De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - Measuring the Vulnerability to Data Compromises
    af Carl (Managing Director and Chief Security Officer Young
    813,95 kr.

  • af Iraj Sadegh Amiri & Mohammad Reza Khalifeh (B.Eng (Electronics) Soltanian
    773,95 kr.

  • - Uncovering Covert Communication Methods with Forensic Analysis
    af Brett (Digital Forensics Practitioner Shavers & John (MFCE Bair
    690,95 kr.

  • af Derrick ((CISSP Rountree
    292,95 kr.

    Identity authentication and authorization are integral tasks in the digital world. This book describes technology behind and implementation of federated identity systems. It helps you decide if federated identity is good for your system or web service. It also helps you learn about internet authentication and federated authentication.

  • af Rob (CISSP Kraus
    328,95 kr.

    Pinpoints the dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure.

  • - Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
    af Yuri Diogenes
    882,95 kr.

    Shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. This book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.

  • - Hiding in Plain Sight Online
    af Peter (Internet-Standard.com Loshin
    348,95 kr.

    A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. It features step-by-step instructions for configuring and using anonymous networking software.

  • - An Inside Look at the Economics of Cybercrime
    af Will (Faculty Member of the IANS Institute where he specializes in advanced threat Gragido
    467,95 kr.

    Explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. This book takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.

  • - Using Hacking Skills to Win the Job Hunt Game
    af Josh (Senior Security Consultant More
    353,95 kr.

    There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. This book explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It suggests how to research new possible job opportunities.

  • af Henry (Founder Dalziel
    309,95 kr.

    Intelligence-Led Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of Intelligence-Led Security. Protecting a business, including its information and intellectual property, physical infrastructure, employees, and reputation, has become increasingly difficult. Online threats come from all sides: internal leaks and external adversaries; domestic hacktivists and overseas cybercrime syndicates; targeted threats and mass attacks. And these threats run the gamut from targeted to indiscriminate to entirely accidental. . Among thought leaders and advanced organizations, the consensus is now clear. Defensive security measures: antivirus software, firewalls, and other technical controls and post-attack mitigation strategies are no longer sufficient. To adequately protect company assets and ensure business continuity, organizations must be more proactive. Increasingly, this proactive stance is being summarized by the phrase Intelligence-Led Security: the use of data to gain insight into what can happen, who is likely to be involved, how they are likely to attack and, if possible, to predict when attacks are likely to come. In this book, the authors review the current threat-scape and why it requires this new approach, offer a clarifying definition of what Cyber Threat Intelligence is, describe how to communicate its value to business, and lay out concrete steps toward implementing Intelligence-Led Security.

  • af Henry (Founder Dalziel
    326,95 kr.

    Introduction to US Cybersecurity Careers is a concise introduction to the world of cybersecurity and the career opportunities therein. This book provides a basic rundown of industry sectors, roles, and places to search for job opportunities within the US cybersecurity industry. Within this book is vital information for anyone trying to get into the industry - basic knowledge for those looking to start training for a career, tips on networking and resume-building in a fast-evolving and nontraditional sector, and advice on how to get your foot in the door and become recognized in your field. This book is designed to help those who are just starting out in cybersecurity and those who have training and knowledge and want to get into the industry. Introduction to US Cybersecurity Careers is your first-stop reference for everything you need to know to start your journey.

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    af Brett (Digital Forensics Practitioner Shavers
    235,95 kr.

    Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. This title teaches you how to place the suspect behind the keyboard using case studies.

  • af Tom (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) St Denis
    609,95 kr.

    Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small. Introducing the reader to the concept of bignum algorithms, this book shows how efficient multiple precision algorithms can be implemented.

  • - An Excerpt from Placing The Suspect Behind The Keyboard
    af Brett (Digital Forensics Practitioner Shavers
    232,95 kr.

    Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. This title deals with this topic.

  • - Scripting and Analysis
    af Jaron (Senior Intrusion Analyst Bradley
    690,95 kr.

  • af Ron Honick
    524,95 kr.

