Télécharger le livre :  Professional Penetration Testing

Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities...
Editeur : Syngress
Parution : 2025-01-21

Format(s) : epub sans DRM
98,10

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Antivirus Engines

Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies...
Editeur : Syngress
Parution : 2024-10-21

Format(s) : epub sans DRM
119,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Industrial Network Security

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with...
Editeur : Syngress
Parution : 2024-03-26

Format(s) : PDF, epub sans DRM
82,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP® Study Guide

CISSP® Study Guide, Fourth Edition provides the latest updates onCISSP® certification, the most prestigious, globally-recognized, vendor neutral exam for information security professionals. In this new edition, readers will learn about what's included in the newest...
Editeur : Syngress
Parution : 2023-01-25

Format(s) : PDF, epub sans DRM
64,30

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Research Methods for Cyber Security

Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question,...
Editeur : Syngress
Parution : 2017-04-19

Format(s) : epub sans DRM
87,51

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing the Internet of Things

Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to...
Editeur : Syngress
Parution : 2017-01-11

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Federal Cloud Computing

Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including theFederal Cloud Computing Strategy, Cloud Computing Standards,...
Editeur : Syngress
Parution : 2017-01-05

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking Wireless Access Points

Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field...
Editeur : Syngress
Parution : 2016-12-08

Format(s) : PDF, epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Advanced Persistent Security

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book...
Editeur : Syngress
Parution : 2016-11-30

Format(s) : PDF, epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Lossless Information Hiding in Images

Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical...
Editeur : Syngress
Parution : 2016-11-14

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Contemporary Digital Forensic Investigations of Cloud and Mobile Applications

Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and...
Editeur : Syngress
Parution : 2016-10-12

Format(s) : PDF, epub sans DRM
75,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Practical Information Security Program

Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate...
Editeur : Syngress
Parution : 2016-10-03

Format(s) : epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Handbook of System Safety and Security

Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of...
Editeur : Syngress
Parution : 2016-10-02

Format(s) : epub sans DRM
150,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Integrating Python with Leading Computer Forensics Platforms

Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use....
Editeur : Syngress
Parution : 2016-09-26

Format(s) : PDF, epub sans DRM
53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit

Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This...
Editeur : Syngress
Parution : 2016-09-20

Format(s) : PDF, epub sans DRM
45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Mobile Security and Privacy

Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security.Mobile devices and apps have...
Editeur : Syngress
Parution : 2016-09-14

Format(s) : PDF, epub sans DRM
75,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data Hiding Techniques in Windows OS

- "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of...
Editeur : Syngress
Parution : 2016-09-08

Format(s) : PDF, epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Coding for Penetration Testers

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool...
Editeur : Syngress
Parution : 2016-09-03

Format(s) : PDF, epub sans DRM
37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Eleventh Hour CISSP®

Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for...
Editeur : Syngress
Parution : 2016-09-03

Format(s) : PDF, epub sans DRM
23,16

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Cyber Safety

The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world.The book's author,...
Editeur : Syngress
Parution : 2016-08-20

Format(s) : epub sans DRM
23,16

Téléchargement immédiat
Dès validation de votre commande
123 >