Télécharger le livre :  CD and DVD Forensics
CD and DVD Forensics will take the reader through all facets of handling, examining, and processingCD and DVD evidence for computer forensics. At a time where data forensics is becoming a major part of law enforcement and prosecution in the public sector, and corporate...

Editeur : Syngress
Parution : 2006-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring Juniper Networks NetScreen and SSG Firewalls
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to...

Editeur : Syngress
Parution : 2006-12-08
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Assessment: From Vulnerability to Patch
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks.This is unique in that...

Editeur : Syngress
Parution : 2006-12-02
PDF sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cryptography for Developers
The only guide for software developers who must learn and implement cryptography safely and cost effectively.Cryptography for Developers begins with a chapter that introduces the subject of cryptography to the reader.The second chapter discusses how to implement large...

Editeur : Syngress
Parution : 2006-12-01
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the...

Editeur : Syngress
Parution : 2006-11-08
epub sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Editeur : Syngress
Parution : 2006-11-08
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Syngress Force Emerging Threat Analysis
A One-Stop Reference Containing the Most Read Topics in the Syngress Security LibraryThis Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats TodayThis is the perfect reference for any IT professional responsible for protecting their enterprise...

Editeur : Syngress
Parution : 2006-11-08
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Scripting VMware Power Tools: Automating Virtual Infrastructure Administration
This book contains simple and advanced scripting using both ESX and Linux commands to provide awesome virtual tools to automate administrative tasks of ESX Server.This book will cover the native tools that VMware provides with ESX Server. It will then discuss in detail...

Editeur : Syngress
Parution : 2006-11-07
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hack the Stack
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found...

Editeur : Syngress
Parution : 2006-11-06
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Enemy at the Water Cooler
The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees, contractors, and partners). It explores organized crime, terrorist threats, and...

Editeur : Syngress
Parution : 2006-10-30
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment--this book shows you how.This book will detail the...

Editeur : Syngress
Parution : 2006-10-13
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Windows System Administration Using Command Line Scripts
How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using Windows command line scripts. With every new version of Windows,...

Editeur : Syngress
Parution : 2006-10-09
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Designing and Building Enterprise DMZs
This is the only book available on building network DMZs, which are the cornerstone of any good enterprise security configuration. It covers market-leading products from Microsoft, Cisco, and Check Point.One of the most complicated areas of network technology is...

Editeur : Syngress
Parution : 2006-10-09
PDF sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Firewall Policies and VPN Configurations
A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing...

Editeur : Syngress
Parution : 2006-09-28
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a VoIP Network with Nortel's Multimedia Communication Server 5100
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview...

Editeur : Syngress
Parution : 2006-08-31
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. This book provides the busy network administrator with best-practice solutions to securing...

Editeur : Syngress
Parution : 2006-08-22
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Information Security
This is the only book that covers all the topics that any budding security manager needs to know!This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know...

Editeur : Syngress
Parution : 2006-08-22
epub sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  BigNum Math
Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and single precision. The purpose of this text is to instruct the reader...

Editeur : Syngress
Parution : 2006-08-18
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dictionary of Information Security
The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful.IT professionals and IT students will find this a handy reference to help them identify terms used in...

Editeur : Syngress
Parution : 2006-08-18
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Joe Grand's Best of Hardware, Wireless, and Game Console Hacking
The book introduces the principles of hardware design and describes the tools and techniques required to begin hacking.The DVD contains hack instructions for over 20 game consoles and hardware devices from Nintendo, Apple, Sony, Microsoft, Palm and more.The presentation...

Editeur : Syngress
Parution : 2006-08-18
PDF sans DRM

26,32

Téléchargement immédiat
Dès validation de votre commande
<< < 1516171819 >