All ebooks by Syngress - in PDF and EPUB
Readzis program recommandation

All ebooks by Syngress in PDF and EPUB


491  Book(s)
Download this eBook XSS Attacks
Add to my wish list

XSS Attacks


Collectif


A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data.XSS Attacks starts by defining the terms and laying out the ground work. It assumes that the...

Publication date: 2011-04-18
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£41,13
Download this eBook OS X Exploits and Defense
Add to my wish list

OS X Exploits and Defense


Collectif


Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were...

Publication date: 2011-04-18
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£41,13
Download this eBook Managing Catastrophic Loss of Sensitive Data
Add to my wish list

Managing Catastrophic Loss of Sensitive Data


Constantine Photopoulos


Offering a structured approach to handling and recovering from a catastrophic data loss, this book will help both technical and non-technical professionals put effective processes in place to secure their business-critical information and provide a roadmap of the...

Publication date: 2011-04-18
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£41,13
Download this eBook How to Cheat at Deploying and Securing RFID
Add to my wish list

How to Cheat at Deploying and Securing RFID


Paul Sanghera , Frank Thornton


RFID is a method of remotely storing and receiving data using devices calledRFID tags.RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions fromRFID transmitters.RFID tags are used to identify and track everything from...

Publication date: 2011-04-18
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Digital Forensics with Open Source Tools
Add to my wish list

Digital Forensics with Open Source Tools


Harlan Carvey , Cory Altheide


Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open source tools on Mac, Linux and Windows systems as a...

Publication date: 2011-03-29
Format: epub DRM-free
Publisher: Syngress
Add to basket
£34,80
Download this eBook XBOX 360 Forensics
Add to my wish list

XBOX 360 Forensics


Steven Bolt


XBOX 360 Forensics is a complete investigation guide for theXBOX game console. Because theXBOX 360 is no longer just a video game console — it streams movies, connects with social networking sites and chatrooms, transfer files, and more — it just may contain evidence to...

Publication date: 2011-02-07
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Web Application Obfuscation
Add to my wish list

Web Application Obfuscation


Eduardo Alberto Vela Nava , Gareth Heyes , David Lindsay , Mario Heiderich


Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security...

Publication date: 2011-01-13
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Cybercrime and Espionage
Add to my wish list

Cybercrime and Espionage


Will Gragido , John Pirc


Cybercrime and Espionage provides a comprehensive analysis of the sophisticated patterns and subversive multi-vector threats (SMTs) associated with modern cybercrime, cyber terrorism, cyber warfare and cyber espionage. Whether the goal is to acquire and subsequently...

Publication date: 2011-01-07
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Windows Registry Forensics
Add to my wish list

Windows Registry Forensics


Harlan Carvey


Windows Registry Forensics provides the background of theWindows Registry to help develop an understanding of the binary structure of Registry hive files. Approaches to live response and analysis are included, and tools and techniques for postmortem analysis are...

Publication date: 2011-01-03
Format: epub DRM-free
Publisher: Syngress
Add to basket
£45,35
Download this eBook Securing SQL Server
Add to my wish list

Securing SQL Server


Denny Cherry


Securing SQL Server: Protecting Your Database from Attackers provides readers with the necessary tools and techniques to help maintain the security of databases within their environment. It begins with a discussion of network security issues, including public versus...

Publication date: 2010-12-27
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Eleventh Hour CISSP
Add to my wish list

Eleventh Hour CISSP


Eric Conrad , Joshua Feldman , Seth Misenar


Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information...

Publication date: 2010-12-13
Format: epub DRM-free
Publisher: Syngress
Add to basket
£18,98
Download this eBook Managed Code Rootkits
Add to my wish list

Managed Code Rootkits


Erez Metula


Managed Code Rootkits is the first book to cover application-level rootkits and other types of malware inside the application VM, which runs a platform-independent programming environment for processes. The book, divided into four parts, points out high-level attacks,...

Publication date: 2010-11-25
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Securing the Smart Grid
Add to my wish list

Securing the Smart Grid


Justin Morehouse , Tony Flick


Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses...

Publication date: 2010-11-03
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Ninja Hacking
Add to my wish list

Ninja Hacking


Jason Andress , Thomas Wilhelm


Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, in particular the historical Ninjutsu techniques, with the present...

Publication date: 2010-11-02
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Citrix XenDesktop Implementation
Add to my wish list

Citrix XenDesktop Implementation


Gareth R. James


Citrix XenDesktop Implementation explores the implementation ofCitrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the installation of a desktop delivery controller through advanced XenDesktop...

Publication date: 2010-10-29
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook A Guide to Kernel Exploitation
Add to my wish list

A Guide to Kernel Exploitation


Massimiliano Oldani , Enrico Perla


A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows....

Publication date: 2010-10-28
Format: epub DRM-free
Publisher: Syngress
Add to basket
£37,97
Download this eBook CISSP Study Guide
Add to my wish list

CISSP Study Guide


Eric Conrad , Joshua Feldman , Seth Misenar


CISSP Study Guide serves as a review for those who want to take the Certified Information Systems Security Professional (CISSP) exam and obtainCISSP certification. The exam is designed to ensure that someone who is handling computer security in a company has a...

Publication date: 2010-09-16
Format: epub DRM-free
Publisher: Syngress
Add to basket
£39,02
Download this eBook Practical Lock Picking
Add to my wish list

Practical Lock Picking


Deviant Ollam


Practical Lock Picking: A Physical Penetration Tester's Training Guide introduces the reader to the basic principles of lock picking. The book combines both easy-to-follow, step-by-step lessons, and tutorials that will help security-conscious people learn how to open...

Publication date: 2010-09-10
Format: epub DRM-free
Publisher: Syngress
Add to basket
£26,32
Download this eBook Metrics and Methods for Security Risk Management
Add to my wish list

Metrics and Methods for Security Risk Management


Carl Young


Security problems have evolved in the corporate world because of technological changes, such as using the Internet as a means of communication. With this, the creation, transmission, and storage of information may represent security problem. Metrics and Methods for...

Publication date: 2010-08-21
Format: epub DRM-free
Publisher: Syngress
Add to basket
£32,69
Download this eBook Microsoft Windows Server 2008 R2 Administrator's Reference
Add to my wish list

Microsoft Windows Server 2008 R2 Administrator's Reference


Dustin Hannifin


Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release. The book explores its features; describes differences between the available editions;...

Publication date: 2010-08-07
Format: epub DRM-free
Publisher: Syngress
Add to basket
£29,53
<< < 1112131415 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés