Télécharger le livre :  Securing VoIP
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud...

Editeur : Syngress
Parution : 2014-11-14
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  PCI Compliance
Identity theft and other confidential information theft have now topped the charts as the leading cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? The new Fourth Edition of PCI Compliance has...

Editeur : Syngress
Parution : 2014-11-07
PDF

52,02

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Designing and Building Security Operations Center
Do you know what weapons are used to protect against cyber warfare and what tools to use to minimize their impact? How can you gather intelligence that will allow you to configure your system to ward off attacks? Online security and privacy issues are becoming more and...

Editeur : Syngress
Parution : 2014-11-06
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Reconnaissance, Surveillance and Defense
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being...

Editeur : Syngress
Parution : 2014-10-17
PDF, epub sans DRM

46,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Detecting and Combating Malicious Email
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully...

Editeur : Syngress
Parution : 2014-10-07
PDF, epub sans DRM

24,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CSA Guide to Cloud Computing
CSA Guide to Cloud Computing brings you the most current and comprehensive understanding of cloud security issues and deployment techniques from industry thought leaders at the Cloud Security Alliance (CSA). For many years theCSA has been at the forefront of research...

Editeur : Syngress
Parution : 2014-09-22
PDF, epub sans DRM

46,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking and Penetration Testing with Low Power Devices
Hacking and Penetration Testing with Low Power Devices shows you how to perform penetration tests using small, low-powered devices that are easily hidden and may be battery-powered. It shows how to use an army of devices, costing less than you might spend on a laptop,...

Editeur : Syngress
Parution : 2014-09-02
PDF, epub sans DRM

46,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Information Hiding in Speech Signals for Secure Communication
In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a...

Editeur : Syngress
Parution : 2014-08-27
PDF, epub sans DRM

55,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Performance Analysis Field Guide
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a...

Editeur : Syngress
Parution : 2014-08-14
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building an Information Security Awareness Program
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an...

Editeur : Syngress
Parution : 2014-08-12
PDF, epub sans DRM

46,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Crime and Cyber Terrorism Investigator's Handbook
Cyber Crime andCyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some...

Editeur : Syngress
Parution : 2014-07-16
PDF, epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Information Security
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts...

Editeur : Syngress
Parution : 2014-05-20
epub sans DRM

28,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Python Forensics
Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novicePython programmers to...

Editeur : Syngress
Parution : 2014-05-19
epub sans DRM

54,06

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Targeted Cyber Attacks
Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and...

Editeur : Syngress
Parution : 2014-04-18
PDF, epub sans DRM

24,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Social Engineering Penetration Testing
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now,Social Engineering Penetration Testing gives you the practical methodology and...

Editeur : Syngress
Parution : 2014-04-11
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Collaboration with Cloud Computing
Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical...

Editeur : Syngress
Parution : 2014-04-07
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Forensic Analysis Toolkit
Harlan Carvey has updated Windows Forensic Analysis Toolkit, now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file...

Editeur : Syngress
Parution : 2014-03-11
epub sans DRM

55,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Forensics Field Guide for Linux Systems
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress Digital Forensics Field Guides, a series of companions for any digital and...

Editeur : Syngress
Parution : 2013-12-07
epub sans DRM

46,91

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking with Kali
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through...

Editeur : Syngress
Parution : 2013-12-05
epub sans DRM

32,62

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Network Security Monitoring
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is...

Editeur : Syngress
Parution : 2013-11-26
epub sans DRM

39,77

Téléchargement immédiat
Dès validation de votre commande
<< < 34567 >