All ebooks by Syngress - in PDF and EPUB
Readzis program recommandation

All ebooks by Syngress in PDF and EPUB


490  Book(s)
Download this eBook Audio Content Security
Add to my wish list

Audio Content Security


Iraj Sadegh Amiri , Sogand Ghorbani


Audio Content Security: Attack Analysis onAudio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of...

Publication date: 2016-07-16
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Information Security Science
Add to my wish list

Information Security Science


Carl Young


Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it...

Publication date: 2016-06-23
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Cyber Guerilla
Add to my wish list

Cyber Guerilla


Jelle Van Haaster , Martijn Sprengers , Rickey Gevers


Much as Che Guevara's book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla...

Publication date: 2016-06-13
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Executing Windows Command Line Investigations
Add to my wish list

Executing Windows Command Line Investigations


Chet Hosmer , Joshua Bartolomie , Rosanne Pelli


The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident...

Publication date: 2016-06-11
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook DNS Security
Add to my wish list

DNS Security


Allan Liska , Geoffrey Stowe


DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring commonDNS vulnerabilities, studying different attack vectors, and providing necessary information for securingDNS infrastructure. The book...

Publication date: 2016-06-10
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Data Breach Preparation and Response
Add to my wish list

Data Breach Preparation and Response


Kevvie Fowler


Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact.Data breaches are inevitable incidents that can disrupt...

Publication date: 2016-06-08
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Cybersecurity and Applied Mathematics
Add to my wish list

Cybersecurity and Applied Mathematics


Leigh Metcalf , William Casey


Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data...

Publication date: 2016-06-07
Format: epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Threat Forecasting
Add to my wish list

Threat Forecasting


David Desanto , Will Gragido , Iain Davison , John Pirc


Drawing upon years of practical experience and using numerous examples and illustrative case studies, Threat Forecasting: Leveraging Big Data for Predictive Analysis discusses important topics, including the danger of using historic data as the basis for predicting...

Publication date: 2016-05-17
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook OS X Incident Response
Add to my wish list

OS X Incident Response


Jaron Bradley


OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesser-known operating system. By mastering the forensic artifacts ofOS X, analysts will set themselves apart by acquiring an up-and-coming...

Publication date: 2016-05-07
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Protecting Patient Information
Add to my wish list

Protecting Patient Information


Paul Cerrato


Protecting Patient Information: A Decision-Maker's Guide to Risk, Prevention, and Damage Control provides the concrete steps needed to tighten the information security of any healthcare IT system and reduce the risk of exposing patient health information (PHI) to the...

Publication date: 2016-04-14
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Hiding Behind the Keyboard
Add to my wish list

Hiding Behind the Keyboard


John Bair , Brett Shavers


Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed investigative methods for identifying them. The book shows how to use...

Publication date: 2016-03-14
Format: PDF, ePub
Publisher: Syngress
Add to basket
£39,02
Download this eBook Network Performance and Security
Add to my wish list

Network Performance and Security


Chris Chapman


Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to harden their IT infrastructure. The book details how...

Publication date: 2016-03-10
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Windows Registry Forensics
Add to my wish list

Windows Registry Forensics


Harlan Carvey


Windows Registry Forensics: Advanced Digital Forensic Analysis of theWindows Registry, Second Edition, provides the most in-depth guide to forensic investigations involvingWindows Registry. This book is one-of-a-kind, giving the background of the Registry to help users...

Publication date: 2016-03-03
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Implementing Digital Forensic Readiness
Add to my wish list

Implementing Digital Forensic Readiness


Jason Sachowski


Implementing Digital Forensic Readiness: From Reactive to Proactive Process shows information security and digital forensic professionals how to increase operational efficiencies by implementing a pro-active approach to digital forensics throughout their organization....

Publication date: 2016-02-29
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Preserving Electronic Evidence for Trial
Add to my wish list

Preserving Electronic Evidence for Trial


Ann D. Zeigler , Ernesto F. Rojas


The ability to preserve electronic evidence is critical to presenting a solid case for civil litigation, as well as in criminal and regulatory investigations. Preserving Electronic Evidence for Trial provides everyone connected with digital forensics investigation and...

Publication date: 2016-02-18
Format: PDF, epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Deploying Secure Containers for Training and Development
Add to my wish list

Deploying Secure Containers for Training and Development


Henry Dalziel , Jon Schipp


In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided. -...

Publication date: 2015-12-10
Format: epub DRM-free
Publisher: Syngress
Add to basket
£26,36
Download this eBook Mobile Data Loss
Add to my wish list

Mobile Data Loss


Michael T. Raggo


The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss....

Publication date: 2015-12-09
Format: epub DRM-free
Publisher: Syngress
Add to basket
£20,03
Download this eBook Essential Skills for Hackers
Add to my wish list

Essential Skills for Hackers


Kevin Cardwell , Henry Dalziel


Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis.  The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what...

Publication date: 2015-12-09
Format: epub DRM-free
Publisher: Syngress
Add to basket
£26,36
Download this eBook Meeting People via WiFi and Bluetooth
Add to my wish list

Meeting People via WiFi and Bluetooth


Henry Dalziel , Joshua Schroeder


Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon...

Publication date: 2015-12-09
Format: epub DRM-free
Publisher: Syngress
Add to basket
£26,36
Download this eBook Cyber Security Awareness for CEOs and Management
Add to my wish list

Cyber Security Awareness for CEOs and Management


Henry Dalziel , David Willson


Cyber Security for CEOs and Managment  is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your...

Publication date: 2015-12-09
Format: epub DRM-free
Publisher: Syngress
Add to basket
£26,36
<< < 1234 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés