Télécharger le livre :  No Tech Hacking
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-642 Prep Kit
This exam is designed to validate Windows Server 2008 network infrastructure configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-642.This is a test for new certification seekers, not for those who are...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X Exploits and Defense
Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Botnets
The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what they are, how they operate, and the environment and technology that makes...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Linksys WRT54G Ultimate Hacking
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing Your Network
Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime Investigations
Written by a former NYPD cyber cop, this is the only book available that discusses the hard questions cyber crime investigators are asking.The book begins with the chapter "What is Cyber Crime? This introductory chapter describes the most common challenges faced by...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at VoIP Security
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It gives the...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-640 Prep Kit
This exam is designed to validate Windows Server 2008 Active Directory skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640.The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  E-discovery: Creating and Managing an Enterprisewide Program
One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is the process by which parties involved in litigation respond to requests to produce electronically stored information (ESI). According to the 2007 Socha-Gelbmann Electronic...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

59,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-643 Prep Kit
This exam is designed to validate Windows Server 2008 applications platform configuration skills.This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely available, and powerful, Open Source tools. Learn how to test and audit...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Deploying and Securing RFID
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Juniper(r) Networks Secure Access SSL VPN Configuration Guide
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dr. Tom Shinder's ISA Server 2006 Migration Guide
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental upgrade from ISA Server 2004, this book provides all of the tips and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Reverse Engineering Code with IDA Pro
If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all useLinux as their standard operating system. This book teachesLinux system...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance
Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring VmWare ESX Server
A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress' proven...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
<< < 1011121314 >