Télécharger le livre :  Microsoft Log Parser Toolkit
Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find...

Editeur : Syngress
Parution : 2005-02-10
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Buffer Overflow Attacks
The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by...

Editeur : Syngress
Parution : 2005-01-29
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking a Terror Network: The Silent Threat of Covert Channels
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically...

Editeur : Syngress
Parution : 2005-01-27
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and...

Editeur : Syngress
Parution : 2004-12-31
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring NetScreen Firewalls
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security...

Editeur : Syngress
Parution : 2004-12-31
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users...

Editeur : Syngress
Parution : 2004-12-17
PDF sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to...

Editeur : Syngress
Parution : 2004-11-20
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Inside the SPAM Cartel
Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think...

Editeur : Syngress
Parution : 2004-11-13
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Game Console Hacking
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and Microsoft. In addition, there is an enormous installed "retro gaming" base...

Editeur : Syngress
Parution : 2004-11-12
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals...

Editeur : Syngress
Parution : 2004-11-05
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Wireless Hacking: Projects for Wi-Fi Enthusiasts
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include...

Editeur : Syngress
Parution : 2004-10-29
epub sans DRM

35,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Nessus Network Auditing
This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be...

Editeur : Syngress
Parution : 2004-10-14
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Small Business Server 2003
How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle. - The...

Editeur : Syngress
Parution : 2004-09-23
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Mezonic Agenda: Hacking the Presidency
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography.The book tells the tale of criminal hackers attempting to compromise the results of...

Editeur : Syngress
Parution : 2004-09-23
PDF sans DRM

29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Zero-Day Exploit
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will...

Editeur : Syngress
Parution : 2004-07-16
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Adversary Characterization
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism.The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive...

Editeur : Syngress
Parution : 2004-07-09
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Richard Thieme's Islands in the Clickstream
CNN called Richard Thieme "a member of the cyber avant-garde". Digital Delirium named him "one of the most creative minds of the digital generation". Now Richard Thieme's wisdom on the social and cultural dimensions of technology is available in a single volume....

Editeur : Syngress
Parution : 2004-06-26
PDF sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn Windows Server 2003 Book Period
In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000...

Editeur : Syngress
Parution : 2004-06-18
PDF sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT Ethics Handbook:
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival...

Editeur : Syngress
Parution : 2004-06-11
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Snort 2.1 Intrusion Detection, Second Edition
Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other...

Editeur : Syngress
Parution : 2004-06-06
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
<< < 1819202122 >