Quick view Syngress Publishing .Net Mobile Web Developers Guide Introducing Microsoft's flagship wireless development toolThe .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing 10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour LEGO MINDSTORMS lets you design and program robots that can do just about anything! The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working... $36.71 Add to Wishlist Add to Cart
Quick view Syngress Publishing A Guide to Kernel Exploitation: Attacking the Core A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Aggressive Network Self-Defense Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Alternate Data Storage Forensics Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Android Forensics: Investigation, Analysis and Mobile Security for Google Android Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This... $84.99 Add to Wishlist Add to Cart
Quick view Syngress Publishing Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Avien Malware Defense Guide for the Enterprise Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Best Damn Cisco Internetworking Book Period The Best Damn Cisco Internetworking Book Period shows readers everything they need to know about all Cisco internetworking topics. The book provides an understanding of Cisco's current VoIP solutions... $83.84 Add to Wishlist Add to Cart
Quick view Syngress Publishing Bignum Math: Implementing Cryptographic Multiple Precision Arithmetic Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Black Hat Physical Device Security: Exploiting Hardware and Software Black Hat, Inc. is the premier, worldwide provider of security training, consulting, and conferences. In Black Hat Physical Device Security: Exploiting Hardware and Software, the Black Hat experts... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Blackhatonomics: An Inside Look at the Economics of Cybercrime Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides... $50.51 Add to Wishlist Add to Cart
Quick view Syngress Publishing Bluetooth Application Developer's Guide [With CDROM] "Bluetooth (enabled devices) will ship in the billions of units once it gains momentum." - Martin Reynolds, Gartner Group Bluetooth is the most exciting development in wireless computing this decade!... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Botnets The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Buffer Overflow Attacks The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of... $49.36 Add to Wishlist Add to Cart
Quick view Syngress Publishing Building a VoIP Network with Nortel's Multimedia Communication Server 5100 The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world. This book begins with a discussion of the current... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Building Robots with Lego Mindstorms NXT The Ultimate Tool for MINDSTORMS(R) ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics... $52.80 Add to Wishlist Add to Cart
Quick view Syngress Publishing Check Point Next Generation with Application Intelligence Security Administration Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Checkpoint Next Generation Security Administration Unparalleled security management that IT professionals have been waiting for.Check Point Software Technologies is the worldwide leader in securing the Internet. The company's Secure Virtual Network... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco Avvid and IP Telephony Design and Implementation Corporate demand for AVVID solutions is rapidly increasing - engineers will need this book Cisco AVVID (Architecture for Voice, Video and Integrated Data), the latest development from Cisco Systems,... $93.03 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco PIX Firewalls Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco Security Professional's Guide to Secure Intrusion Detection Systems Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco Security Specialist's Guide to Pix Firewall Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Citrix XenDesktop Implementation: A Practical Guide for IT Professionals Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Client-Side Attacks and Defense Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Combating Spyware in the Enterprise Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM] CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Computer Incident Response and Forensics Team Management Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Configuring Check Point Ngx Vpn-1/Firewall-1 Check Point NGX VPN-1/Firewall-1 is the next major release of Check Point's flagship firewall software product, which has over 750,000 registered users. The most significant changes to this release... $67.75 Add to Wishlist Add to Cart