Télécharger le livre :  DNS Security
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Editeur : Syngress
Parution : 2016-06-10
PDF, epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Data Breach Preparation and Response
Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...

Editeur : Syngress
Parution : 2016-06-08
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Combatting Cybercrime and Cyberterrorism
This book comprises an authoritative and accessible edited collection of chapters of substantial practical and operational value. For the very first time, it provides security practitioners with a trusted reference and resource designed to guide them through the...

Editeur : Springer
Parution : 2016-05-27
ePub

89,66

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Threat Forecasting
Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...

Editeur : Syngress
Parution : 2016-05-17
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OS X Incident Response
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Editeur : Syngress
Parution : 2016-05-07
PDF, epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hiding Behind the Keyboard
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use...

Editeur : Syngress
Parution : 2016-03-14
ePub, PDF sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Performance and Security
Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Editeur : Syngress
Parution : 2016-03-10
epub sans DRM

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Big Data Concepts, Theories, and Applications
This book covers three major parts of Big Data: concepts, theories and applications. Written by world-renowned leaders in Big Data, this book explores the problems, possible solutions and directions for Big Data in research and practice.  It also focuses on...

Editeur : Springer
Parution : 2016-03-03
PDF, ePub

158,24

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Radio-Frequency Human Exposure Assessment
Nowadays approximately 6 billion people use a mobile phone and they now take a central position within our daily lives. The 1990s saw a tremendous increase in the use of wireless systems and the democratization of this means of communication. To allow the communication...

Editeur : Wiley-ISTE
Parution : 2016-03-03
PDF, ePub

163,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Diffusion Models for Modern Complex Networks
Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable...

Editeur : Morgan Kaufmann
Parution : 2016-02-02
PDF, epub sans DRM

90,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Information Systems Security Officer's Guide
The Information Systems Security Officer's Guide: Establishing and Managing a Cyber Security Program, Third Edition, provides users with information on how to combat the ever-changing myriad of threats security professionals face. This entirely updated edition presents...

Editeur : Butterworth-Heinemann
Parution : 2016-01-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Deploying Secure Containers for Training and Development
In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Editeur : Syngress
Parution : 2015-12-10
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Essential Skills for Hackers
Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Editeur : Syngress
Parution : 2015-12-09
epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CISSP Study Guide
CISSP Study Guide, Third Edition provides readers with information on theCISSP certification, the most prestigious, globally-recognized, vendor-neutral exam for information security professionals. With over 100,000 professionals certified worldwide, and many more...

Editeur : Syngress
Parution : 2015-12-08
PDF

45,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Security Awareness for Corporate Directors and Board Members
Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate...

Editeur : Syngress
Parution : 2015-12-08
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Controls Evaluation, Testing, and Assessment Handbook
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine,...

Editeur : Syngress
Parution : 2015-12-07
PDF, epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Digital Forensics
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of...

Editeur : Syngress
Parution : 2015-12-07
epub sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Breaking into Information Security
Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and...

Editeur : Syngress
Parution : 2015-12-05
PDF, epub sans DRM

30,54

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Deployment of Cisco Identity Services Engine (ISE)
With the proliferation of mobile devices and bring-your-own-devices (BYOD) within enterprise networks, the boundaries of where the network begins and ends have been blurred. Cisco Identity Services Engine (ISE) is the leading security policy management platform that...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Operating System Forensics
Operating System Forensics is the first book to cover all three critical operating systems for digital forensic investigations in one comprehensive reference.  Users will learn how to conduct successful digital forensic examinations in Windows, Linux, and Mac OS, the...

Editeur : Syngress
Parution : 2015-11-12
PDF, epub sans DRM

53,75

Téléchargement immédiat
Dès validation de votre commande
<< < 1112131415 >