Télécharger le livre :  Cyber Security Awareness for CEOs and Management
Cyber Security for CEOs and Managment  is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your...

Editeur : Syngress
Parution : 2015-12-09
epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Mobile Data Loss
The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss....

Editeur : Syngress
Parution : 2015-12-09
epub sans DRM

22,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Editeur : Syngress
Parution : 2015-12-08
PDF, epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide
CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Editeur : Syngress
Parution : 2015-12-08
PDF

43,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Editeur : Syngress
Parution : 2015-12-07
PDF, epub sans DRM

55,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Editeur : Syngress
Parution : 2015-12-07
epub sans DRM

36,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Breaking into Information Security
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...

Editeur : Syngress
Parution : 2015-12-05
PDF, epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Automating Open Source Intelligence
Algorithms for Automating Open Source Intelligence (OSINT) presents information on the gathering of information and extraction of actionable intelligence from openly available sources, including news broadcasts, public repositories, and more recently, social media. As...

Editeur : Syngress
Parution : 2015-12-03
PDF, epub sans DRM

43,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers
Google is the most popular search engine ever created, but Google's search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets,...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

43,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Operating System Forensics
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

52,02

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

52,02

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Theoretical and Experimental Methods for Defending Against DDoS Attacks
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavailable due to overloading the resource or machine with an overwhelming number of packets, thereby crashing or severely slowing the performance of the resource. Distributed...

Editeur : Syngress
Parution : 2015-11-10
epub sans DRM

52,02

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  A Study of Black Hole Attack Solutions
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated...

Editeur : Syngress
Parution : 2015-11-03
PDF, epub sans DRM

52,02

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thor's OS Xodus
Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X...

Editeur : Syngress
Parution : 2015-10-28
epub sans DRM

43,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI DSS 3.1
PCI DSS has recently updated its standard to 3.1. While the changes are fairly minor in nature, there are massive implications to companies relying on SSL as a scope reducing tool inside their enterprise. This update book goes through the specific changes toPCI DSS 3.1,...

Editeur : Syngress
Parution : 2015-09-14
epub sans DRM

22,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing
Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability...

Editeur : Syngress
Parution : 2015-08-31
epub sans DRM

55,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  You: For Sale
Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every time you visit a website, use a credit card, drive on the freeway, or go past a CCTV camera, you are logged and...

Editeur : Syngress
Parution : 2015-08-20
PDF, epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Smart Grid Security
The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing...

Editeur : Syngress
Parution : 2015-08-11
epub sans DRM

87,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing Social Media in the Enterprise
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks,...

Editeur : Syngress
Parution : 2015-08-11
PDF, epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Next Generation Red Teaming
Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of theRed Team is to see how weak or otherwise the organization's security posture is....

Editeur : Syngress
Parution : 2015-08-10
PDF, epub sans DRM

29,56

Téléchargement immédiat
Dès validation de votre commande
<< < 12345 >