Syngress
Books by this publisher
-
Moving To The Cloud: Developing Apps in the New World of Cloud Computing
Published 9 years ago
by Dinkar Sitaram, Geetha Manjunath, Syngress
Moving to the Cloud provides an in-depth introduction to cloud computing models, cloud platforms, application development paradigms, concepts and technologies. The authors particularly examine cloud platforms that are in use today. They also describe programming APIs and compare the technologies that underlie them.
-
Migrating to the Cloud: Oracle Client/Server Modernization
Published 9 years ago
by Tom Laszewski, Prakash Nauduri, Syngress
Whether your company is planning on database migration, desktop application migration, or has IT infrastructure consolidation projects, this book gives you all the resources you'll need. It gives you recommendations on tools, strategy and best practices and serves as a guide as you plan, determine effort and budget, design, execute and roll your modern Oracle system out to production.
-
Coding for Penetration Testers: Building Better Tools
Published 9 years ago
by Jason Andress, Ryan Linn, Syngress
Tools used for penetration testing are often purchased or downloaded from the Internet. Each tool is based on a programming language such as Perl, Python, or Ruby. If a penetration tester wants to extend, augment, or change the functionality of a tool to perform a test differently than the default configuration, the tester must know the basics of coding for the related programming language.
-
Digital Forensics for Legal Professionals: Understanding Digital Evidence From The Warrant To The Courtroom
Published 9 years ago
by Larry Daniel, Lars Daniel, Syngress
Digital Forensics for Legal Professionals provides you with a guide to digital technology forensics in plain English. In the authors' years of experience in working with attorneys as digital forensics experts, common questions arise again and again: "What do I ask for?" "Is the evidence relevant?" "What does this item in the forensic report mean?" "What should I ask the other expert?" "What should I ask you?" "Can you explain that to a jury?" This book answers many of those questions in clear la
-
Thor's Microsoft Security Bible: A Collection of Practical Security Techniques
Published 9 years ago
by Timothy Thor Mullen, Syngress
Thor's Microsoft® Security Bible provides a "one-stop-shop" for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. The book contains detailed security concepts and methodologies described at every level: Server, Client, Organizational Structure, Platform-specific security options, application specific security (IIS, SQL, Active Directory, etc.
-
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Published 9 years ago
by Patrick Engebretson, Syngress
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more.
-
Penetration Tester's Open Source Toolkit, Third Edition
Published 9 years ago
by Jeremy Faircloth, Syngress
Great commercial penetration testing tools can be very expensive and sometimes hard to use or of questionable accuracy. This book helps solve both of these problems. The open source, no-cost penetration testing tools presented do a great job and can be modified by the user for each situation. Many tools, even ones that cost thousands of dollars, do not come with any type of instruction on how and in which situations the penetration tester can best use them.
-
Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Published 9 years ago
by Andrew Hoog, Syngress
The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis.
-
iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
Published 9 years ago
by Andrew Hoog, Katie Strzempka, Syngress
As sales and usage of iPhones increase so does the demand on organizations that conduct examinations on this device. iPhone and iOS Forensics takes an in-depth look at methods and processes that analyze the iPhone/iPod in an official legal manner. All of the methods and procedures outlined in the book can be taken into any court room. This book details the iPhone with information data sets that are new and evolving, with official hardware knowledge from Apple itself to help aid investigators.
-
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
Published 9 years ago
by Jason Andress, Syngress
As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. It covers the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability. Then it dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.
-
Digital Forensics with Open Source Tools
Published 9 years ago
by Cory Altheide, Harlan Carvey, Syngress
Based on the use of open source tools, this book lends itself to many organizations as well as students who do not have means to purchase new tools for different investigations.Well known forensic methods are demonstrated using open-source computer forensic tools (Sleuthkit, Foremost, dcdd, pyag, etc.
-
Securing SQL Server: Protecting Your Database from Attackers
Published 10 years ago
by Denny Cherry, Syngress
Microsoft SQL Server is the most used database platform in the world. Databases hold all of the information that a company uses. These databases have to be properly secured so that people that shouldn't have access are not able to access the data. This book covers the various ways that both employees and outside attackers can break into your database, how to prevent those problems, and how to clean up after a break-in.
-
Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation
Published 10 years ago
by Mario Heiderich, Eduardo Alberto Vela Nava, Gareth Heyes, David Lindsay, Syngress
Web applications are used every day by millions of users, which is why they are one of the most popular vectors for attackers. Obfuscation of code has allowed hackers to take one attack and create hundreds-if not millions-of variants that can evade your security measures. Web Application Obfuscation takes a look at common Web infrastructure and security controls from an attacker's perspective, allowing the reader to understand the shortcomings of their security systems.
-
Managed Code Rootkits: Hooking into Runtime Environments
Published 10 years ago
by Erez Metula, Syngress
Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack-the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected.
-
Eleventh Hour CISSP: Study Guide
Published 10 years ago
by Eric Conrad, Seth Misenar, Joshua Feldman, Syngress
The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. *The only guide you need for last-minute studying *Answers the toughest questions and highlights core topics *Can be paired with any other study guide so you are completely prepared
-
Citrix XenDesktop Implementation: A Practical Guide for IT Professionals
Published 10 years ago
by Gareth R. James, Syngress
Finally, a book to guide you through the tasks of implementing XenDesktop for your company. Citrix XenDesktop Implementation is aimed to specifically address how to implement a Virtual Desktop Infrastructure (VDI) solution using Citrix XenDesktop. Experience with Citrix XenApp technologies is certainly beneficial, but not required.
-
CISSP Study Guide
Published 10 years ago
by Eric Conrad, Seth Misenar, Joshua Feldman, Syngress
The CISSP Study Guide is aligned to cover all of the material included in the exam, complete with special attention to recent updates. The 10 domains are covered completely and as concisely as possible with an eye to passing the exam thr first time. Each of the 10 domains has its own chapter that includes specially-designed pedagogy to aid you in passing the exam. *Clearly Stated Exam Objectives *Unique Terms / Definitions *Exam Warnings *Helpful Notes
-
Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
Published 10 years ago
by Terrence V. Lillard, Syngress
Network forensics is an evolution of typical digital forensics, where evidence is gathered and analyzed from network traffic. This book will help security and network forensics professionals, as well as network administrators, understand the challenges faced by organizations and individuals investigating network-based criminal cases. The authors not only present various tools used to examine network traffic but also introduce different investigative methodologies.
-
Seven Deadliest Web Application Attacks
Published 10 years ago
by Mike Shema, Syngress
Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
-
Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series
Published 10 years ago
by Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern, Syngress
Do you need to keep up with the latest hacks, attacks, and exploits effecting Microsoft products? Then you need Seven Deadliest Microsoft Attacks. This book pinpoints the most dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Comments