Quick view Syngress Publishing .Net Mobile Web Developers Guide Introducing Microsoft's flagship wireless development toolThe .NET Mobile Web Developer's Guide will provide readers with a solid guide to developing mobile applications using Microsoft technologies... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing 10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour LEGO MINDSTORMS lets you design and program robots that can do just about anything! The LEGO MINDSTORMS RIS 2.0 is the core set for all MINDSTORMS users, that lets users design and program working... $36.71 Add to Wishlist Add to Cart
Quick view Syngress Publishing A Guide to Kernel Exploitation: Attacking the Core A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Aggressive Network Self-Defense Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Alternate Data Storage Forensics Learn to pull "digital fingerprints" from alternate data storage (ADS) devices including: iPod, Xbox, digital cameras and more from the cyber sleuths who train the Secret Service, FBI, and Department... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Android Forensics: Investigation, Analysis and Mobile Security for Google Android Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone. This... $84.99 Add to Wishlist Add to Cart
Quick view Syngress Publishing Applied Cyber Security and the Smart Grid: Implementing Security Controls Into the Modern Power Infrastructure Many people think of the Smart Grid as a power distribution group built on advanced smart metering--but that's just one aspect of a much larger and more complex system. The "Smart Grid" requires new... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Avien Malware Defense Guide for the Enterprise Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years: they led the way on generic filtering at the gateway, and in the... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Bignum Math: Implementing Cryptographic Multiple Precision Arithmetic Implementing cryptography requires integers of significant magnitude to resist cryptanalytic attacks. Modern programming languages only provide support for integers which are relatively small and... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Blackhatonomics: An Inside Look at the Economics of Cybercrime Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides... $50.51 Add to Wishlist Add to Cart
Quick view Syngress Publishing Botnets The book begins with real world cases of botnet attacks to underscore the need for action. Next the book will explain botnet fundamentals using real world examples. These chapters will cover what... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Buffer Overflow Attacks The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of... $49.36 Add to Wishlist Add to Cart
Quick view Syngress Publishing Building a VoIP Network with Nortel's Multimedia Communication Server 5100 The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world. This book begins with a discussion of the current... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Building Robots with Lego Mindstorms NXT The Ultimate Tool for MINDSTORMS(R) ManiacsThe new MINDSTORMS kit has been updated to include a programming brick, USB cable, RJ11-like cables, motors, and sensors. This book updates the robotics... $52.80 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco PIX Firewalls Umer Khan's first book, Cisco Security Specialist's Guide to PIX Firewalls, ISBN: 1931836639, has consistently maintained its spot as the #1 best-selling PIX book on amazon.com by providing readers... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco Security Professional's Guide to Secure Intrusion Detection Systems Cisco Systems, Inc. is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment, with major upgrades... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cisco Security Specialist's Guide to Pix Firewall Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Citrix XenDesktop Implementation: A Practical Guide for IT Professionals Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desktop infrastructure solution. After introducing the desktop virtualization, the book discusses the... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Client-Side Attacks and Defense Client-Side Attacks and Defense offers background networks against its attackers. The book examines the forms of client-side attacks and discusses different kinds of attacks along with delivery... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Combating Spyware in the Enterprise Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. Combating Spyware in the Enterprise begins by... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Comptia Network+ Certification Study Guide: Exam N10-004: Exam N10-004 2e [With DVD ROM] CompTIA Network+ Certification Study Guide: Exam N10-004, Second Edition, offers a practical guide for those interested in pursuing CompTIA Network+ certification. It presents the fundamental... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Computer Incident Response and Forensics Team Management Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Configuring Netscreen Firewalls The first book on the market covering the #2 best-selling firewall appliances in the world from NetScreen. This book continues Syngress' history from ISA Server to Check Point to Cisco Pix of being... $64.30 Add to Wishlist Add to Cart
Quick view Syngress Publishing Configuring Sonicwall Firewalls SonicWALL firewalls are the number 3 in sales worldwide in the security appliance market space as of 2004. This accounts for 15% total market share in the security appliance sector. The SonicWALL... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Configuring Symantec AntiVirus This is the only book that will teach system administrators how to configure, deploy, and troubleshoot Symantec Enterprise Edition in an enterprise network. The book will reflect Symantec's... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cryptography for Developers The only guide for software developers who must learn and implement cryptography safely and cost effectively. Cryptography for Developers begins with a chapter that introduces the subject of... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing CYA Securing Exchange Server 2003 and Outlook Web Access A highly portable, easily digestible road-map to configuring, maintaining and troubleshooting essential Exchange Server 2003 features. The book is organized around the 11 MMCs (Microsoft Management... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cyber Adversary Characterization: Auditing the Hacker Mind The wonders and advantages of modern age electronics and the World Wide Web have also, unfortunately, ushered in a new age of terrorism. The growing connectivity among secure and insecure networks... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Cyber Spying: Tracking Your Family's (Sometimes) Secret Online Lives Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on... $56.25 Add to Wishlist Add to Cart