Télécharger le livre :  Federal Cloud Computing

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy,...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data Hiding

As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Logging and Log Management

Logging and Log Management: The Authoritative Guide to Understanding the Concepts SurroundingLogging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Augmented Reality

With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Blackhatonomics

Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  FISMA and the Risk Management Framework

FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  UTM Security with Fortinet

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased...
Editeur : Syngress
Parution : 2012-12-31

Format(s) : epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Cyber Warfare

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive...
Editeur : Syngress
Parution : 2012-12-28

Format(s) : epub sans DRM
25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Violent Python

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language....
Editeur : Syngress
Parution : 2012-12-28

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime Investigation Case Studies

Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real...
Editeur : Syngress
Parution : 2012-12-17

Format(s) : epub sans DRM
17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Intrusion Analysis

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and...
Editeur : Syngress
Parution : 2012-12-17

Format(s) : epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Keys to the Kingdom

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the...
Editeur : Syngress
Parution : 2012-12-06

Format(s) : epub sans DRM
46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Lock Picking

Practical Lock Picking, Second Edition, is an instructional manual that covers everything from straightforward lockpicking to quick-entry techniques such as shimming, bumping, and bypassing. Written by Deviant Ollam, one of the security industry's best-known lockpicking...
Editeur : Syngress
Parution : 2012-11-13

Format(s) : epub sans DRM
46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking Web Apps

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks...
Editeur : Syngress
Parution : 2012-10-22

Format(s) : epub sans DRM
46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security Risk Assessment Toolkit

In order to protect company's information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what needs protected, what risks those assets are exposed to, what controls are in place to offset those...
Editeur : Syngress
Parution : 2012-10-17

Format(s) : epub sans DRM
46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Client-Side Attacks and Defense

Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery methods including, but not limited to, browser exploitation, use of rich...
Editeur : Syngress
Parution : 2012-09-28

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam's Common...
Editeur : Syngress
Parution : 2012-09-01

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data...
Editeur : Syngress
Parution : 2012-09-01

Format(s) : epub sans DRM
48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing SQL Server

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In SecuringSQL Server, 2e, readers learn about the potential attack vectors...
Editeur : Syngress
Parution : 2012-07-17

Format(s) : epub sans DRM
41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Forensics Field Guide for Windows Systems

Malware Forensics Field Guide for Windows Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...
Editeur : Syngress
Parution : 2012-05-11

Format(s) : epub sans DRM
29,49

Téléchargement immédiat
Dès validation de votre commande
<< < 678910 >