Télécharger le livre :  Stealing the Network: How to Own an Identity
The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Editeur : Syngress
Parution : 2005-08-24
epub sans DRM

35,26

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Host Integrity Monitoring Using Osiris and Samhain
This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover...

Editeur : Syngress
Parution : 2005-07-25
epub sans DRM

38,47

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer-Graphic Facial Reconstruction
This unique books looks at a cost-efficient, fast and accurate means of facial reconstruction--from segmented, decomposed, or skeletal remains--using computer-graphic and computational means.Computer-Graphic Facial Reconstruction is designed as a valuable resource for...

Editeur : Academic Press
Parution : 2005-07-02
PDF sans DRM

113,42

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cisco PIX Firewalls
Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX...

Editeur : Syngress
Parution : 2005-06-21
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Editeur : Syngress
Parution : 2005-06-02
epub sans DRM

35,26

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery...

Editeur : Syngress
Parution : 2005-05-24
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Risk Management for Computer Security
Risk Management for Computer Security provides IT professionals with an integrated plan to establish and implement a corporate risk assessment and management program. The book covers more than just the fundamental elements that make up a good risk program for computer...

Editeur : Butterworth-Heinemann
Parution : 2005-04-28
PDF sans DRM

45,96

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...

Editeur : Syngress
Parution : 2005-04-26
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how...

Editeur : Morgan Kaufmann
Parution : 2005-04-25
PDF sans DRM

49,17

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Aggressive Network Self-Defense
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark...

Editeur : Syngress
Parution : 2005-04-12
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Spies Among Us
Ira Winkler has been dubbed "A Modern Day James Bond" by CNN and other media outlets for his ability to simulate espionage attacks against many of the top companies in the world, showing how billions of dollars can disappear. This unique book is packed with the...

Editeur : Wiley
Parution : 2005-04-01
PDF

25,68

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics,...

Editeur : Syngress
Parution : 2005-03-15
epub sans DRM

35,26

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Intrusion Prevention and Active Response
Intrusion Prevention and Active Response provides an introduction to the field ofIntrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are covered in depth, including both network and host IPS and response...

Editeur : Syngress
Parution : 2005-03-04
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Apple I Replica Creation
The perfect book for computer hobbyists, Apple I Replica Creation: Back to the Garage is sure to equally appeal both to kids with gift certificates looking for fun on a snowy January day as well as to adults eager to learn the basics of simple microcomputer design.The...

Editeur : Syngress
Parution : 2005-02-17
PDF sans DRM

35,26

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Intrusion
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious...

Editeur : Wiley
Parution : 2005-01-26
PDF

16,59

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Understanding Your Users
Today many companies are employing a user-centered design (UCD) process, but for most companies, usability begins and ends with the usability test. Although usability testing is a critical part of an effective user-centered life cycle, it is only one component of the...

Editeur : Morgan Kaufmann
Parution : 2005-01-19
epub sans DRM

69,50

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Dr. Tom Shinder's Configuring ISA Server 2004
Dr. Tom and Debra Shinder have become synonymous with Microsoft's flagship firewall product ISA Server, as a result of Tom's prominent role as a member of the beta development team, and Tom and Deb's featured placement on both Microsoft's ISA Server Web site and...

Editeur : Syngress
Parution : 2004-12-31
epub sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Configuring NetScreen Firewalls
The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being first to market with best-selling firewall books for security...

Editeur : Syngress
Parution : 2004-12-31
PDF sans DRM

42,75

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Voice Interaction Design
From the voice on the phone, to the voice on the computer, to the voice from the toaster, speech user interfaces are coming into the mainstream and are here to stay forever. Soundly anchored in HCI, cognitive psychology, linguistics, and social psychology, this...

Editeur : Morgan Kaufmann
Parution : 2004-12-31
PDF sans DRM

54,52

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Firewalls
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private...

Editeur : Digital Press
Parution : 2004-12-21
PDF sans DRM

67,36

Téléchargement immédiat
Dès validation de votre commande
<< < 3031323334 >