Quick view Syngress Publishing Seven Deadliest Web Application Attacks Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers. This book pinpoints the most dangerous hacks... $35.56 Add to Wishlist Add to Cart
Quick view Syngress Publishing Seven Deadliest Wireless Technologies Attacks Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven different attacks against popular wireless protocols and systems. This book pinpoints the most dangerous hacks... $35.56 Add to Wishlist Add to Cart
Quick view Syngress Publishing Skype Me! from Single User to Small Enterprise and Beyond This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure Skype on several platforms including Windows, Max... $49.36 Add to Wishlist Add to Cart
Quick view Syngress Publishing Snort Intrusion Detection and Prevention Toolkit [With CDROM] This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This fully integrated book and Web toolkit covers everything from packet inspection to optimizing... $65.45 Add to Wishlist Add to Cart
Quick view Syngress Publishing Social Media Security: Leveraging Social Networking While Mitigating Risk Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach,... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Software Piracy Exposed This book is about software piracy--what it is and how it's done. Stealing software is not to be condoned, and theft of intellectual property and copyright infringement are serious matters, but it's... $56.25 Add to Wishlist Add to Cart
Quick view Syngress Publishing SonicWALL Secure Wireless Networks Integrated Solutions Guide Nearly forty percent of the world's 1 billion+ Internet users are wireless. It's a truly staggering fact to think that the majority of these wireless implementations are fundamentally insecure,... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Stealing the Network The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Stealing the Network: How to Own a Continent This is a book that will create enormous debate within the technical and the counter-terrorism communities. While there will be the inevitable criticism that the material contained in the book could... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Syngress Force Emerging Threat Analysis A One-Stop Reference Containing the Most Read Topics in the Syngress Security Library This Syngress Anthology Helps You Protect Your Enterprise from Tomorrow's Threats Today This is the perfect... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing The Best Damn Cybercrime and Digital Forensics Book Period: Your Guide to Digital Information Seizure, Incident Response, and Computer Forensics Electronic discovery refers to a process in which electronic data is sought, located, secured, and searched with the intent of using it as evidence in a legal case. Computer forensics is the... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing The Best Damn Windows Server 2008 Book Period Best Damn Windows Server 2008 Book Period, Second Edition is completely revised and updated to Windows Server 2008. This book will show you how to increase the reliability and flexibility of your... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing The Hacker's Guide to OS X Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting,... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Troubleshooting Windows 2000 TCP/IP TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Utm Security with Fortinet: Mastering Fortios Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments Virtualization and Forensics: A Digital Forensic Investigators Guide to Virtual Environments offers an in-depth view into the world of virtualized environments and the implications they have on... $76.94 Add to Wishlist Add to Cart
Quick view Syngress Publishing Virtualization with Microsoft Virtual Server 2005 A virtual evolution in IT shops large and small has begun. Microsoft's Virtal Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Wardriving & Wireless Penetration Testing Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless... $64.30 Add to Wishlist Add to Cart
Quick view Syngress Publishing Wardriving: Drive, Detect, Defend: A Guide to Wireless Security The practice of WarDriving is a unique combination of hobby, sociological research, and security assessment. The act of driving or walking through urban areas with a wireless-equipped laptop to map... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Web Application Vulnerabilities: Detect, Exploit, Prevent In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Windows 2012 Server Network Security: Securing Your Windows Network Systems and Infrastructure Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and... $62.00 Add to Wishlist Add to Cart
Quick view Syngress Publishing Windows Server 2012 Security from End to Edge and Beyond: Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book... $90.74 Add to Wishlist Add to Cart
Quick view Syngress Publishing Winternals: Defragmentation, Recovery, and Administration Field Guide The only book available for the market leading Winternals tools used in over 70,000 Microsoft networks worldwide. The book begins with a chapter describing the most common challenges faced by system... $67.75 Add to Wishlist Add to Cart
Quick view Syngress Publishing Xss Attacks: Cross Site Scripting Exploits and Defense A cross site scripting attack is a very specific type of attack on a web application. It is used by hackers to mimic real sites and fool people into providing personal data. XSS Attacks starts by... $81.54 Add to Wishlist Add to Cart
Quick view Syngress Publishing Zen and the Art of Information Security While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely... $43.61 Add to Wishlist Add to Cart
Quick view Syngress Publishing Zero Day Exploit: Countdown to Darkness The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious Zero-Day attack will appeal to every corner of the IT community. Although finctional, the... $67.75 Add to Wishlist Add to Cart