Télécharger le livre :  Phishing Exposed
Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...

Editeur : Syngress
Parution : 2005-11-21
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring Check Point NGX VPN-1/Firewall-1
Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...

Editeur : Syngress
Parution : 2005-11-01
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at IT Project Management
This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...

Editeur : Syngress
Parution : 2005-10-21
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Software Piracy Exposed
This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy...

Editeur : Syngress
Parution : 2005-10-07
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly...

Editeur : Syngress
Parution : 2005-10-07
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Nessus, Snort, and Ethereal Power Tools
Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix...

Editeur : Syngress
Parution : 2005-09-14
PDF sans DRM

35,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring VMware ESX Server 2.5
This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...

Editeur : Syngress
Parution : 2005-08-31
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Evaluation Using the NSA IEM
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...

Editeur : Syngress
Parution : 2005-08-26
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network: How to Own an Identity
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Editeur : Syngress
Parution : 2005-08-24
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Host Integrity Monitoring Using Osiris and Samhain
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover...

Editeur : Syngress
Parution : 2005-07-25
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco PIX Firewalls
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX...

Editeur : Syngress
Parution : 2005-06-21
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network+ Study Guide & Practice Exams
The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware,...

Editeur : Syngress
Parution : 2005-06-17
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Editeur : Syngress
Parution : 2005-06-02
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery...

Editeur : Syngress
Parution : 2005-05-24
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...

Editeur : Syngress
Parution : 2005-04-26
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Aggressive Network Self-Defense
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark...

Editeur : Syngress
Parution : 2005-04-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

Editeur : Syngress
Parution : 2005-03-15
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, theBlack Hat experts show readers the types of attacks that can be done to physical devices...

Editeur : Syngress
Parution : 2005-03-15
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Intrusion Prevention and Active Response
Intrusion Prevention and Active Response provides an introduction to the field ofIntrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response...

Editeur : Syngress
Parution : 2005-03-04
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Apple I Replica Creation
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...

Editeur : Syngress
Parution : 2005-02-17
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
<< < 1718192021 >