Syngress

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Publisher

Delete Syngress

 

Non-Fiction

Computers (213)

Science and Technics (11)

Business & economics (3)

Social science (3)

Law (1)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (218)

French (0)

German (0)

Spanish (0)

Italian (0)

 

Protection

All (218)

DRM Free (0)

DRM (218)

More options

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


Dissecting the Hack: The F0rb1dd3n Network: The F0rb1dd3n Network

by Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on...


Logging and Log Management: The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT 'Noise'

by Anton Chuvakin, Kevin Schmidt & Chris Phillips

        • Comprehensive coverage of log management including analysis, visualization, reporting and more
        • Includes information on different uses for logs -- from system operations to regulatory compliance
        • Features case...

        Securing SQL Server: Protecting Your Database from Attackers

        by Denny Cherry

        Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. Written by Denny Cherry,...


        Securing the Cloud: Cloud Computer Security Techniques and Tactics

        by Vic (J.R.) Winkler

        As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


        Seven Deadliest USB Attacks

        by Brian Anderson & Barbara Anderson

        Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to...


        The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

        by Patrick Engebretson

        The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results...


        Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

        by Eric D. Knapp

        For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that...


        GFI Network Security and PCI Compliance Power Tools

        by Brien Posey

        Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


        Eleventh Hour CISSP: Study Guide

        by Eric Conrad, Seth Misenar & Joshua Feldman

        The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives...


        Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

        by Thomas Wilhelm

        An invaluable book and DVD package, Professional Penetration Testing: Creating and Operating a Formal Hacking Lab is designed to replicate the experience of in-classroom, instructor-led, penetration testing...


        Securing the Smart Grid: Next Generation Power Grid Security

        by Tony Flick & Justin Morehouse

        "The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing...


        CompTIA Network+ Certification Study Guide 2E: Exam N10-004

        by Robert Shimonski

        CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major...


        CompTIA Linux+ Certification Study Guide: Exam XK0-003

        by Brian Barber, Chris Happel & Terrence V. Lillard

        CompTIA's Linux+ certification is a globally-recognized, vendor neutral exam. The Linux+ exam (XK1-003) is a substantive revision with updates on applications, networking, and security. Our new study guide is...


        Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

        by Cory Altheide & Harlan Carvey

        Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...


        Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

        by Derrick Rountree

        It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written...


        Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

        by Diane Barrett & Greg Kipper

        Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which...