Télécharger le livre :  The Best Damn Windows Server 2008 Book Period
Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies;...

Editeur : Syngress
Parution : 2011-08-31
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Editeur : Syngress
Parution : 2011-08-25
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  iPhone and iOS Forensics
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...

Editeur : Syngress
Parution : 2011-07-25
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...

Editeur : Syngress
Parution : 2011-07-21
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is...

Editeur : Syngress
Parution : 2011-07-21
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thor's Microsoft Security Bible
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...

Editeur : Syngress
Parution : 2011-07-16
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Information Security
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and...

Editeur : Syngress
Parution : 2011-07-16
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Editeur : Syngress
Parution : 2011-07-13
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing the Cloud
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The...

Editeur : Syngress
Parution : 2011-04-21
epub sans DRM

40,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Risk Management
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Editeur : Syngress
Parution : 2011-04-20
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Digital Forensic Laboratory
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...

Editeur : Syngress
Parution : 2011-04-19
epub sans DRM

66,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-642 Prep Kit
This exam is designed to validate Windows Server 2008 network infrastructure configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642.This is a test for new certification seekers, not for those who are...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Application Vulnerabilities
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them,...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn IT Security Management Book Period
The security field evolves rapidly becoming broader and more complex each year.The common thread tying the field together is the discipline of management.The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  AVIEN Malware Defense Guide for the Enterprise
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the sharing of information about new threats at a speed that even anti-virus...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Perl Scripting for Windows Security
I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, andI used a lot of Perl in both books. Okay…I'll come clean…I used nothing but Perl in...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Catastrophic Loss of Sensitive Data
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-620 Prep Kit
This exam is designed to validate proficieny supporting Windows Vista client.This exam will fulfill the Windows Vista Technology Specialist requirements of Exam 70-620.The Microsoft Certified Technology Specialist (MCTS) on Windows Vista credential is intended for...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  No Tech Hacking
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
<< < 89101112 >