Syngress imprint: 289 books

The Basics of Cyber Warfare

Understanding the Fundamentals of Cyber Warfare in Theory and Practice

by Steve Winterfeld, Jason Andress
Language: English
Release Date: December 28, 2012

The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures,...

Advanced Persistent Security

A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

by Ira Winkler, Araceli Treu Gomes
Language: English
Release Date: November 30, 2016

Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks,...
by Dale Liu
Language: English
Release Date: June 30, 2009

Three exams, two certifications, one complete Cisco training solution for networking professionals! The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material covers networking concepts...

Dissecting the Hack

The V3rb0t3n Network

by Jayson E Street
Language: English
Release Date: July 20, 2015

Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock....

Security for Microsoft Windows System Administrators

Introduction to Key Information Security Concepts

by Derrick Rountree
Language: English
Release Date: November 3, 2011

Security for Microsoft Windows System is a handy guide that features security information for Windows beginners and professional admin. It provides information on security basics and tools for advanced protection against network failures and attacks. The text is divided into six chapters that...

Keys to the Kingdom

Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks

by Deviant Ollam
Language: English
Release Date: December 6, 2012

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master...

Breaking into Information Security

Crafting a Custom Career Path to Get the Job You Really Want

by Chris Liu, Anthony J. Stieber, Josh More
Language: English
Release Date: December 5, 2015

Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you...
by Susan Snedaker
Language: English
Release Date: April 18, 2011

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Katrina Makes Landfall in the Gulf Coast. Avalanche Buries Highway in Denver. Tornado Touches Down in Georgia. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals...
by Brian Barber, Chris Happel, Terrence V. Lillard
Language: English
Release Date: October 21, 2009

CompTIA Linux+ Certification Study Guide offers a practical guide for those interested in pursuing a Linux+ certification. It covers the required content as specified in CompTIAs exam objectives and has been shaped according to the respective exam experiences of the authors. Careful attention has...
by Rob Cameron, Neil R. Wyler
Language: English
Release Date: April 18, 2011

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances...
by Shawn Tooley
Language: English
Release Date: May 18, 2009

The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and for those IT professionals who are seeking a broad base of general network expertise. The...

Assessing Vendors

A Hands-On Guide to Assessing Infosec and IT Vendors

by Josh More
Language: English
Release Date: April 10, 2013

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't...
by Brad Haines
Language: English
Release Date: March 13, 2010

Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including...

Low Tech Hacking

Street Smarts for Security Professionals

by Jack Wiles, Terry Gudaitis, Jennifer Jabbusch
Language: English
Release Date: December 13, 2011

Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking...
1 2 3 4 5 67 8 9 10 11 12 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy