De Aller-Bedste Bøger - over 12 mio. danske og engelske bøger
Levering: 1 - 2 hverdage

Bøger udgivet af Syngress Media,U.S.

Filter
Filter
Sorter efterSorter Populære
  • - While Ensuring Evidentiary Integrity
    af Chet (President Hosmer, Joshua (CEECS Bartolomie & Rosanne (PMP Pelli
    801,95 kr.

  • af Jelle (Netherlands Defense Academy and University of Amsterdam) Van Haaster, Martijn (Red teaming and security advisor) Sprengers & Rickey (Chief Intelligence Officer Gevers
    574,95 kr.

  • - A Strategic-Based Approach
    af Timothy (Timothy J. Shimeall Shimeall
    871,95 kr.

    Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.

  • af John R. (Information Technology Consultant and Researcher Vacca
    599,95 kr.

    Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.

  • - Techniques, Tactics and Tools for Security Practitioners
    af Jason (CISSP Andress
    484,95 kr.

    Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.

  • - Tools and Techniques to Attack the Web
    af Josh Pauli
    359,95 kr.

    Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.

  • af Brett (Digital Forensics Practitioner Shavers
    694,95 kr.

    A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.

  •  
    717,95 kr.

    Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.

  • af Susan (MCSE Snedaker
    837,95 kr.

    Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    af Brett (Digital Forensics Practitioner Shavers
    235,95 kr.

    Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

  • - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    af Brett (Digital Forensics Practitioner Shavers
    695,95 kr.

    Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.

  • - Understanding the Fundamentals of Cloud Computing in Theory and Practice
    af Derrick ((CISSP Rountree
    413,95 kr.

    Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.

  • - Collection, Detection, and Analysis
    af Chris (Senior Information Security Analyst at the DoD Sanders
    614,95 kr.

    A guide to becoming an NSM analyst from the ground up. It takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. It discusses the proper methods for data collection, and teaches you how to become a skilled NSM analyst.

  • - Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
    af David Lilburn (Head Watson
    1.010,95 kr.

    Includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody - from incident response through analysis in the lab.

  • - A Physical Penetration Tester's Training Guide
    af Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    364,95 kr.

    Includes lessons that allow even beginners to acquire the knowledge they need quickly. This title features: full-color photos make learning as easy as picking a lock; companion website is filled with indispensible lock picking videos; and extensive appendix details tools and toolkits currently available for all your lock picking needs.

  • - A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
    af TJ O'Connor
    589,95 kr.

    Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices.

  • - Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    af Jason (CISSP Andress
    360,95 kr.

    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

  • af Leighton (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT)) Johnson
    903,95 kr.

  • - A Hands-on Approach
    af Jennifer (College of Information Studies Golbeck
    602,95 kr.

    If you're interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources. . Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.

  • af Justin Clarke-Salt
    565,95 kr.

    Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.

  • - Detecting and Preventing Web Application Security Problems
    af Mike (Web Application Security Solutions Shema
    588,95 kr.

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.

  • - Practical Assessments through Data Collection and Data Analysis
    af Mark (Chief Threat Scientist of Zvelo Inc) Talabis
    364,95 kr.

    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.

  • - Advances, Challenges and Future Research Directions
    af Man Ho (Assistant Professor Au & Raymond (Fulbright Scholar and Senior Lecturer Choo
    1.130,95 kr.

  • - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
    af Michael T. (CISSP Raggo
    583,95 kr.

    Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.

  • - Investigation, Analysis and Mobile Security for Google Android
    af Andrew (Former adjunct professor (assembly language) and owner of viaForensics) Hoog
    815,95 kr.

    Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).

  • - Analyzing and Troubleshooting Network Traffic
    af Robert (Director Shimonski
    405,95 kr.

    Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.

  • - The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management
    af Kevin (is a team lead and senior software developer at SecureWorks Schmidt
    611,95 kr.

    Effectively analyzing large volumes of diverse logs can pose many challenges. This title helps to simplify this complex process using practical guidance and real-world examples. It includes information on different uses for logs - from system operations to regulatory compliance.

  • - Implementing Security Controls into the Modern Power Infrastructure
    af Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    691,95 kr.

    Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

  • - Attacking the Core
    af Enrico (Kernel Programmer Perla
    647,95 kr.

    Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.

  • af Sean-Philip (CISSP Oriyano
    591,95 kr.

    Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.