Syngress

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Publisher

Delete Syngress

 

Non-Fiction

Computers (193)

Science and Technics (8)

Social science (3)

Business & economics (3)

Law (1)

 

Language

English (197)

French (0)

German (0)

Spanish (0)

Italian (0)

 

Protection

All (197)

DRM Free (0)

DRM (197)

More options

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with...


Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices

by Max Schubert, Derrick Bennett & Jonathan Gines

The future for Nagios in the enterprise is certainly bright! Nagios 3 Enterprise Network Monitoring can help you harness the full power of Nagios in your organization. Nagios 3 contains many significant new...


Logging and Log Management: The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT 'Noise'

by Anton Chuvakin, Kevin Schmidt & Chris Phillips

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log...


Securing SQL Server: Protecting Your Database from Attackers

by Denny Cherry

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.

In Securing SQL...


Seven Deadliest USB Attacks

by Brian Anderson & Barbara Anderson

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally...


The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

by Patrick Engebretson

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Eleventh Hour CISSP: Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


Securing the Smart Grid: Next Generation Power Grid Security

by Tony Flick & Justin Morehouse

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing...


Digital Triage Forensics: Processing the Digital Crime Scene

by Stephen Pearson & Richard Watson

Digital Triage Forensics: Processing the Digital Crime Scene provides the tools, training, and techniques in Digital Triage Forensics (DTF), which are employed in the investigation of digital crime scenes, including...


The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance

by Mark Horninger

SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005,...


Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

by Will Gragido & John Pirc

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry....


The Real Citrix CCA Exam Preparation Kit: Prepare for XenApp 5.0

by Shawn Tooley

The Citrix Certified Administrator (CCA) credential is the first tier of Citrix certification. The CCA is most often sought out by IT professionals whose networks employ Citrix virtualization technology, and...


The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

by Jason Andress

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives...


Python Forensics: A workbench for inventing and sharing digital forensic technology

by Chet Hosmer

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with...


Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

by Aditya Sood & Richard Enbody

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual,...


Social Engineering Penetration Testing: Executing Social Engineering Pen Tests, Assessments and Defense

by Gavin Watson, Andrew Mason & Richard Ackroyd

Social engineering attacks target the weakest link in an organization's security-human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration...


Collaboration with Cloud Computing: Security, Social Media, and Unified Communications

by Ric Messier

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes...