Syngress imprint: 289 books

Professional Penetration Testing

Creating and Learning in a Hacking Lab

by Thomas Wilhelm
Language: English
Release Date: June 27, 2013

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any...
by
Language: English
Release Date: March 3, 2010

Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability...

Cisco Router and Switch Forensics

Investigating and Analyzing Malicious Network Activity

by Dale Liu
Language: English
Release Date: June 3, 2009

Cisco IOS (the software that runs the vast majority of Cisco routers and all Cisco network switches) is the dominant routing platform on the Internet and corporate networks. This widespread distribution, as well as its architectural deficiencies, makes it a valuable target for hackers looking to attack...
by Chris Pogue, Cory Altheide, Todd Haverkos
Language: English
Release Date: July 24, 2008

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account for the second-largest segment of spending (behind Windows) in the...
by Debra Littlejohn Shinder, Michael Cross
Language: English
Release Date: July 21, 2008

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the...

Virtualization for Security

Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting

by John Hoopes
Language: English
Release Date: February 24, 2009

One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources,...

Virtualization and Forensics

A Digital Forensic Investigator’s Guide to Virtual Environments

by Diane Barrett, Greg Kipper
Language: English
Release Date: August 6, 2010

Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. Named a 2011 Best Digital Forensics Book by InfoSec Reviews, this guide gives you...
by Dan York
Language: English
Release Date: June 4, 2010

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these...
by
Language: English
Release Date: August 26, 2013

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the...

Eleventh Hour Security+

Exam SY0-201 Study Guide

by Ido Dubrawsky
Language: English
Release Date: October 3, 2009

Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the following topics: systems security; operating system hardening; application security; virtualization technologies;...

Network Intrusion Analysis

Methodologies, Tools, and Techniques for Incident Analysis and Response

by Joe Fichera, Steven Bolt
Language: English
Release Date: December 17, 2012

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation...
by Chris Hurley, Johnny Long, Aaron W Bayles
Language: English
Release Date: June 2, 2005

“InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be...
by Christian B Lahti, Roderick Peterson
Language: English
Release Date: October 7, 2005

This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly documents which Open Source tools...

Social Media Security

Leveraging Social Networking While Mitigating Risk

by Michael Cross
Language: English
Release Date: November 1, 2013

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving...
1 2 3 4 56 7 8 9 10 11 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy