Búsqueda de Editorial : SYNGRESS PUBLISHING

392 resultados

SYNGRESS PUBLISHING Eliminar filtro Quitar filtros
  • SECURING THE INTERNET OF THINGS
    SHANCANG LI / LI DA XU
    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concep...

    $797.00

  • FEDERAL CLOUD COMPUTING
    MATTHEW METHENY
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (R...

    $930.00

  • HACKING WIRELESS ACCESS POINTS
    JENNIFER KURTZ
    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, c...

    $664.00

  • ADVANCED PERSISTENT SECURITY
    IRA WINKLER / ARACELI TREU GOMES
    Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how...

    $664.00

  • LOSSLESS INFORMATION HIDING IN IMAGES
    ZHE-MING LU / SHI-ZE GUO
    Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that...

    $930.00

  • CONTEMPORARY DIGITAL FORENSIC INVESTIGATIONS OF CLOUD AND MOBILE APPLICATIONS
    Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from diffe...

    $1,329.00

  • BUILDING A PRACTICAL INFORMATION SECURITY PROGRAM
    JASON ANDRESS / MARK LEARY
    Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject m...

    $930.00

  • HANDBOOK OF SYSTEM SAFETY AND SECURITY
    Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these produ...

    $2,659.00

  • INTEGRATING PYTHON WITH LEADING COMPUTER FORENSICS PLATFORMS
    CHET HOSMER
    Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCas...

    $930.00

  • PENETRATION TESTER'S OPEN SOURCE TOOLKIT
    JEREMY FAIRCLOTH
    Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test res...

    $797.00

  • MOBILE SECURITY AND PRIVACY
    MAN HO AU / RAYMOND CHOO
    Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, m...

    $1,329.00

  • DATA HIDING TECHNIQUES IN WINDOWS OS
    NIHAD AHMAD HASSAN / RAMI HIJAZI
    "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employe...

    $664.00

  • ELEVENTH HOUR CISSP®
    JOSHUA FELDMAN / SETH MISENAR / ERIC CONRAD
    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted...

    $399.00

  • THE BASICS OF CYBER SAFETY
    JOHN SAMMONS / MICHAEL CROSS
    The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the ba...

    $399.00

  • INFORMATION SECURITY SCIENCE
    CARL YOUNG
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In par...

    $930.00

  • CYBER GUERILLA
    JELLE VAN HAASTER / RICKEY GEVERS / MARTIJN SPRENGERS
    Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate...

    $664.00

  • EXECUTING WINDOWS COMMAND LINE INVESTIGATIONS
    CHET HOSMER / JOSHUA BARTOLOMIE / ROSANNE PELLI
    The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analys...

    $930.00

  • DNS SECURITY
    ALLAN LISKA / GEOFFREY STOWE
    DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack ag...

    $664.00

  • CYBERSECURITY AND APPLIED MATHEMATICS
    LEIGH METCALF / WILLIAM CASEY
    Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph ...

    $930.00

  • CYBER SECURITY AWARENESS FOR ACCOUNTANTS AND CPAS
    HENRY DALZIEL / DAVID WILLSON
    Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all rela...

    $531.00

  • CYBER SECURITY AWARENESS FOR LAWYERS
    HENRY DALZIEL / DAVID WILLSON
    Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information securit...

    $531.00

  • ESSENTIAL COMPUTER SECURITY: EVERYONE'S GUIDE TO EMAIL, INTERNET, AND WIRELESS SECURITY
    T. BRADLEY
    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page...

    $425.00

  • DIGITAL TRIAGE FORENSICS: PROCESSING THE DIGITAL CRIME SCENE
    PEARSON, STEPHEN / WATSON, RICHARD
    Digital triage forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. The U.S. Army and other traditional police agencies use this model for current digital forensic applications. The tool, training, and techniques from this practice are being brought to the publi...

    $763.00

  • SEVEN DEADLIEST UNIFIED COMMUNICATIONS ATTACKS
    YORK, DAN
    Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications technology? Then you need Seven Deadliest Unified Communication Attacks. This book pinpoints the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the bes...

    $318.00

  • SEVEN DEADLIEST WIRELESS TECHNOLOGIES ATTACKS
    HAINES, BRAD
    Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defen...

    $318.00

  • SEVEN DEADLIEST USB ATTACKS
    ANDERSON, BRIAN / ANDERSON, BARBARA
    Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-b...

    $318.00

  • SEVEN DEADLIEST NETWORK ATTACKS
    PROWELL, STACY / KRAUS, ROB / BORKIN, MIKE
    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need Seven Deadliest Network Attacks. This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with ste...

    $318.00

  • A GUIDE TO KERNEL EXPLOITATION
    ENRICO PERLA
    A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been p...

    $664.00

  • ELEVENTH HOUR CISSP: STUDY GUIDE
    ERIC CONRAD / SETH MISENAR / JOSHUA FELDMAN
    Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing assets and to find ways to mitigate those risks. Information security jobs include firewall engineers, penetration testers, auditors, and the like. The book is composed ...

    $332.00

  • SECURING THE SMART GRID
    TONY FLICK
    Securing the Smart Grid discusses the features of the smart grid, particularly its strengths and weaknesses, to better understand threats and attacks, and to prevent insecure deployments of smart grid technologies. A smart grid is a modernized electric grid that uses information and communications technology to be able to process information, such as the behaviors of suppliers ...

    $664.00