Quick view Syngress Publishing Integrating ISA Server 2006 with Microsoft Exchange 2007 This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Introduction to Information Security Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By... $90.74 Add to Wishlist Add to Cart
Quick view Syngress Publishing Intrusion Prevention and Active Response: Deploying Network and Host IPS Intrusion Prevention and Active Response provides an introduction to the field of Intrusion Prevention and provides detailed information on various IPS methods and technologies. Specific methods are... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Kismet Hacking Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. Unlike other... $74.64 Add to Wishlist Add to Cart
Quick view Syngress Publishing Linksys WRT54G Ultimate Hacking This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The... $52.80 Add to Wishlist Add to Cart
Quick view Syngress Publishing Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene. It is part of Syngress... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Malware Forensics: Investigating and Analyzing Malicious Code Malware Forensics: Investigating and Analyzing Malicious Code covers the complete process of responding to a malicious code incident. Written by authors who have investigated and prosecuted federal... $89.59 Add to Wishlist Add to Cart
Quick view Syngress Publishing Microsoft Forefront Security Administration Guide Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Microsoft Log Parser Toolkit Written by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing Network Intrusion Analysis Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Network+: Exam N10-004 Study Guide Eleventh Hour Security+: Exam SY0-201 Study Guide offers a practical guide for those preparing for the CompTIA Network+ exam. The book's 10 chapters provide in-depth discussions of the following... $33.26 Add to Wishlist Add to Cart
Quick view Syngress Publishing No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America. As the clich? goes, information is power. In this age of technology, an increasing... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Open Source Fuzzing Tools Fuzzing is often described as a "black box" software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing OS X Exploits and Defense Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research,... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Perfect Password: Selection, Protection, Authentication User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to... $36.71 Add to Wishlist Add to Cart
Quick view Syngress Publishing Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures... $73.49 Add to Wishlist Add to Cart
Quick view Syngress Publishing Practical Oracle Security: Your Unauthorized Guide to Relational Database Security This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing RFID Security RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Rfid+ Study Guide and Practice Exams: Study Guide and Practice Exams Radio Frequency Identification (RFID) is an automatic identification method, relying on storing and remotely retrieving data using devices called RFID tags (also called transponders). This book is a... $52.80 Add to Wishlist Add to Cart
Quick view Syngress Publishing Rick Gallahers MPLS Training Guide Rick Gallahers MPLS Training Guide introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. It discusses specific router and switch platforms and... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Ruby Developers Guide An expert guide to Ruby, a popular new Object-Oriented Programming Language Ruby is quickly becoming a favourite among developers who need a simple, straight forward, portable programming language... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Secrets Stolen, Fortunes Lost The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to... $93.03 Add to Wishlist Add to Cart
Quick view Syngress Publishing Securing Im and P2P Applications for the Enterprise This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, as "the most secure Windows Server ever". However, to fully achieve this lofty status, system... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Security Log Management: Identifying Patterns in the Chaos This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Security Sage's Guide to Hardening the Network Infrastructure This is the only computer book to focus completely on infrastucture security: network devices, protocols and architectures. It offers unique coverage of network design so administrators understand... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Seven Deadliest Network Attacks Seven Deadliest Network Attacks identifies seven classes of network attacks and discusses how the attack works, including tools to accomplish the attack, the risks of the attack, and how to defend... $35.56 Add to Wishlist Add to Cart
Quick view Syngress Publishing Seven Deadliest Social Network Attacks Seven Deadliest Social Network Attacks describes the seven deadliest social networking attacks and how to defend against them. This book pinpoints the most dangerous hacks and exploits specific to... $35.56 Add to Wishlist Add to Cart
Quick view Syngress Publishing Seven Deadliest Unified Communications Attacks Seven Deadliest Unified Communications Attacks provides a comprehensive coverage of the seven most dangerous hacks and exploits specific to Unified Communications (UC) and lays out the anatomy of... $35.56 Add to Wishlist Add to Cart