Télécharger le livre :  Combating Spyware in the Enterprise
Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware.Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently...

Editeur : Syngress
Parution : 2006-08-04
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Syngress IT Security Project Management Handbook
The definitive work for IT professionals responsible for the management of the design, configuration, deployment, and maintenance of enterprise wide security projects. Provides specialized coverage of key project areas including Penetration Testing, Intrusion Detection...

Editeur : Syngress
Parution : 2006-07-04
PDF sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Winternals Defragmentation, Recovery, and Administration Field Guide
The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide.The book begins with a chapter describing the most common challenges faced by system administrators related to system recovery, data backup and system...

Editeur : Syngress
Parution : 2006-06-19
PDF sans DRM

36,87

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Video Conferencing over IP: Configure, Secure, and Troubleshoot
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.For many years, the promise of high quality, low cost video...

Editeur : Syngress
Parution : 2006-06-07
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  RFID Security
RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring SonicWALL Firewalls
SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. TheSonicWALL firewall appliance has had the largest annual growth in the security...

Editeur : Syngress
Parution : 2006-05-25
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical VoIP Security
Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the...

Editeur : Syngress
Parution : 2006-03-31
PDF sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Configuring ISA Server 2004
How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex server products up and running. While books twice its size may be...

Editeur : Syngress
Parution : 2006-03-16
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Microsoft Operations Manager 2005
Microsoft Operations Manager (MOM) is a network monitoring tool that provides enterprise-class event and performance management for Windows Server System technologies. MOM's event and performance management tools discover problems before system administrators would ever...

Editeur : Syngress
Parution : 2006-03-01
PDF sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2006-02-08
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Log Management
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing...

Editeur : Syngress
Parution : 2006-01-27
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools...

Editeur : Syngress
Parution : 2006-01-11
PDF sans DRM

50,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Perfect Passwords
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.Every...

Editeur : Syngress
Parution : 2006-01-09
PDF sans DRM

21,05

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Writing Security Tools and Exploits
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit,...

Editeur : Syngress
Parution : 2006-01-05
PDF sans DRM

32,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Designing Security for a Windows Server 2003 Network
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. SecuringWindows Server, according to bill...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Editeur : Syngress
Parution : 2005-12-15
PDF sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Skype Me! From Single User to Small Enterprise and Beyond
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Editeur : Syngress
Parution : 2005-12-12
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing IM and P2P Applications for the Enterprise
This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X for Hackers at Heart
The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker's eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world's foremost...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Server Update Services
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Editeur : Syngress
Parution : 2005-12-12
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
<< < 1617181920 >