Télécharger le livre :  Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users.Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management...

Editeur : Syngress
Parution : 2011-08-31
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Editeur : Syngress
Parution : 2011-08-25
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  iPhone and iOS Forensics
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...

Editeur : Syngress
Parution : 2011-07-25
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...

Editeur : Syngress
Parution : 2011-07-21
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. This book makes ethical hacking and penetration testing easy – no prior hacking experience is...

Editeur : Syngress
Parution : 2011-07-21
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thor's Microsoft Security Bible
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...

Editeur : Syngress
Parution : 2011-07-16
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Information Security
The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and...

Editeur : Syngress
Parution : 2011-07-16
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Editeur : Syngress
Parution : 2011-07-13
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Securing the Cloud
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The...

Editeur : Syngress
Parution : 2011-04-21
epub sans DRM

40,04

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Risk Management
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Editeur : Syngress
Parution : 2011-04-20
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Digital Forensic Laboratory
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...

Editeur : Syngress
Parution : 2011-04-19
epub sans DRM

66,41

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Developer's Guide to Web Application Security
Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Perl Scripting for Windows Security
I decided to write this book for a couple of reasons. One was that I've now written a couple of books that have to do with incident response and forensic analysis on Windows systems, andI used a lot of Perl in both books. Okay…I'll come clean…I used nothing but Perl in...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Business Continuity and Disaster Recovery Planning for IT Professionals
Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research is the first book available for theMetasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing....

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn IT Security Management Book Period
The security field evolves rapidly becoming broader and more complex each year.The common thread tying the field together is the discipline of management.The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Microsoft Vista Administration
The Perfect Reference for the Multitasked SysAdminThe Microsoft Windows Vista operating system offers several changes and improvements over its predecessors. It not only brings a new and redesigned interface, but also improves on many administrative utilities and...

Editeur : Syngress
Parution : 2011-04-18
PDF, epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  GFI Network Security and PCI Compliance Power Tools
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products in a time-efficient manner, so that new implementations can go...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Best Damn Firewall Book Period
The Second Edition of the Best Damn Firewall Book Period is completely revised and updated to include all of the most recent releases from Microsoft, Cisco, Juniper Network, and Check Point.Compiled from the best of the Syngress firewall library and authored by product...

Editeur : Syngress
Parution : 2011-04-18
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Google Hacking for Penetration Testers
This book helps people find sensitive information on the Web.Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google's search capabilities are so powerful, they sometimes discover...

Editeur : Syngress
Parution : 2011-04-18
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
<< < 89101112 >