Syngress

Best Selling

icon Subscribe to feed

Browse

Best Selling

New Releases

 

Publisher

Delete Syngress

 

Non-Fiction

Computers (188)

Science and Technics (11)

Business & economics (3)

Law (1)

 

Price

All

Free

Below $ 5

$ 5 - $ 10

$ 10 - $ 15

Delete Price range

From :
To :
OK

 

Language

English (193)

French (0)

German (0)

Spanish (0)

Italian (0)

 

Protection

All (193)

DRM Free (0)

DRM (193)

More options

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

by Dale Liu

Three exams, two certifications, one complete Cisco training solution for networking professionals!

The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining...


Dissecting the Hack: The F0rb1dd3n Network: The F0rb1dd3n Network

by Jayson E Street, Kent Nabors & Brian Baskin

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as well as everyday people interested in security) will find a gripping story that takes the reader on a global trip...


Citrix XenDesktop Implementation: A Practical Guide for IT Professionals

by Gareth R. James

Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure...


CISSP Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with...


Practical Lock Picking: A Physical Penetration Tester's Training Guide

by Deviant Ollam

For the first time, Deviant Ollam, one of the security industry's best-known lockpicking teachers, has assembled an instructional manual geared specifically toward penetration testers. Unlike other texts on...


Logging and Log Management: The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and other IT 'Noise'

by Anton Chuvakin, Kevin Schmidt & Chris Phillips

Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log...


Securing SQL Server: Protecting Your Database from Attackers

by Denny Cherry

SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack.

In Securing SQL...


Securing the Cloud: Cloud Computer Security Techniques and Tactics

by Vic (J.R.) Winkler

As companies turn to burgeoning cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you...


Seven Deadliest USB Attacks

by Brian Anderson & Barbara Anderson

Seven Deadliest USB Attacks provides a comprehensive view of the most serious types of Universal Serial Bus (USB) attacks. While the book focuses on Windows systems, Mac, Linux, and UNIX systems are equally...


The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

by Patrick Engebretson

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results...


Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

by Eric D. Knapp

For a decade now we have been hearing the same thing-that our critical infrastructure is vulnerable and it needs to be secured. Industrial Network Security examines the unique protocols and applications that...


GFI Network Security and PCI Compliance Power Tools

by Brien Posey

Today all companies, U.S. federal agencies, and non-profit organizations have valuable data on their servers that needs to be secured. One of the challenges for IT experts is learning how to use new products...


Eleventh Hour CISSP: Study Guide

by Eric Conrad, Seth Misenar & Joshua Feldman

Eleventh Hour CISSP Study Guide serves as a guide for those who want to be information security professionals. The main job of an information security professional is to evaluate the risks involved in securing...


Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab

by Thomas Wilhelm

Professional Penetration Testing: Creating and Operating a Formal Hacking Lab examines all aspects of professional penetration testing, from project management to team building, metrics, risk management, training,...


Securing the Smart Grid: Next Generation Power Grid Security

by Tony Flick & Justin Morehouse

"The first step in securing the Smart Grid is to fully understand the threat landscape. This book provides both a timely and relevant overview of the subject - a must-read for anyone responsible for securing...


CompTIA Network+ Certification Study Guide 2E: Exam N10-004

by Robert Shimonski

CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. The 2009 Network+ exam (N10-004) is a major...


CompTIA Linux+ Certification Study Guide: Exam XK0-003

by Brian Barber, Chris Happel & Terrence V. Lillard

CompTIA's Linux+ certification is a globally-recognized, vendor neutral exam. The Linux+ exam (XK1-003) is a substantive revision with updates on applications, networking, and security. Our new study guide is...


Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on TargetSystems: Windows, Mac, Linux, Un

by Cory Altheide & Harlan Carvey

Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use...


Security for Microsoft Windows System Administrators: Introduction to Key Information Security Concepts

by Derrick Rountree

It's no longer just a buzz word: "Security" is an important part of your job as a Systems Administrator. Most security books are aimed at security professionals, but Security for System Administrators is written...


Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments

by Diane Barrett & Greg Kipper

Virtualization creates new and difficult challenges for forensic investigations. Operating systems and applications running in virtualized environments often leave few traces, yielding little evidence with which...