Syngress

Refine
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition
Dissecting the Hack: The F0rb1dd3n Network, Revised Edition 45.95 $
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure 94.00 $
Logging and Log Management: The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and Other It Noise
Logging and Log Management: The Authoritative Guide to Dealing with Syslog, Audit Logs, Events, Alerts and Other It Noise 69.00 $
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security) (Jay Beale's Open Source Security)
Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security) (Jay Beale's Open Source Security) 74.00 $
Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target.. Systems: Windows, Mac, Linux, Unix, etc
Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target.. Systems: Windows, Mac, Linux, Unix, etc 99.00 $
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects 94.00 $
Security Exam SY0201 Study Guide by Dubrawsky & Ido
Security Exam SY0201 Study Guide by Dubrawsky & Ido 43.95 $
Avien Malware Defense Guide for the Enterprise by Harley & David
Avien Malware Defense Guide for the Enterprise by Harley & David 119.00 $
OS X Exploits and Defense by Bensky
OS X Exploits and Defense by Bensky 119.00 $
Utm Security with Fortinet Mastering Fortios by Tam & Kenneth
Utm Security with Fortinet Mastering Fortios by Tam & Kenneth 99.00 $
Perfect Passwords Selection Protection Authentication by Burnett & Mark
Perfect Passwords Selection Protection Authentication by Burnett & Mark 48.95 $
Insider Threat Protecting the Enterprise from Sabotage Spying and Theft by Cole
Insider Threat Protecting the Enterprise from Sabotage Spying and Theft by Cole 69.00 $
How to Cheat at Managing Microsoft Operations Manager 2005 by Piltzecker & Tony
How to Cheat at Managing Microsoft Operations Manager 2005 by Piltzecker & Tony 69.00 $
Combating Spyware in the Enterprise by Baskin & Brian
Combating Spyware in the Enterprise by Baskin & Brian 99.00 $
Physical and Logical Security Convergence Powered By Enterprise Security Management by Coughlin
Physical and Logical Security Convergence Powered By Enterprise Security Management by Coughlin 119.00 $
Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research by Maynor & David
Metasploit Toolkit for Penetration Testing Exploit Development and Vulnerability Research by Maynor & David 119.00 $
Data Hiding Exposing Concealed Data in Multimedia Operating Systems Mobile Devices and Network Protocols by Raggo & Michael T.
Data Hiding Exposing Concealed Data in Multimedia Operating Systems Mobile Devices and Network Protocols by Raggo & Michael T. 89.00 $
Enemy at the Water Cooler RealLife Stories of Insider Threats and Enterprise Security Management Countermeasures by Contos & Brian T.
Enemy at the Water Cooler RealLife Stories of Insider Threats and Enterprise Security Management Countermeasures by Contos & Brian T. 99.00 $
How to Cheat at Configuring Exchange Server 2007 Including Outlook Web Mobile and Voice Access by Walther & Henrik
How to Cheat at Configuring Exchange Server 2007 Including Outlook Web Mobile and Voice Access by Walther & Henrik 69.00 $
Open Source Fuzzing Tools by Rathaus & Noam
Open Source Fuzzing Tools by Rathaus & Noam 119.00 $
Configuring Sonicwall Firewalls by Lathem & Chris
Configuring Sonicwall Firewalls by Lathem & Chris 99.00 $
The Best Damn Windows Server 2008 Book Period by Piltzecker
The Best Damn Windows Server 2008 Book Period by Piltzecker 119.00 $
Seven Deadliest USB Attacks by Anderson & Brian
Seven Deadliest USB Attacks by Anderson & Brian 48.95 $
How to Cheat at Deploying and Securing RFID by Sanghera & Paul
How to Cheat at Deploying and Securing RFID by Sanghera & Paul 99.00 $
How to Cheat at Designing Security for a Windows Server 2003 Network by Amini & Rob
How to Cheat at Designing Security for a Windows Server 2003 Network by Amini & Rob 79.00 $
Security Log Management Identifying Patterns in the Chaos by Babbin & Jacob
Security Log Management Identifying Patterns in the Chaos by Babbin & Jacob 99.00 $
Scripting VMware Power Tools for Automating Virtual Infrastructure Administration by Muller & Al
Scripting VMware Power Tools for Automating Virtual Infrastructure Administration by Muller & Al 99.00 $
Zen and the Art of Information Security by Winkler & Ira
Zen and the Art of Information Security by Winkler & Ira 64.00 $
Practical VoIP Security by Porter & Thomas Cissp
Practical VoIP Security by Porter & Thomas Cissp 94.00 $
Malware Forensics Field Guide for Linux Systems Digital Forensics Field Guides by Malin & Cameron H.
