Télécharger le livre :  Google Hacking for Penetration Testers
Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users...

Editeur : Syngress
Parution : 2004-12-17
PDF sans DRM

37,93

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use.While there are many books starting to...

Editeur : Syngress
Parution : 2004-11-20
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows to Linux Migration Toolkit
This book will teach people how to migrate systems from Windows to Linux. It provides migration process planning, automated migration scripts, anti-virus / anti-spam solutions, and specific migration and deployment details for all relevant technologies. IT professionals...

Editeur : Syngress
Parution : 2004-11-05
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  How to Cheat at Managing Windows Small Business Server 2003
How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle. - The...

Editeur : Syngress
Parution : 2004-09-23
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Trojans, Worms, and Spyware
Trojans, Worms, and Spyware provides practical, easy to understand, and readily usable advice to help organizations to improve their security and reduce the possible risks of malicious code attacks. Despite the global downturn, information systems security remains one...

Editeur : Butterworth-Heinemann
Parution : 2004-09-21
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Malicious Cryptography
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It’s called cryptovirology, the art of turning the very methods designed to protect your data into a means of subverting...

Editeur : Wiley
Parution : 2004-07-30
PDF

43,25

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Zero-Day Exploit
The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious "Zero-Day" attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will...

Editeur : Syngress
Parution : 2004-07-16
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Adversary Characterization
The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism.The growing connectivity among secure and insecure networks has created new opportunities for unauthorized intrusions into sensitive...

Editeur : Syngress
Parution : 2004-07-09
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CYA Securing IIS 6.0
A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential IIS 6.0 features.The book is organized around the 15 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential features. The...

Editeur : Syngress
Parution : 2004-05-23
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  CYA Securing Exchange Server 2003
A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 "MMCs" (Microsoft Management Consoles) that contain the configuration menus for the essential...

Editeur : Syngress
Parution : 2004-05-21
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Stealing the Network
This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the...

Editeur : Syngress
Parution : 2004-05-21
PDF sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking the Code
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits,Hacking the Code dives...

Editeur : Syngress
Parution : 2004-05-10
epub sans DRM

43,20

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Sage's Guide to Hardening the Network Infrastructure
This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand how they should design and protect their enterprises. Network security...

Editeur : Syngress
Parution : 2004-05-05
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Wireless Operational Security
This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of...

Editeur : Digital Press
Parution : 2004-05-01
PDF sans DRM

74,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving: Drive, Detect, Defend
The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment.The act of driving or walking through urban areas with a wireless-equipped laptop to map both protected and un-protected wireless networks has sparked intense...

Editeur : Syngress
Parution : 2004-04-02
PDF sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Windows Server 2003 Security Infrastructures
Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts ofWindows Server 2003 security and wants to leverage the operating system's security infrastructure components to build a more secure I.T. infrastructure. The primary...

Editeur : Digital Press
Parution : 2004-04-02
PDF sans DRM

74,85

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  MCSE Designing Security for a Windows Server 2003 Network (Exam 70-298)
MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100%...

Editeur : Syngress
Parution : 2004-03-03
PDF sans DRM

52,70

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure(Exam 70-297)
MCSE Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure (Exam 70-297) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This ...

Editeur : Syngress
Parution : 2004-03-01
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Implementing Homeland Security for Enterprise IT
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland...

Editeur : Digital Press
Parution : 2004-02-16
PDF sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Check Point Next Generation with Application Intelligence Security Administration
Check Point Next Generation with Application Intelligence Security Administration focuses onCheck Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features ofCheck Point NG. Like...

Editeur : Syngress
Parution : 2004-01-26
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
<< < 3132333435 >