| |
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information...
Editeur :
Syngress
Parution :
2010-12-13
epub sans DRM
|
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...
Editeur :
Syngress
Parution :
2010-11-25
epub sans DRM
|
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...
Editeur :
Syngress
Parution :
2010-11-03
epub sans DRM
|
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...
Editeur :
Syngress
Parution :
2010-11-02
epub sans DRM
|
Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...
Editeur :
Syngress
Parution :
2010-10-29
epub sans DRM
|
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows....
Editeur :
Syngress
Parution :
2010-10-28
epub sans DRM
|
A computer forensics "how-to" for fighting malicious code and analyzing incidents With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses,...
Editeur :
Wiley
Parution :
2010-10-01
PDF, ePub
|
Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...
Editeur :
Syngress
Parution :
2010-09-10
epub sans DRM
|
Well-known security experts decipher the most challenging aspect of cloud computing-security Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital...
Editeur :
Wiley
Parution :
2010-08-31
ePub
|
Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem.
Metrics and Methods for...
Editeur :
Syngress
Parution :
2010-08-21
epub sans DRM
|
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...
Editeur :
Syngress
Parution :
2010-08-07
epub sans DRM
|
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec...
Editeur :
Syngress
Parution :
2010-08-06
ePub, PDF sans DRM
|
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition, deals with hackers and hacking. The book is divided into two parts. The first part, entitled "The F0rb1dd3n Network, tells the fictional story of Bob and Leon, two kids caught up in an adventure where they...
Editeur :
Syngress
Parution :
2010-08-06
epub sans DRM
|
The Persona Lifecycle is a field guide exclusively focused on interaction design's most popular new technique.The Persona Lifecycle addresses the "how" of creating effective personas and using those personas to design products that people love. It doesn't just describe...
Editeur :
Morgan Kaufmann
Parution :
2010-08-04
epub sans DRM
|
Building Intelligent Interactive Tutors discusses educational systems that assess a student's knowledge and are adaptive to a student's learning needs.
The impact of computers has not been generally felt in education due to lack of hardware, teacher training, and...
Editeur :
Morgan Kaufmann
Parution :
2010-07-28
epub sans DRM
|
In today's fast paced, infocentric environment, professionals increasingly rely on networked information technology to do business. Unfortunately, with the advent of such technology came new and complex problems that continue to threaten the availability, integrity, and...
Editeur :
Morgan Kaufmann
Parution :
2010-07-27
epub sans DRM
|
As depicted in David Lodge’s celebrated novel Small World, the perceived size of our world experienced a progressive decrease as jet airplanes became affordable to ever greater shares of the earth’s population. Yet, the really dramatic shrinking had to wait until the...
Editeur :
Springer
Parution :
2010-07-16
Collection :
Advanced Information and Knowledge Processing
ePub
|
Digital Triage Forensics: Processing theDigital Crime Scene provides the tools, training, and techniques inDigital Triage Forensics (DTF), a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex...
Editeur :
Syngress
Parution :
2010-07-13
epub sans DRM
|
A Guide for Investigating Network-Based Criminal Cases
Editeur :
Syngress
Parution :
2010-07-02
PDF, epub sans DRM
|
Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of these attacks including how to make your system more secure. You will...
Editeur :
Syngress
Parution :
2010-06-04
epub sans DRM
|