Syngress

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the executi

Will Gragido

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing

在线阅读本书 As the cliché reminds us, information is power. In this age of computer systems and technolo

Johnny Long

Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization
Securing Windows Server 2008: Prevent Attacks from Outside and Inside Your Organization

在线阅读本书 Microsoft hails the latest version of its flagship server operating system, Windows Server 2

Aaron Tiensivu

Linksys WRT54G Ultimate Hacking
Linksys WRT54G Ultimate Hacking

This book will teach the reader how to make the most of their WRT54G series hardware. These handy li

Paul Asadoorian

Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cel

Ken Dunham

Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines st

Johnny Long

Seven Deadliest Web Application Attacks
Seven Deadliest Web Application Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then

Mike Shema

Seven Deadliest Network Attacks
Seven Deadliest Network Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you nee

Stacy Prowell

The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator
The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator

This is the only official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study

Dave Kleiman

Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition

Dissecting the Hack is one heck of a ride! Hackers, IT professional, and Infosec aficionados (as wel

Jayson E.Street

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the

Thomas Wilhelm

Seven Deadliest Social Network Attacks
Seven Deadliest Social Network Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting social networks? Then

Carl Timm

Seven Deadliest Wireless Technologies Attacks
Seven Deadliest Wireless Technologies Attacks

Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? T

Brad Haines

Eleventh Hour CISSP: Study Guide
Eleventh Hour CISSP: Study Guide

The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to i

Eric Conrad

Seven Deadliest Unified Communications Attacks
Seven Deadliest Unified Communications Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting Unified Communications

Dan York

Seven Deadliest Microsoft Attacks
Seven Deadliest Microsoft Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Th

Rob Kraus

Seven Deadliest USB Attacks
Seven Deadliest USB Attacks

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then y

Brian Anderson

E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support

在线阅读本书 One of the hottest topics in computer forensics today, electronic discovery (e-discovery) is

Karen A.Schuler

A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core

The number of security countermeasures against user-land exploitation is on the rise. Because of thi

Enrico Perla B.Sc.Computer Science University of Torino M.Sc.Computer Science Trinity College Dublin

Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization

Microsoft Virtualization helps you understand and implement the latest virtualization strategies ava

Thomas Olzak