Télécharger le livre :  Logging and Log Management
Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...

Editeur : Syngress
Parution : 2012-12-31
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Hacker's Guide to OS X
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless...

Editeur : Syngress
Parution : 2012-12-31
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Federal Cloud Computing
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy,...

Editeur : Syngress
Parution : 2012-12-31
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  UTM Security with Fortinet
Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased...

Editeur : Syngress
Parution : 2012-12-31
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Cyber Warfare
The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive...

Editeur : Syngress
Parution : 2012-12-28
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Violent Python
Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....

Editeur : Syngress
Parution : 2012-12-28
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime Investigation Case Studies
Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real...

Editeur : Syngress
Parution : 2012-12-17
epub sans DRM

17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Intrusion Analysis
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and...

Editeur : Syngress
Parution : 2012-12-17
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Keys to the Kingdom
Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the...

Editeur : Syngress
Parution : 2012-12-06
epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Lock Picking
Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking...

Editeur : Syngress
Parution : 2012-11-13
epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking Web Apps
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks...

Editeur : Syngress
Parution : 2012-10-22
epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security Risk Assessment Toolkit
In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those...

Editeur : Syngress
Parution : 2012-10-17
epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Client-Side Attacks and Defense
Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...

Editeur : Syngress
Parution : 2012-09-28
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide
The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common...

Editeur : Syngress
Parution : 2012-09-01
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Observing the User Experience
Observing the User Experience: A Practitioner's Guide to User Research aims to bridge the gap between what digital companies think they know about their users and the actual user experience. Individuals engaged in digital product and service development often fail to...

Editeur : Morgan Kaufmann
Parution : 2012-09-01
epub sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Mastering Windows Network Forensics and Investigation
An authoritative guide to investigating high-technology crimes Internet crime is seemingly ever on the rise, making the need for a comprehensive resource on how to investigate these crimes even more dire. This professional-level book--aimed at law enforcement...

Editeur : Sybex
Parution : 2012-07-30
PDF, ePub

54,12

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Death of the Internet
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize...

Editeur : Wiley-IEEE Computer Society Pr
Parution : 2012-07-11
Collection : IEEE Press PDF, ePub

81,18

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  User Experience in the Age of Sustainability
User Experience in the Age of Sustainability focuses on the economic, sociological and environmental movement in business to make all products including digital ones more sustainable. Not only are businesses finding a significant ROI from these choices, customers are...

Editeur : Morgan Kaufmann
Parution : 2012-05-30
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Predicting Malicious Behavior
A groundbreaking exploration of how to identify and fight security threats at every level This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and...

Editeur : Wiley
Parution : 2012-05-25
PDF, ePub

49,58

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Software Safety and Security
Recent decades have seen major advances in methods and tools for checking the safety and security of software systems. Automatic tools can now detect security flaws not only in programs of the order of a million lines of code, but also in high-level protocol...

Editeur : SAGE Publications Ltd
Parution : 2012-05-15
PDF

118,13

Téléchargement immédiat
Dès validation de votre commande
<< < 1819202122 >