Télécharger le livre :  Windows Forensic Analysis DVD Toolkit
Windows Forensic Analysis DVD Toolkit, Second Edition, is a completely updated and expanded version of Harlan Carvey's best-selling forensics book on incident response and investigating cybercrime onWindows systems. With this book, you will learn how to analyze data...

Editeur : Syngress
Parution : 2009-06-01
PDF, epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real Citrix CCA Exam Preparation Kit
The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification.The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of...

Editeur : Syngress
Parution : 2009-05-18
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  SQL Injection Attacks and Defense
Winner of the Best Book Bejtlich Read in 2009 award! "SQL injection is probably the number one problem for any server-side application, and this book is unequaled in its coverage." Richard Bejtlich, http://taosecurity.blogspot.com/ SQL injection represents one of the...

Editeur : Syngress
Parution : 2009-05-05
epub sans DRM

40,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer and Information Security Handbook
Presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. Also imparts the skills and knowledge needed to identify and counter some...

Editeur : Morgan Kaufmann
Parution : 2009-05-04
epub sans DRM

102,28

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Security Governance
The Growing Imperative Need for Effective Information Security Governance With monotonous regularity, headlines announce ever more spectacular failures of information security and mounting losses.The succession of corporate debacles and dramatic control failures in...

Editeur : Wiley
Parution : 2009-04-14
Collection : Wiley Series in Systems Engineering and Management PDF, ePub

107,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road...

Editeur : Syngress
Parution : 2009-04-10
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security in a Web 2.0+ World
Information security has matured significantly since it was developed as an ad-hoc solution by large enterprises and the military; from the initial art of security it has become a science with structured standards and more certainty expected from its activities.Security...

Editeur : Wiley
Parution : 2009-04-08
PDF

39,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Intrusion
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2009-03-17
PDF, ePub

18,99

Téléchargement immédiat
Dès validation de votre commande
Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay --...

Editeur : Wiley
Parution : 2009-03-16
PDF, ePub

28,80

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Forefront Security Administration Guide
Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for...

Editeur : Syngress
Parution : 2009-02-07
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best of 2600, Collector's Edition
In response to popular demand, Emmanuel Goldstein (aka, Eric Corley) presents a spectacular collection of the hacker culture, known as 2600: The Hacker Quarterly, from a firsthand perspective. Offering a behind-the-scenes vantage point, this book provides devoted fans...

Editeur : Wiley
Parution : 2009-01-26
PDF

91,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Forensics For Dummies
Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the...

Editeur : For Dummies
Parution : 2008-11-24
PDF, ePub

35,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hardware-based Computer Security Techniques to Defeat Hackers
Presents primary hardware-based computer security approaches in an easy-to-read toolbox format Protecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and...

Editeur : Wiley
Parution : 2008-09-22
PDF

131,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Risk
The human element is the principle cause of incidents and accidents in all technology industries; hence it is evident that an understanding of the interaction between humans and technology is crucial to the effective management of risk. Despite this, no tested model...

Editeur : Wiley
Parution : 2008-09-15
PDF

160,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Techno Security's Guide to Securing SCADA
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are...

Editeur : Syngress
Parution : 2008-08-23
epub sans DRM

59,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Kismet Hacking
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that...

Editeur : Syngress
Parution : 2008-08-08
epub sans DRM

47,42

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Forensics
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of...

Editeur : Syngress
Parution : 2008-08-08
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The IT Regulatory and Standards Compliance Handbook
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and...

Editeur : Syngress
Parution : 2008-07-25
epub sans DRM

59,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  UNIX and Linux Forensic Analysis DVD Toolkit
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of...

Editeur : Syngress
Parution : 2008-07-24
epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Scene of the Cybercrime
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases.When the first...

Editeur : Syngress
Parution : 2008-07-21
epub sans DRM

46,37

Téléchargement immédiat
Dès validation de votre commande
<< < 2627282930 >