    Talks about software piracy - what it is and how it's done. This book describes how software piracy is actually being carried out. It describes how software is actually stolen and traded over the internet. It discusses security implications resulting from over 1/2 of the internet's computers running illegal, unpatched, pirated software.

  • af Syngress
    783,95 kr.

    Provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. This work shows readers how to use these products to create a secure network with virtual private networking features. It also covers various objectives on Check Point's CCSA exam.

  • af Eric (Independant network security consultant and speaker Cole
    539,95 kr.

    Takes readers through the different issues involved in spying on someone online. This book begins with an explanation of reasons and ethics, covers the psychology of spying, and describes computer and network basics. It takes readers step-by-step through many common online activities, and also shows what can be done to compromise them.

  • af Melissa M. Meyer
    539,95 kr.

    Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95 per cent of all companies running it. This book teaches readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements.

  • - Selection, Protection, Authentication
    af Mark (Independent researcher Burnett
    330,95 kr.

    Teaches users how to select passwords that always meet complexity requirements. This book examines the password problem from the perspective of the administrator trying to secure their network.

  • af Lance (Chief Technology Officer of Secure Science Corporation James
    638,95 kr.

    Unveils the techniques phishers employ that enable them to commit fraudulent acts against the global financial industry. This work also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. It provides a view from both sides of the playing field, and is useful for the average internet user.

  • af James (Member of CompTIA’s Linux+ Advisory Committee Stanger
    616,95 kr.

    Helps you deploy a Linux system on the Internet in a variety of security roles. This book shows you how to use your Linux skills to provide the important security services such as encryption, authentication, access control, and logging. It covers hardening the operating system, implementing an intrusion detection system, and defending databases.

  • - How to Own a Shadow
    af Johnny (Security Researcher Long
    638,95 kr.

    Suitable for law enforcement and security professionals.

  • af Khai (Technical Documentation Manager Tran
    792,95 kr.

    Provides a systematic approach to creating secure wireless networks, using the Plan, Design, Implement, and Optimize model. Using straightforward language, this book describes deployment best practices, what SonicWALL security appliances do, and how they interoperate within an existing or new network.

  • af Craig (CISO for Portland State University and President of Hawkeye Security Training Schiller
    780,95 kr.

    Suitable for IT professionals managing enterprise security, this book allows readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. It includes topics such as: Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence and Payment Card Industry (PCI).

  • - On AODV Routing Protocol in MANET
    af Iraj Sadegh Amiri
    778,95 kr.

  • - Real-World Examples of AAA Deployments
    af Andy (Principle Network Security Engineer Richter
    799,95 kr.

    With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that unifies and automates access control to proactively enforce role-based access to enterprise networks. In Practical Deployment of Cisco Identity Services Engine (ISE), Andy Richter and Jeremy Wood share their expertise from dozens of real-world implementations of ISE and the methods they have used for optimizing ISE in a wide range of environments. ISE can be difficult, requiring a team of security and network professionals, with the knowledge of many different specialties. Practical Deployment of Cisco Identity Services Engine (ISE) shows you how to deploy ISE with the necessary integration across multiple different technologies required to make ISE work like a system. Andy Richter and Jeremy Wood explain end-to-end how to make the system work in the real world, giving you the benefit of their ISE expertise, as well as all the required ancillary technologies and configurations to make ISE work.

  • - The Primer for Getting Started in Digital Forensics
    af John (Associate Professor and Director of the Digital Forensics and Information Assurance program Sammons
    263,95 kr.

    The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Second Edition of this book provides you with completely up-to-date real-world examples and all the key technologies used in digital forensics, as well as new coverage of network intrusion response, how hard drives are organized, and electronic discovery. You''ll also learn how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness. The Second Edition also features expanded resources and references, including online resources that keep you current, sample legal documents, and suggested further reading. Learn what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for in an examSecond Edition features all-new coverage of hard drives, triage, network intrusion response, and electronic discovery; as well as updated case studies, expert interviews, and expanded resources and references

  • - Understand and Implement Effective PCI Data Security Standard Compliance
    af Cism, TX) Williams, Branden R. (CISSP, mfl.
    807,95 kr.

  • af David (SC Magazine Nathans
    583,95 kr.