Malware Forensics Field Guide for Linux Systems Digital Forensics Field Guides by Malin & Cameron H. 109.00 $
Computer Incident Response and Forensics Team Management by Johnson & Leighton
Computer Incident Response and Forensics Team Management by Johnson & Leighton 109.00 $
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware
Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware 54.00 $
Automating Open Source Intelligence: Algorithms for OSINT (Computer Science Reviews and Trends)
Automating Open Source Intelligence: Algorithms for OSINT (Computer Science Reviews and Trends) 69.00 $
Applied Network Security Monitoring: Collection, Detection, and Analysis
Applied Network Security Monitoring: Collection, Detection, and Analysis 89.00 $
Designing and Building a Security Operations Center
Designing and Building a Security Operations Center 84.00 $
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice 43.95 $
Operating System Forensics
Operating System Forensics 119.00 $
Cyber Guerilla
Cyber Guerilla 84.00 $
X-Ways Forensics Practitioner's Guide
X-Ways Forensics Practitioner's Guide 99.00 $
Implementing Digital Forensic Readiness: From Reactive to Proactive Process
Implementing Digital Forensic Readiness: From Reactive to Proactive Process 89.00 $
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics 49.95 $
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners
Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners 69.00 $
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy by Engebretson & Patrick
The Basics of Hacking and Penetration Testing Ethical Hacking and Penetration Testing Made Easy by Engebretson & Patrick 54.00 $
A Guide to Kernel Exploitation: Attacking the Core
A Guide to Kernel Exploitation: Attacking the Core 74.00 $
Hacking with Kali: Practical Penetration Testing Techniques
Hacking with Kali: Practical Penetration Testing Techniques 64.00 $
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides 94.00 $
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security
CSA Guide to Cloud Computing: Implementing Cloud Privacy and Security 99.00 $
Writing Security Tools and Exploits
Writing Security Tools and Exploits 94.00 $
How to Cheat at Microsoft Vista Administration
How to Cheat at Microsoft Vista Administration 59.00 $
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up 69.00 $
UTM Security with Fortinet
UTM Security with Fortinet 74.00 $
Securing the Cloud: Cloud Computer Security Techniques and Tactics
Securing the Cloud: Cloud Computer Security Techniques and Tactics 99.00 $
Syngress Force Emerging Threat Analysis: From Mischief to Malicious
Syngress Force Emerging Threat Analysis: From Mischief to Malicious 44.95 $
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems 69.00 $
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Android Forensics: Investigation, Analysis and Mobile Security for Google Android 109.00 $
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis 69.00 $
Violent Python
Violent Python 74.00 $
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice 64.00 $
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection...
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection... 84.00 $
Malware Forensics by Aquilina
Malware Forensics by Aquilina 139.00 $
Stealing the Network How to Own a Continent by Rogers & Russ
Stealing the Network How to Own a Continent by Rogers & Russ 99.00 $
Intrusion Prevention and Active Response Deploying Network and Host IPS by Rash & Michael
Intrusion Prevention and Active Response Deploying Network and Host IPS by Rash & Michael 99.00 $
FISMA and the Risk Management Framework by Gantz & Stephen
FISMA and the Risk Management Framework by Gantz & Stephen 129.00 $
Configuring Check Point NGX VPN1Firewall1 by Desmeules
Configuring Check Point NGX VPN1Firewall1 by Desmeules 99.00 $
Refine