Búsqueda de Editorial : SYNGRESS PUBLISHING

392 resultados

SYNGRESS PUBLISHING Eliminar filtro Quitar filtros
  • SECURING THE INTERNET OF THINGS
    SHANCANG LI / LI DA XU
    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concep...

    $797.00

  • FEDERAL CLOUD COMPUTING
    MATTHEW METHENY
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (R...

    $930.00

  • HACKING WIRELESS ACCESS POINTS
    JENNIFER KURTZ
    Hacking Wireless Access Points: Cracking, Tracking, and Signal Jacking provides readers with a deeper understanding of the hacking threats that exist with mobile phones, laptops, routers, and navigation systems. In addition, applications for Bluetooth and near field communication (NFC) technology continue to multiply, with athletic shoes, heart rate monitors, fitness sensors, c...

    $664.00

  • ADVANCED PERSISTENT SECURITY
    IRA WINKLER / ARACELI TREU GOMES
    Advanced Persistent Security covers secure network design and implementation, including authentication, authorization, data and access integrity, network monitoring, and risk assessment. Using such recent high profile cases as Target, Sony, and Home Depot, the book explores information security risks, identifies the common threats organizations face, and presents tactics on how...

    $664.00

  • LOSSLESS INFORMATION HIDING IN IMAGES
    ZHE-MING LU / SHI-ZE GUO
    Lossless Information Hiding in Images introduces many state-of-the-art lossless hiding schemes, most of which come from the authors' publications in the past five years. After reading this book, readers will be able to immediately grasp the status, the typical algorithms, and the trend of the field of lossless information hiding. Lossless information hiding is a technique that...

    $930.00

  • CONTEMPORARY DIGITAL FORENSIC INVESTIGATIONS OF CLOUD AND MOBILE APPLICATIONS
    Contemporary Digital Forensic Investigations of Cloud and Mobile Applications comprehensively discusses the implications of cloud (storage) services and mobile applications on digital forensic investigations. The book provides both digital forensic practitioners and researchers with an up-to-date and advanced knowledge of collecting and preserving electronic evidence from diffe...

    $1,329.00

  • BUILDING A PRACTICAL INFORMATION SECURITY PROGRAM
    JASON ANDRESS / MARK LEARY
    Building a Practical Information Security Program provides users with a strategic view on how to build an information security program that aligns with business objectives. The information provided enables both executive management and IT managers not only to validate existing security programs, but also to build new business-driven security programs. In addition, the subject m...

    $930.00

  • HANDBOOK OF SYSTEM SAFETY AND SECURITY
    Handbook of System Safety and Security: Cyber Risk and Risk Management, Cyber Security, Adversary Modeling, Threat Analysis, Business of Safety, Functional Safety, Software Systems, and Cyber Physical Systems presents an update on the world's increasing adoption of computer-enabled products and the essential services they provide to our daily lives. The tailoring of these produ...

    $2,659.00

  • INTEGRATING PYTHON WITH LEADING COMPUTER FORENSICS PLATFORMS
    CHET HOSMER
    Integrating Python with Leading Computer Forensic Platforms takes a definitive look at how and why the integration of Python advances the field of digital forensics. In addition, the book includes practical, never seen Python examples that can be immediately put to use. Noted author Chet Hosmer demonstrates how to extend four key Forensic Platforms using Python, including EnCas...

    $930.00

  • PENETRATION TESTER'S OPEN SOURCE TOOLKIT
    JEREMY FAIRCLOTH
    Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to the open source tools available today and teaches you how to use them by demonstrating them in real-world examples. This book expands upon existing documentation so that a professional can get the most accurate and in-depth test res...

    $797.00

  • MOBILE SECURITY AND PRIVACY
    MAN HO AU / RAYMOND CHOO
    Mobile Security and Privacy: Advances, Challenges and Future Research Directions provides the first truly holistic view of leading edge mobile security research from Dr. Man Ho Au and Dr. Raymond Choo—leading researchers in mobile security. Mobile devices and apps have become part of everyday life in both developed and developing countries. As with most evolving technologies, m...

