Bøger udgivet af Syngress Media,U.S.
-
- Bog
- 272,95 kr.
-
- Building an Information Security Risk Management Program from the Ground Up
364,95 kr. Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.
- Bog
- 364,95 kr.
-
- How to Own a Continent
648,95 kr. A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.
- Bog
- 648,95 kr.
-
- Mastering FortiOS
656,95 kr. Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.
- Bog
- 656,95 kr.
-
352,95 kr. - Bog
- 352,95 kr.
-
580,95 kr. - Bog
- 580,95 kr.
-
582,95 kr. - Bog
- 582,95 kr.
-
820,95 kr. - Bog
- 820,95 kr.
-
345,95 kr. Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This title shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, or making decisions too quickly.
- Bog
- 345,95 kr.
-
609,95 kr. Guides you through the tasks of implementing XenDesktop for your company. This book addresses how to implement a Virtual Desktop Infrastructure (VDI) solution using Citrix XenDesktop. It includes technical details required for you to evaluate how Citrix XenDesktop would integrate into your existing environment.
- Bog
- 609,95 kr.
-
723,95 kr. Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. This book presents the tools, training, and techniques from this practice. It outlines pre- and post-blast investigations.
- Bog
- 723,95 kr.
-
689,95 kr. Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in C/C++, Java, Perl and NASL; Sockets - the technology that allows programs and scripts to communicate over a network is sockets; and, Shellcode which is commonly defined as bytecode converted from Assembly.
- Bog
- 689,95 kr.
-
- An Excerpt from Malware Forensic Field Guide for Linux Systems
241,95 kr. Includes companions for any digital and computer forensic investigator and analyst. This title is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab. It addresses malware artifact discovery and extraction from a live Linux system.
- Bog
- 241,95 kr.
-
535,95 kr. Managers responsible for IT/Security departments from mall office environments up to enterprise networks need to have an understanding of all IT security issues to effectively manage their departments. This book covers the basic concepts and practices of security, and provides basic information about the technical details of many of the products.
- Bog
- 535,95 kr.
-
- Leveraging Social Networking While Mitigating Risk
594,95 kr. Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. This book acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
- Bog
- 594,95 kr.
-
- Bog
- 774,95 kr.
-
588,95 kr. Offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.
- Bog
- 588,95 kr.
-
- A Practical Guide to Secure Computing
346,95 kr. Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.
- Bog
- 346,95 kr.
-
- Exploiting OS X from the Root Up
575,95 kr. A guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers. It discusses the basics of the OS X environment and its vulnerabilities. It also includes useful tips and strategies for exploiting and compromising OS X systems.
- Bog
- 575,95 kr.
-
345,95 kr. Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. This book describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for personal and enterprise email environments.
- Bog
- 345,95 kr.
-
- Methodologies, Tools, and Techniques for Incident Analysis and Response
577,95 kr. Provides information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. This title focuses on the methodology of an attack as well as the investigative methodology, challenges, and concerns.
- Bog
- 577,95 kr.
-
- How to Own the Box
637,95 kr. Contains a series of 25 to 30 page chapter by world-renowned network security personalities written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems.
- Bog
- 637,95 kr.
-
- Understanding the Danger and How to Protect Your Organization
587,95 kr. Discusses the critical information that readers need to know about APT and how to avoid being a victim. This book covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; and critical information on how to respond and recover from an intrusion.
- Bog
- 587,95 kr.
-
- Keeping Your VoIP Network Safe
564,95 kr. Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.
- Bog
- 564,95 kr.
-
- A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
583,95 kr. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, the authors get paid to uncover weaknesses in those systems and exploit them. This book reveals those secrets.
- Bog
- 583,95 kr.
-
- A Digital Forensic Investigator's Guide to Virtual Environments
723,95 kr. Virtualization creates new and difficult challenges for forensic investigations. This book offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. It also explains the process of virtualization and the different types of virtualized environments.
- Bog
- 723,95 kr.
-
- Cross Site Scripting Exploits and Defense
786,95 kr. Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to sensitive data theft and monetary losses.
- Bog
- 786,95 kr.
-
538,95 kr. Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available software.
- Bog
- 538,95 kr.
-
678,95 kr. - Bog
- 678,95 kr.
-
- Bog
- 685,95 kr.