Utvidet returrett til 31. januar 2025

Bøker utgitt av Syngress Media,U.S.

Filter
Filter
Sorter etterSorter Populære
  • - Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
    av Richard (Internationally recognized expert in the areas of Security Power
    961,-

    The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.

  • - True Stories of Insider Threats and Enterprise Security Management Countermeasures
    av Brian T (CISSP Contos
    707,-

    Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.

  • - Detect, Exploit, Prevent
    av Steven (Member of the FBI’s Infragard Organization and Penetration Tester of Critical Federal Network Infrastructure) Palmer
    851,-

    Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.

  • av David (Formerly UK's National Health Service Harley
    851,-

    Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.

  • - Own it...Just Like Windows or Linux!
    av Chris (Senior Penetration Tester Hurley
    851,-

    Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.

  • - Independent and Complete Self-Paced Solutions
    av Anthony Piltzecker
    758,-

    The Real MCTS/MCITP Exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. This title helps newcomers to Microsoft certification, study for and pass MCTS exam for Active Directory on their way to MCITP certification.

  • - Auditor's Guide to Writing Secure Code for the Web
    av Mark (Independent researcher Burnett
    707,-

    Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.

  • - Independent and Complete Self-Paced Solutions
    av Brien (Freelance technical writer Posey
    851,-

    The Microsoft Certified Technology Specialist (MCTS)/MCITP exam is designed to validate Windows Server 2008 network infrastructure configuration skills. It will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. This title addresses both newcomers to MS certification, and those who are upgrading from Windows 2003.

  • av Brian (Snort.org webmaster Caswell
    690,-

    A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.

  • av Anthony Piltzecker
    707,-

    Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.

  • av Chris (Senior Penetration Tester Hurley
    673,-

    Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.

  • av CISSP Porter
    690,-

    Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network. This book covers a variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems.

  • - Live Response, Forensic Analysis, and Monitoring
    av Harlan (DFIR analyst Carvey
    707,-

    Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.

  • av Jesse (Jesse Varsalone is a Cisco Certified Academy Instructor and holds the CCNA certification. Jesse is also a CISSP Varsalone
    724,-

    Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.

  • av Rob (Security Solutions Engineer for Juniper Networks Cameron
    851,-

    Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this configuration guide allows you to configure these appliances to allow remote and mobile access for employees.

  • - A Comprehensive Handbook
     
    851,-

    Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.

  • av Mario (Author of bestselling "Building Robots with LEGO Mindstorms" Ferrari
    555,-

    Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.

  • av Fergus (Founder and Director of Corporate OnSite Strachan
    707,-

    A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.

  • av Anthony (Retired Detective with the New York City Police Department’s Computer Crimes Squad Reyes
    809,-

    Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.

  • av Paul ((GCIA Asadoorian
    555,-

    Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.

  • av Brian Frederick & Chris Adams
    605,-

    According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and hosting Web applications and services. For the average SysAdmin, it presents a difficult migration path. This title aims to help the SysAdmin get IIS 7 up and running as quickly as possible.

  • av Ido (Chief Security Advisor Dubrawsky
    673,-

    Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. This book identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, and email threats.

  • - Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
    av Michael (President Gregg
    707,-

    Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers of a network. It includes chapters that focus on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. It features a chapter on the mythical eighth layer: the people layer.

  • av Andy Jones
    639,-

    Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.

  • av Thomas W (Member of Microsoft’s ISA Server Beta Team and Microsoft MVP for ISA Server Shinder
    690,-

    Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.

  • av Mark (A+ Horninger
    639,-

    A book for multi-tasked IT managers responsible for securing the version of SQL Server 2005. It provides the multi-tasked Sys Admin with the useful information needed to perform the daily tasks. It covers SQL Server 2005, which is a massive product with significant challenges for IT managers. It emphasizes best-practice security measures.

  • av Jan ((CCIE #12136-Security Kanclirz
    639,-

    Suitable for the multitasked SysAdmin, this book tells how you can automate Windows Vista installation. It also shows how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK). It tells how to install and maintain devices.

  • av Anthony Piltzecker
    809,-

    Shows you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have control over your servers and web sites using tools like IIS7, Windows Server Manager, and Windows PowerShell; and, secure your network with Network Access Protection and the Read-Only Domain Controller.

  • av Ira ((CISSP) Winkler
    462,-

    Describes the real security threats that you have to worry about, and more importantly, what to do about them. This book is suitable for the business, consumer, and technical users short on time but looking for information along with reader friendly analogies.

  • av Amber (CEO Schroader
    851,-

    Describes how alternate data storage devices (ADS) are used to both move and hide data. This book features case studies that demonstrate how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more.

Gjør som tusenvis av andre bokelskere

Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.