Télécharger le livre :  Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls,...

Editeur : Syngress
Parution : 2013-08-21
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  FISMA Compliance Handbook
This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of...

Editeur : Syngress
Parution : 2013-08-20
epub sans DRM

55,86

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  X-Ways Forensics Practitioner's Guide
The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners...

Editeur : Syngress
Parution : 2013-08-10
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Practical Anonymity
For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable...

Editeur : Syngress
Parution : 2013-07-19
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Patterns
Most security books are targeted at security engineers and specialists. Few show how build security into software. None breakdown the different concerns facing security at different levels of the system: the enterprise, architectural and operational layers. Security...

Editeur : Wiley
Parution : 2013-07-12
Collection : Wiley Software Patterns Series ePub

47,69

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Risk Management Framework
The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be...

Editeur : Syngress
Parution : 2013-07-03
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Professional Penetration Testing
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of...

Editeur : Syngress
Parution : 2013-06-27
epub sans DRM

63,25

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Hacking and Penetration Testing
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end.The book teaches students how to properly utilize and interpret the results of...

Editeur : Syngress
Parution : 2013-06-24
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Basics of Web Hacking
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system,...

Editeur : Syngress
Parution : 2013-06-18
epub sans DRM

25,27

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Introduction to Cyber-Warfare
Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a...

Editeur : Syngress
Parution : 2013-05-16
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Wireshark Field Guide
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that...

Editeur : Syngress
Parution : 2013-05-14
epub sans DRM

29,49

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Server 2012 Security from End to Edge and Beyond
Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies forWindows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and...

Editeur : Syngress
Parution : 2013-04-18
epub sans DRM

60,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide forLinux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and...

Editeur : Syngress
Parution : 2013-04-12
PDF, epub sans DRM

17,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hands-On Oracle Application Express Security
An example-driven approach to securing Oracle APEX applications As a Rapid Application Development framework, Oracle Application Express (APEX) allows websites to easily be created based on data within an Oracle database. Using only a web browser, you can develop and...

Editeur : Wiley
Parution : 2013-04-09
PDF, ePub

22,58

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Wireless Mobile Internet Security
The mobile industry for wireless cellular services has grown at a rapid pace over the past decade. Similarly, Internet service technology has also made dramatic growth through the World Wide Web with a wire line infrastructure. Realization for complete wired/wireless...

Editeur : Wiley
Parution : 2013-03-26
PDF, ePub

111,78

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows 2012 Server Network Security
Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secureWindows network. The book drills down into all the new features ofWindows 2012 and provides practical, hands-on methods for securing yourWindows systems networks,...

Editeur : Syngress
Parution : 2013-03-19
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Secrets and Lies
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses...

Editeur : Wiley
Parution : 2013-03-12
PDF

17,30

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Cyber Security and the Smart Grid
Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and...

Editeur : Syngress
Parution : 2013-02-26
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Placing the Suspect Behind the Keyboard
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a...

Editeur : Syngress
Parution : 2013-02-01
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security and Loss Prevention
The sixth edition of Security and Loss Prevention continues the tradition of providing introductory and advanced coverage of the body of knowledge of the security profession. To bridge theory to practice is the book's backbone, and Philip Purpura continues this strong...

Editeur : Butterworth-Heinemann
Parution : 2013-01-18
epub sans DRM

49,57

Téléchargement immédiat
Dès validation de votre commande
<< < 1718192021 >