Syngress imprint: 289 books

Computer Incident Response and Forensics Team Management

Conducting a Successful Incident Response

by Leighton Johnson
Language: English
Release Date: November 8, 2013

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident...

Placing the Suspect Behind the Keyboard

Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects

by Brett Shavers
Language: English
Release Date: February 1, 2013

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to...

Securing Windows Server 2008

Prevent Attacks from Outside and Inside Your Organization

by Aaron Tiensivu
Language: English
Release Date: July 1, 2008

Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system administrators and security professionals must install, configure, monitor, log, and troubleshoot...
by Anthony Piltzecker
Language: English
Release Date: August 31, 2011

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your...

Windows Server 2012 Security from End to Edge and Beyond

Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions

by Thomas W Shinder, Yuri Diogenes, Debra Littlejohn Shinder
Language: English
Release Date: April 18, 2013

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy...
by Rob Cameron, Chris Cantrell, Anne Hemni
Language: English
Release Date: December 8, 2006

Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to...
by David Willson, Henry Dalziel
Language: English
Release Date: December 9, 2015

Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need...

The IT / Digital Legal Companion

A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law

by Gene K. Landy, Amy J. Mastrobattista
Language: English
Release Date: August 13, 2008

The IT/Digital Legal Companion is a comprehensive business and legal guidance covering intellectual property for digital business; digital contract fundamentals; open source rules and strategies; development, consulting and outsourcing; software as a service; business software licensing, partnering,...
by
Language: English
Release Date: June 13, 2008

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife"...

Industrial Network Security

Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

by Eric D. Knapp, Joel Thomas Langill
Language: English
Release Date: December 9, 2014

As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to...
by Carl Timm, Richard Perez
Language: English
Release Date: June 2, 2010

Seven Deadliest Social Network Attacks provides a comprehensive view into how social networking attacks have impacted the livelihood and lives of adults and children. The book is separated into seven chapters, with each focusing on a specific type of attack that has been furthered through the use of...

Cybercrime and Espionage

An Analysis of Subversive Multi-Vector Threats

by Will Gragido, John Pirc
Language: English
Release Date: January 7, 2011

Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently sell intellectual property from...
by Joshua Schroeder, Henry Dalziel
Language: English
Release Date: December 9, 2015

Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015...
by Christian B Lahti, Roderick Peterson
Language: English
Release Date: December 19, 2007

The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake...
1 2 3 4 5 6 78 9 10 11 12 13 Last
We use our own "cookies" and third party cookies to improve services and to see statistical information. By using this website, you agree to our Privacy Policy