Quick view Syngress Publishing Data Hiding: Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Developing .Net Web Services with XML Prepare for the next generation of the internet with this in-depth, developer's guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Dictionary of Information Security The Dictionary of Information Security is a compilation of security terms and definitions that working security professionals and IT students will find helpful. IT professionals and IT students will... $43.61 Add to Wishlist Add to Cart
Quick view Syngress Publishing Digital Forensics with Open Source Tools Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Digital Triage Forensics: Processing the Digital Crime Scene Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), a procedural model for the investigation of digital crime... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Dr. Tom Shinder's ISA Server 2006 Migration Guide Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear, concise, and thorough path to migrate from previous versions of ISA Server to ISA Server 2006. ISA Server 2006 is an incremental... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Eleventh Hour Linux+: Exam Xk0-003 Study Guide Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam. The book begins with a review of important concepts that are needed for... $33.26 Add to Wishlist Add to Cart
Quick view Syngress Publishing Eleventh Hour Security+: Exam Sy0-201 Study Guide Eleventh Hour Network+: Exam N10-004 Study Guide offers a practical guide for those preparing for the Security+ certification exam. The book's 14 chapters provide in-depth discussions of the... $33.26 Add to Wishlist Add to Cart
Quick view Syngress Publishing Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures The book covers a decade of work with some of the largest commercial and government agencies around the world in addressing cyber security related to malicious insiders (trusted employees,... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Firewall Policies and VPN Configurations A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Fisma and the Risk Management Framework: The New Practice of Federal Cyber Security FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing... $84.99 Add to Wishlist Add to Cart
Quick view Syngress Publishing Game Console Hacking: Having Fun While Voiding Your Warranty The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary platforms: Nintendo, Sony and... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing Gfi Network Security and PCI Compliance Power Tools Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Google Talking Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC. comScore Media Metrix reports that there... $49.36 Add to Wishlist Add to Cart
Quick view Syngress Publishing Hacking Web Apps: Detecting and Preventing Web Application Security Problems How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Host Integrity Monitoring Using Osiris and Samhain This book will walk the reader through the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Administering Office Communications Server 2007 Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. The product provides management for all synchronous communications that takes place... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Configuring ISA Server 2004 How to Cheat at Configuring ISA (Internet Security and Acceleration) Server 2004 meets the needs of system administrators for a concise, step-by-step guide to getting one of Microsoft's most complex... $49.36 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Configuring Open Source Security Tools The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an infrastructure with freely... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Configuring VmWare ESX Server A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Deploying and Securing RFID RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at It Project Management This book is written with the IT professional in mind. It provides a clear, concise system for managing IT projects, regardless of the size or complexity of the project. It avoids the jargon and... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Managing Information Security This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Managing Windows Server Update Services: Volume 1 Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Securing Linux Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as... $64.30 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Securing SQL Server 2005 The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at VoIP Security The Perfect Reference for the Multitasked SysAdminThis is the perfect guide if VoIP engineering is not your specialty. It is the perfect introduction to VoIP security, covering exploit tools and how... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing How to Cheat at Windows System Administration Using Command Line Scripts How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, time-saving tips for automating daily system administration tasks using... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing Infosecurity 2008 Threat Analysis An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified "Insider Threats" as one of the most significant challenges facing IT,... $49.36 Add to Wishlist Add to Cart