syngress

Product categories

Filters

Filters

Clear all
$
to
$
116 products
Sort by
Sort by
Digital Forensics with Open Source Tools,Used Digital Forensics with Open Source Tools,Used
Add to wishlist
Quick view
Add to compare
Digital Forensics with Open Source Tools,Used
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is...
Sale price$9.94 Regular price$14.20
Quantity
Add to cart
Digital Forensics: Threatscape and Best Practices,New Digital Forensics: Threatscape and Best Practices,New
Add to wishlist
Quick view
Add to compare
Digital Forensics: Threatscape and Best Practices,New
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book...
Sale price$45.57 Regular price$65.10
Quantity
Add to cart
Digital Forensics: Threatscape and Best Practices,Used Digital Forensics: Threatscape and Best Practices,Used
Add to wishlist
Quick view
Add to compare
Digital Forensics: Threatscape and Best Practices,Used
Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book...
Sale price$28.31 Regular price$40.44
Quantity
Add to cart
Federated Identity Primer,Used Federated Identity Primer,Used
Add to wishlist
Quick view
Add to compare
Federated Identity Primer,Used
Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions...
Sale price$15.99 Regular price$22.84
Quantity
Add to cart
New
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security,Used FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security,Used
Add to wishlist
Quick view
Add to compare
FISMA and the Risk Management Framework: The New Practice of...
FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that...
Sale price$14.11 Regular price$20.16
Quantity
Add to cart
Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega,Used Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and Sega,Used
Add to wishlist
Quick view
Add to compare
Game Console Hacking: Xbox, PlayStation, Nintendo, Game Boy, Atari and...
The worldwide video game console market surpassed $10 billion in 2003. Current sales of new consoles is consolidated around 3 major companies and their proprietary...
Sale price$17.68 Regular price$25.26
Quantity
Add to cart
Sold out
Google Talking,Used Google Talking,Used
Add to wishlist
Quick view
Add to compare
Google Talking,Used
Nationwide and around the world, instant messaging use is growing, with more than 7 billion instant messages being sent every day worldwide, according to IDC....
Sale price$11.09 Regular price$16.64
Quantity
Add to cart
Hacking Web Apps: Detecting and Preventing Web Application Security Problems,Used Hacking Web Apps: Detecting and Preventing Web Application Security Problems,Used
Add to wishlist
Quick view
Add to compare
Hacking Web Apps: Detecting and Preventing Web Application Security Problems,Used
How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking...
Sale price$12.26 Regular price$17.51
Quantity
Add to cart
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis,Used Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis,Used
Add to wishlist
Quick view
Add to compare
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic...
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis exposes the latest electronic covert communication techniques used by cybercriminals, along with the needed...
Sale price$30.75 Regular price$43.93
Quantity
Add to cart
How to Cheat at Securing Linux,Used How to Cheat at Securing Linux,Used
Add to wishlist
Quick view
Add to compare
How to Cheat at Securing Linux,Used
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space...
Sale price$43.15 Regular price$61.64
Quantity
Add to cart
How to Cheat at Windows System Administration Using Command Line Scripts,New How to Cheat at Windows System Administration Using Command Line Scripts,New
Add to wishlist
Quick view
Add to compare
How to Cheat at Windows System Administration Using Command Line...
How to Cheat at Windows Systems Administrators using Command Line Scripts teaches system administrators hundreds of powerful, timesaving tips for automating daily system administration tasks...
Sale price$43.94 Regular price$62.77
Quantity
Add to cart
How to Define and Build an Effective Cyber Threat Intelligence Capability,Used How to Define and Build an Effective Cyber Threat Intelligence Capability,Used
Add to wishlist
Quick view
Add to compare
How to Define and Build an Effective Cyber Threat Intelligence...
IntelligenceLed Security: How to Understand, Justify and Implement a New Approach to Security is a concise review of the concept of IntelligenceLed Security. Protecting a...
Sale price$39.49 Regular price$56.41
Quantity
Add to cart
Sold out New
Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid, Scada, And Other Industrial Control Syste Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid, Scada, And Other Industrial Control Syste
Add to wishlist
Quick view
Add to compare
Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid,...
Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid, Scada, And Other Industrial Control Systems Covers Implementation Guidelines For Security Measures Of Critical Infrastructure....
Sale price$43.16 Regular price$47.48
Quantity
Add to cart
Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid, Scada, And Other Industrial Control Syste,Used Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid, Scada, And Other Industrial Control Syste,Used
Add to wishlist
Quick view
Add to compare
Industrial Network Security: Securing Critical Infrastructure Networks For Smart Grid,...
As The Sophistication Of Cyberattacks Increases, Understanding How To Defend Critical Infrastructure Systemsenergy Production, Water, Gas, And Other Vital Systemsbecomes More Important, And Heavily Mandated....
Sale price$19.86 Regular price$28.37
Quantity
Add to cart
New
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis,New Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis,New
Add to wishlist
Quick view
Add to compare
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection...
In order to protect companys information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what...
Sale price$56.82 Regular price$81.17
Quantity
Add to cart
New
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis,Used Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection and Data Analysis,Used
Add to wishlist
Quick view
Add to compare
Information Security Risk Assessment Toolkit: Practical Assessments through Data Collection...
In order to protect companys information assets such as sensitive customer records, health care records, etc., the security practitioner first needs to find out: what...
Sale price$16.47 Regular price$23.53
Quantity
Add to cart

Recently viewed products