Syngress imprint: 289 books

by Johnny Long, Bill Gardner, Justin Brown
Language: English
Release Date: April 18, 2011

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one...
by Jayson E Street, Kent Nabors, Brian Baskin
Language: English
Release Date: August 6, 2010

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One-half thriller, one-half reference,...

Ninja Hacking

Unconventional Penetration Testing Tactics and Techniques

by Thomas Wilhelm, Jason Andress
Language: English
Release Date: November 2, 2010

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present hacking methodologies. It looks...

Violent Python

A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

by TJ O'Connor
Language: English
Release Date: December 28, 2012

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how...

Cyber Warfare

Techniques, Tactics and Tools for Security Practitioners

by Jason Andress, Steve Winterfeld
Language: English
Release Date: July 13, 2011

Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students...

The Basics of IT Audit

Purposes, Processes, and Practical Information

by Stephen D. Gantz
Language: English
Release Date: October 31, 2013

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT,...

PCI Compliance

Understand and Implement Effective PCI Data Security Standard Compliance

by Branden R. Williams, Anton Chuvakin, Ph.D.
Language: English
Release Date: November 13, 2009

PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance, Second Edition, discusses not only how to apply PCI in a practical and cost-effective way but more importantly why. The book explains what the Payment Card Industry Data Security Standard (PCI DSS) is and why...

Advanced Persistent Threat

Understanding the Danger and How to Protect Your Organization

by Eric Cole
Language: English
Release Date: December 31, 2012

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent...

Securing the Cloud

Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler
Language: English
Release Date: April 21, 2011

Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing. As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. The cloud offers flexibility, adaptability,...

Eleventh Hour CISSP

Study Guide

by Eric Conrad, Seth Misenar, Joshua Feldman
Language: English
Release Date: December 13, 2010

Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall...
by Clint Huffman
Language: English
Release Date: August 14, 2014

Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach...
by Susan Snedaker
Language: English
Release Date: October 21, 2005

This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it provides a unique approach to IT project...

Professional Penetration Testing

Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm
Language: English
Release Date: August 31, 2015

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training, reporting, information gathering, vulnerability identification, vulnerability exploitation,...

The IT Regulatory and Standards Compliance Handbook

How to Survive Information Systems Audit and Assessments

by Craig S. Wright
Language: English
Release Date: July 25, 2008

The IT Regulatory and Standards Compliance Handbook provides comprehensive methodology, enabling the staff charged with an IT security audit to create a sound framework, allowing them to meet the challenges of compliance in a way that aligns with both business and technical needs. This "roadmap"...
1 2 3 45 6 7 8 9 10 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy