Télécharger le livre :  Techno Security's Guide to Securing SCADA
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. These networks are...

Editeur : Syngress
Parution : 2008-08-23
epub sans DRM

59,87

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Kismet Hacking
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists.Unlike other wireless networking books that have been published in recent years that...

Editeur : Syngress
Parution : 2008-08-08
epub sans DRM

48,10

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malware Forensics
Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal malware cases, this book deals with the emerging and evolving field of...

Editeur : Syngress
Parution : 2008-08-08
epub sans DRM

57,73

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The IT Regulatory and Standards Compliance Handbook
The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and...

Editeur : Syngress
Parution : 2008-07-25
epub sans DRM

59,87

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  UNIX and Linux Forensic Analysis DVD Toolkit
This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of...

Editeur : Syngress
Parution : 2008-07-24
epub sans DRM

53,45

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Scene of the Cybercrime
When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases.When the first...

Editeur : Syngress
Parution : 2008-07-21
epub sans DRM

47,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Nagios 3 Enterprise Network Monitoring
The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new features and updates, and this book details them all for you....

Editeur : Syngress
Parution : 2008-07-04
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security: Know It All
Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security.Assembled from the works of leading researchers and practitioners, this best-of-the-best...

Editeur : Morgan Kaufmann
Parution : 2008-07-01
PDF sans DRM

75,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Netcat Power Tools
Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a...

Editeur : Syngress
Parution : 2008-06-13
epub sans DRM

49,17

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-648 Prep Kit
This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA...

Editeur : Syngress
Parution : 2008-06-03
PDF, epub sans DRM

47,03

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  OSSEC Host-Based Intrusion Detection Guide
This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal...

Editeur : Syngress
Parution : 2008-04-09
PDF sans DRM

52,38

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Instant Messaging Reference
Virtual reference is a vital component in twenty-first century reference service and the time for debate over its virtues and necessity has passed. This book focuses on the practical implementation of instant messaging (IM), including privacy and security and its future...

Editeur : Chandos Publishing
Parution : 2008-01-31
PDF sans DRM

56,66

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools...

Editeur : Syngress
Parution : 2007-11-16
PDF sans DRM

51,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IT Security Interviews Exposed
Technology professionals seeking higher-paying security jobs need to know security fundamentals to land the job-and this book will help Divided into two parts: how to get the job and a security crash course to prepare for the job interview Security is one of today's...

Editeur : Wiley
Parution : 2007-10-15
PDF

29,21

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Biorthogonal Systems in Banach Spaces
One of the fundamental questions of Banach space theory is whether every Banach space has a basis. A space with a basis gives us the feeling of familiarity and concreteness, and perhaps a chance to attempt the classification of all Banach spaces and other problems. The...

Editeur : Springer
Parution : 2007-10-04
Collection : CMS Books in Mathematics PDF

71,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security. This new book introduces cryptography in a unique and non-mathematical style.Cryptology Unlocked explains encryption, crypto...

Editeur : Wiley
Parution : 2007-08-20
PDF

44,94

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Asterisk Hacking
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book...

Editeur : Syngress
Parution : 2007-08-13
PDF sans DRM

43,82

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at IIS 7 Server Administration
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new...

Editeur : Syngress
Parution : 2007-06-22
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Applied Cryptanalysis
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA...

Editeur : Wiley-IEEE Press
Parution : 2007-06-15
Collection : IEEE Press PDF

135,84

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Snort Intrusion Detection and Prevention Toolkit
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.This fully integrated book and Web toolkit covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend...

Editeur : Syngress
Parution : 2007-04-11
epub sans DRM

41,68

Téléchargement immédiat
Dès validation de votre commande
<< < 2728293031 >