Télécharger le livre :  RFID+ Study Guide and Practice Exams
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a guide to CompTIA's new RFID+ Security exam and includes the following...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Physical and Logical Security Convergence: Powered By Enterprise Security Management
Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, physical security, and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managing Catastrophic Loss of Sensitive Data
Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics with Open Source Tools
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a...

Editeur : Syngress
Parution : 2011-03-29
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  XBOX 360 Forensics
XBOX 360 Forensics is a complete investigation guide for theXBOX game console. Because theXBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to...

Editeur : Syngress
Parution : 2011-02-07
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Application Obfuscation
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Editeur : Syngress
Parution : 2011-01-13
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cybercrime and Espionage
Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently...

Editeur : Syngress
Parution : 2011-01-07
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Registry Forensics
Windows Registry Forensics provides the background of theWindows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are...

Editeur : Syngress
Parution : 2011-01-03
epub sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing SQL Server
Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus...

Editeur : Syngress
Parution : 2010-12-27
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Eleventh Hour CISSP
Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information...

Editeur : Syngress
Parution : 2010-12-13
epub sans DRM

24,21

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Managed Code Rootkits
Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...

Editeur : Syngress
Parution : 2010-11-25
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing the Smart Grid
Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...

Editeur : Syngress
Parution : 2010-11-03
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Ninja Hacking
Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...

Editeur : Syngress
Parution : 2010-11-02
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Citrix XenDesktop Implementation
Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...

Editeur : Syngress
Parution : 2010-10-29
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Guide to Kernel Exploitation
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows....

Editeur : Syngress
Parution : 2010-10-28
epub sans DRM

47,42

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide
CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtainCISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a...

Editeur : Syngress
Parution : 2010-09-16
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Lock Picking
Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...

Editeur : Syngress
Parution : 2010-09-10
epub sans DRM

32,65

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Metrics and Methods for Security Risk Management
Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for...

Editeur : Syngress
Parution : 2010-08-21
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Windows Server 2008 R2 Administrator's Reference
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...

Editeur : Syngress
Parution : 2010-08-07
epub sans DRM

36,87

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Virtualization and Forensics
Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec...

Editeur : Syngress
Parution : 2010-08-06
ePub, PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
<< < 1112131415 >