    $1,329.00

  • DATA HIDING TECHNIQUES IN WINDOWS OS
    NIHAD AHMAD HASSAN / RAMI HIJAZI
    "This unique book delves down into the capabilities of hiding and obscuring data object within the Windows Operating System. However, one of the most noticeable and credible features of this publication is, it takes the reader from the very basics and background of data hiding techniques, and run’s on the reading-road to arrive at some of the more complex methodologies employe...

    $664.00

  • ELEVENTH HOUR CISSP®
    JOSHUA FELDMAN / SETH MISENAR / ERIC CONRAD
    Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted...

    $399.00

  • THE BASICS OF CYBER SAFETY
    JOHN SAMMONS / MICHAEL CROSS
    The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the ba...

    $399.00

  • INFORMATION SECURITY SCIENCE
    CARL YOUNG
    Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In par...

    $930.00

  • CYBER GUERILLA
    JELLE VAN HAASTER / RICKEY GEVERS / MARTIJN SPRENGERS
    Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate...

    $664.00

  • EXECUTING WINDOWS COMMAND LINE INVESTIGATIONS
    CHET HOSMER / JOSHUA BARTOLOMIE / ROSANNE PELLI
    The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analys...

    $930.00

  • DNS SECURITY
    ALLAN LISKA / GEOFFREY STOWE
    DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack ag...

    $664.00

  • CYBERSECURITY AND APPLIED MATHEMATICS
    LEIGH METCALF / WILLIAM CASEY
    Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph ...

    $930.00

  • CYBER SECURITY AWARENESS FOR ACCOUNTANTS AND CPAS
    HENRY DALZIEL / DAVID WILLSON
    Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all rela...

    $531.00

  • CYBER SECURITY AWARENESS FOR LAWYERS
    HENRY DALZIEL / DAVID WILLSON
    Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information securit...

    $531.00

  • ESSENTIAL COMPUTER SECURITY: EVERYONE'S GUIDE TO EMAIL, INTERNET, AND WIRELESS SECURITY
    T. BRADLEY
    Essential Computer Security provides the vast home user and small office computer market with the information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.Tony Bradley is the Guide for the About.com site for Internet Network Security. In his role managing the content for a site that has over 600,000 page...

    $425.00

  • INTRODUCTION TO SOCIAL MEDIA INVESTIGATION: A HANDS-ON APPROACH
    GOLBECK, JENNIFER
    If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone intere...

    $797.00

  • HACKING WEB INTELLIGENCE: OPEN SOURCE INTELLIGENCE AND WEB RECONNAISSANCE CONCEPTS AND TECHNIQUES
    CHAUHAN, SUDHANSHU / PANDA, NUTAN KUMAR
    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment—that is, reconnaissance—is not given enough attention by security professionals, hackers, and penetration testers. Often, the in...

    $797.00

  • SECURING SQL SERVER: PROTECTING YOUR DATABASE FROM ATTACKERS
    CHERRY, DENNY
    SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these ...

    $664.00

  • PYTHON PASSIVE NETWORK MAPPING: P2NMAP
    HOSMER, CHET
    Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity. The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectiv...

    $930.00

  • SMART GRID SECURITY: INNOVATIVE SOLUTIONS FOR A MODERNIZED GRID
    SKOPIK, FLORIAN
    The Smart Grid security ecosystem is complex and multi-disciplinary, and relatively under-researched compared to the traditional information and network security disciplines. While the Smart Grid has provided increased efficiencies in monitoring power usage, directing power supplies to serve peak power needs and improving efficiency of power delivery, the Smart Grid has also op...

    $1,595.00

  • NEXT GENERATION RED TEAMING
    DALZIEL, HENRY
    Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, a...

    $531.00

  • SECURING SOCIAL MEDIA IN THE ENTERPRISE
    DALZIEL, HENRY
    Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps are now a ubiquitous presence within enterprise systems and networks, and are vulnerable to a wide range of digital systems attacks. This brief volume provides security professional...

    $531.00

  • INFOSEC MANAGEMENT FUNDAMENTALS
    DALZIEL, HENRY
    Infosec Management Fundamentals is a concise overview of the Information Security management concepts and techniques, providing a foundational template for both experienced professionals and those new to the industry. This brief volume will also appeal to business executives and managers outside of infosec who want to understand the fundamental concepts of Information Security...

    $531.00