wireless access points in metropolitan area worldwide.

  • - Amazing Projects You Can Build in Under an Hour
    av Syngress
    389,-

    Lego Mindstorms lets you design and program robots that can do just about anything. This illustrated title provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. It is specifically targeted at new users of the Lego Mindstorms RIS 2.0.

  • - A Complete Toolkit for Microsoft's Undocumented Log Analysis Tool
    av Gabriele (Software Design Engineer Giuseppini
    594,-

    Provides information on Microsoft's log parser tool. This book contains several customized, working scripts and templates useful for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products. It teaches readers how the various queries within Log Parser work, and more.

  • - By Spammer-X
    av Spammer-X Spammer-X
    714,-

    Offers a technically explicit expose of the inner workings of the SPAM economy.

  • av Syngress
    859,-

    Includes coverage of the additions to the PIX Firewall family, including the CiscoSecure PIX Firewall (PIX) Software Release 6.0. This guide instructs the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting, and more.

  • av Drew (Instructor for Black Hat Training Miller
    714,-

    Shows readers the types of attacks that can be done to physical devices such as motion detectors, video monitoring and closed circuit systems, authentication systems, thumbprint and voice print devices, retina scans, and more. This book details methods for attacking and defending physical security devices.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.