All ebooks by Syngress - in PDF and EPUB
Readzis program recommandation

All ebooks by Syngress in PDF and EPUB


471  Book(s)
Download this eBook Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
Add to my wish list

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft


Eric Cole , Sandra Ring


The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book...

Publication date: 2005-12-15
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£24,25
Download this eBook Skype Me! From Single User to Small Enterprise and Beyond
Add to my wish list

Skype Me! From Single User to Small Enterprise and Beyond


Markus Daehne


This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC. The reader will also learn how to begin...

Publication date: 2005-12-12
Format: epub DRM-free
Publisher: Syngress
Add to basket
£24,25
Download this eBook OS X for Hackers at Heart
Add to my wish list

OS X for Hackers at Heart


Collectif


The sexy, elegant design of the Apple PowerBook combined with the Unix-like OS X operating system based on FreeBSD, have once again made OS X the Apple of every hacker's eye. In this unique and engaging book covering the brand new OS X 10.4 Tiger, the world's foremost...

Publication date: 2005-12-12
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook How to Cheat at Managing Windows Server Update Services
Add to my wish list

How to Cheat at Managing Windows Server Update Services


B. Barber


Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers. The book will begin by describing the feature set of WSUS, and the...

Publication date: 2005-12-12
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£27,42
Download this eBook Securing IM and P2P Applications for the Enterprise
Add to my wish list

Securing IM and P2P Applications for the Enterprise


Paul Piccard , Marcus Sachs


This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are...

Publication date: 2005-12-12
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Phishing Exposed
Add to my wish list

Phishing Exposed


Lance James


Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The...

Publication date: 2005-11-21
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Configuring Check Point NGX VPN-1/Firewall-1
Add to my wish list

Configuring Check Point NGX VPN-1/Firewall-1


Barry J Stiefel , Simon Desmeules


Check Point NGX VPN-1/Firewall-1 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release are in the areas of Route Based VPN, Directional VPN, Link Selection &...

Publication date: 2005-11-01
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook How to Cheat at IT Project Management
Add to my wish list

How to Cheat at IT Project Management


Susan Snedaker


This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and complexity of traditional project management (PM) books. Instead, it...

Publication date: 2005-10-21
Format: epub DRM-free
Publisher: Syngress
Add to basket
£30,58
Download this eBook Software Piracy Exposed
Add to my wish list

Software Piracy Exposed


Ron Honick


This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's totally unrealistic to pretend that it doesn't happen. Software piracy...

Publication date: 2005-10-07
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£27,42
Download this eBook Sarbanes-Oxley Compliance Using COBIT and Open Source Tools
Add to my wish list

Sarbanes-Oxley Compliance Using COBIT and Open Source Tools


Christian B Lahti , Roderick Peterson


This book illustrates the many Open Source cost savings opportunities available to companies seeking Sarbanes-Oxley compliance. It also provides examples of the Open Source infrastructure components that can and should be made compliant. In addition, the book clearly...

Publication date: 2005-10-07
Format: epub DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Nessus, Snort, and Ethereal Power Tools
Add to my wish list

Nessus, Snort, and Ethereal Power Tools


Jay Beale , Brian Caswell , Noam Rathaus , Gilbert Ramirez


Nessus, Snort, and Ethereal Power Tools covers customizing Snort to perform intrusion detection and prevention; Nessus to analyze the network layer for vulnerabilities; and Ethereal to sniff their network for malicious or unusual traffic. The book contains an appendix...

Publication date: 2005-09-14
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£28,47
Download this eBook Configuring VMware ESX Server 2.5
Add to my wish list

Configuring VMware ESX Server 2.5


Al Muller , Seburn Wilson


This book will detail the default and custom installation of VMware's ESx server as well as basic and advanced virtual machine configurations. It will also discuss the requirements for a server virtualization and consolidation project and the cost savings surrounding...

Publication date: 2005-08-31
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Network Security Evaluation Using the NSA IEM
Add to my wish list

Network Security Evaluation Using the NSA IEM


Bryan Cunningham , Ed Fuller , Greg Miles , Russ Rogers


Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...

Publication date: 2005-08-26
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£41,13
Download this eBook Stealing the Network: How to Own an Identity
Add to my wish list

Stealing the Network: How to Own an Identity


Collectif


The first two books in this series "Stealing the Network: How to Own the Box and "Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In...

Publication date: 2005-08-24
Format: epub DRM-free
Publisher: Syngress
Add to basket
£27,42
Download this eBook Host Integrity Monitoring Using Osiris and Samhain
Add to my wish list

Host Integrity Monitoring Using Osiris and Samhain


Brian Wotring


This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book will cover...

Publication date: 2005-07-25
Format: epub DRM-free
Publisher: Syngress
Add to basket
£30,58
Download this eBook Cisco PIX Firewalls
Add to my wish list

Cisco PIX Firewalls


Umer Khan


Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers with a clear, comprehensive, and independent introduction to PIX...

Publication date: 2005-06-21
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Network+ Study Guide & Practice Exams
Add to my wish list

Network+ Study Guide & Practice Exams


Robert Shimonski


The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware,...

Publication date: 2005-06-17
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£26,36
Download this eBook InfoSec Career Hacking: Sell Your Skillz, Not Your Soul
Add to my wish list

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul


Aaron W Bayles , Ed Brindley , Chris Hurley , Johnny Long


"InfoSec Career Hacking starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by...

Publication date: 2005-06-02
Format: epub DRM-free
Publisher: Syngress
Add to basket
£27,42
Download this eBook Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Add to my wish list

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services


Melissa Craft


Almost 100% of all Fortune 500 and Fortune 1000 companies use Citrix. Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services covers the new release to Citrix MetaFrame and how companies can deploy it in their disaster recovery...

Publication date: 2005-05-24
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
Download this eBook Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
Add to my wish list

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals


James C Foster


The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:1. Coding –The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the...

Publication date: 2005-04-26
Format: PDF DRM-free
Publisher: Syngress
Add to basket
£33,75
<< < 1617181920 >

Sign up to get our latest ebook recommendations and special offers


Paiements sécurisés