Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing co...
Violent Python shows you how to move from a theoretical understanding of offensive computing conc...
Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most c...
Unser bisheriger Preis:ORGPRICE: 30,50 €
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the s...
Python Forensics provides many never-before-published proven forensic modules, libraries, and sol...
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Ed...
Unser bisheriger Preis:ORGPRICE: 69,50 €
Google is the most popular search engine ever created, but Google's search capabilities are so po...
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the gr...
CISSP Study Guide, Third Edition provides readers with information on the CISSP certification, th...
As part of the Syngress Basics series, The Basics of Information Security provides you with funda...
The Syngress Digital Forensics Field Guides series is a hand-held companion for any digital and c...
Digital Forensics Trial Graphics: Teaching the Jury Through Effective Use of Visuals helps digita...
Client-Side Attacks and Defense offers background networks against its attackers. The book examin...
Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on th...
Citrix XenDesktop Implementation explores the implementation of Citrix XenDesktop, a virtual desk...
As data hiding detection and forensic techniques have matured, people are creating more advanced ...
A virtual evolution in IT shops large and small has begun. VMware's ESX Server is the enterprise ...
Microsoft hails the latest version of its flagship server operating system, Windows Server 2008, ...
Unser bisheriger Preis:ORGPRICE: 48,50 €
The Ultimate Tool for MINDSTORMS® ManiacsThe new MINDSTORMS kit has been updated to include a pro...
Lockpicking has become a popular topic with many in the security community. While many have chose...
Unser bisheriger Preis:ORGPRICE: 51,50 €
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags...
In this book, we aim to describe how to make a computer bend to your will by finding and exploiti...
Radio Frequency Identification (RFID) is an automatic identification method, relying on storing a...
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent...
Unser bisheriger Preis:ORGPRICE: 48,70 €
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and appro...
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the...
Harlan Carvey brings readers an advanced book on Windows Registry - the most difficult part of Wi...
Continuing a tradition of excellent training on open source tools, Penetration Tester's Open Sour...
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communica...
Social networks, particularly public ones, have become part of the fabric of how we communicate a...
The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The ...
Over 95% of computers around the world are running at least one Microsoft product. Microsoft Wind...
This book helps people find sensitive information on the Web.Google is one of the 5 most popular ...
Contrary to popular belief, there has never been any shortage of Macintosh-related security issue...
Network and System Security provides focused coverage of network and system security technologies...
Written by two experienced penetration testers the material presented discusses the basics of the...
This book will teach the reader how to make the most of their WRT54G series hardware. These handy...
Microsoft Forefront is a comprehensive suite of security products that will provide companies wit...
Unser bisheriger Preis:ORGPRICE: 59,50 €
Electronic discovery refers to a process in which electronic data is sought, located, secured, an...
The SANS Institute maintains a list of the 'Top 10 Software Vulnerabilities.' At the current time...
Unser bisheriger Preis:ORGPRICE: 41,07 €
Drawing upon the expertise of world-renowned researchers and experts, The Cloud Security Ecosyste...
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security ...
Unser bisheriger Preis:ORGPRICE: 45,50 €
Seven Deadliest Wireless Technologies Attacks provides a comprehensive view of the seven differen...
Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wirel...
Securing the Internet of Things provides network and cybersecurity researchers and practitioners ...
Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and te...
Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-develo...
Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units ...