Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing co...
Violent Python shows you how to move from a theoretical understanding of offensive computing conc...
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most c...
Unser bisheriger Preis:ORGPRICE: 30,50 €
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the s...
Python Forensics provides many never-before-published proven forensic modules, libraries, and sol...
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Ed...
Unser bisheriger Preis:ORGPRICE: 69,50 €
Google is the most popular search engine ever created, but Google's search capabilities are so po...
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the gr...
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, th...
As part of the Syngress Basics series, The Basics of Information Security provides you with funda...
The Syngress Digital Forensics Field Guides series is a hand-held companion for any digital and c...
Information Security Science: Measuring the Vulnerability to Data Compromises provides the scient...
The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics o...
Unser bisheriger Preis:ORGPRICE: 41,50 €
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digita...
Building a Practical Information Security Program provides users with a strategic view on how to ...
Advanced Persistent Security covers secure network design and implementation, including authentic...
The Dictionary of Information Security is a compilation of security terms and definitions that wo...
Unser bisheriger Preis:ORGPRICE: 32,50 €
Client-Side Attacks and Defense offers background networks against its attackers. The book examin...
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on th...
Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desk...
Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive in...
As data hiding detection and forensic techniques have matured, people are creating more advanced ...
Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and wh...
A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise ...
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, ...
Unser bisheriger Preis:ORGPRICE: 48,50 €
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a pro...
Lockpicking has become a popular topic with many in the security community. While many have chose...
Unser bisheriger Preis:ORGPRICE: 50,50 €
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags...
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact t...
Unser bisheriger Preis:ORGPRICE: 57,00 €
In this book, we aim to describe how to make a computer bend to your will by finding and exploiti...
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing a...
There is considerably more skill in the IT and security communities than is reflected in the jobs...
Unser bisheriger Preis:ORGPRICE: 24,50 €
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent...
Unser bisheriger Preis:ORGPRICE: 48,70 €
Linux Malware Incident Response is a 'first look' at the Malware Forensics Field Guide for Linux ...
Unser bisheriger Preis:ORGPRICE: 17,23 €
Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers ...
Identity authentication and authorization are integral tasks in today's digital world. As busines...
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all syst...
Unser bisheriger Preis:ORGPRICE: 57,00 €
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and appro...
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the...
Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Wi...
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Sour...
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communica...
Social networks, particularly public ones, have become part of the fabric of how we communicate a...
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The ...
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Wind...
This book helps people find sensitive information on the Web.Google is one of the 5 most popular ...
The Wireshark Field Guide provides hackers, pen testers, and network administrators with practica...
Denial of Service (DoS) attacks are a form of attack that seeks to make a network resource unavai...
Unser bisheriger Preis:ORGPRICE: 59,50 €