Syngress

Product categories

Filters

Filters

Clear all
$
to
$
116 products
Sort by
Sort by
OS X Incident Response: Scripting and Analysis,Used OS X Incident Response: Scripting and Analysis,Used
Add to wishlist
Quick view
Add to compare
OS X Incident Response: Scripting and Analysis,Used
OS X Incident Response: Scripting and Analysis is written for analysts who are looking to expand their understanding of a lesserknown operating system. By mastering...
Sale price$54.23 Regular price$77.47
Quantity
Add to cart
New
Penetration Tester's Open Source Toolkit,Used Penetration Tester's Open Source Toolkit,Used
Add to wishlist
Quick view
Add to compare
Penetration Tester's Open Source Toolkit,Used
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box...
Sale price$38.86 Regular price$55.51
Quantity
Add to cart
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring,Used
Add to wishlist
Quick view
Add to compare
Perl Scripting for Windows Security: Live Response, Forensic Analysis, and...
I decided to write this book for a couple of reasons. One was that Ive now written a couple of books that have to do...
Sale price$13.23 Regular price$18.90
Quantity
Add to cart
Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects,Used
Add to wishlist
Quick view
Add to compare
Placing the Suspect Behind the Keyboard: Using Digital Forensics and...
Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as...
Sale price$41.59 Regular price$59.41
Quantity
Add to cart
Sold out New
Practical Lock Picking: A Physical Penetration Tester'S Training Guide Practical Lock Picking: A Physical Penetration Tester'S Training Guide
Add to wishlist
Quick view
Add to compare
Practical Lock Picking: A Physical Penetration Tester'S Training Guide
Practical Lock Picking: A Physical Penetration Testers Training Guide Introduces The Reader To The Basic Principles Of Lock Picking. The Book Combines Both Easytofollow, Stepbystep...
Sale price$37.02 Regular price$40.73
Quantity
Add to cart
New
Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used
Add to wishlist
Quick view
Add to compare
Professional Penetration Testing: Creating and Learning in a Hacking Lab,Used
Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testingthe act of testing a computer...
Sale price$11.94 Regular price$17.06
Quantity
Add to cart
Python Passive Network Mapping: P2NMAP,Used Python Passive Network Mapping: P2NMAP,Used
Add to wishlist
Quick view
Add to compare
Python Passive Network Mapping: P2NMAP,Used
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.The "Heartbleed" vulnerability has...
Sale price$53.16 Regular price$75.94
Quantity
Add to cart
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century,Used Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic Espionage in the 21st Century,Used
Add to wishlist
Quick view
Add to compare
Secrets Stolen, Fortunes Lost: Preventing Intellectual Property Theft and Economic...
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft...
Sale price$11.48 Regular price$16.40
Quantity
Add to cart
Securing SQL Server, Third Edition,Used Securing SQL Server, Third Edition,Used
Add to wishlist
Quick view
Add to compare
Securing SQL Server, Third Edition,Used
SQL server is the most widelyused database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer...
Sale price$12.30 Regular price$17.57
Quantity
Add to cart
New
Securing SQL Server: Protecting Your Database from Attackers,Used Securing SQL Server: Protecting Your Database from Attackers,Used
Add to wishlist
Quick view
Add to compare
Securing SQL Server: Protecting Your Database from Attackers,Used
SQL server is the most widely used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive...
Sale price$16.02 Regular price$22.89
Quantity
Add to cart
Securing the Cloud: Cloud Computer Security Techniques and Tactics,Used Securing the Cloud: Cloud Computer Security Techniques and Tactics,Used
Add to wishlist
Quick view
Add to compare
Securing the Cloud: Cloud Computer Security Techniques and Tactics,Used
Securing the Cloud is the first book that helps you secure your information while taking part in the time and cost savings of cloud computing....
Sale price$10.31 Regular price$14.73
Quantity
Add to cart
Securing VoIP: Keeping Your VoIP Network Safe,Used Securing VoIP: Keeping Your VoIP Network Safe,Used
Add to wishlist
Quick view
Add to compare
Securing VoIP: Keeping Your VoIP Network Safe,Used
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your companys secrets....
Sale price$31.23 Regular price$44.61
Quantity
Add to cart
Sold out New
Security Risk Management: Building An Information Security Risk Management Program From The Ground Up Security Risk Management: Building An Information Security Risk Management Program From The Ground Up
Add to wishlist
Quick view
Add to compare
Security Risk Management: Building An Information Security Risk Management Program...
Security Risk Management Is The Definitive Guide For Building Or Running An Information Security Risk Management Program. This Book Teaches Practical Techniques That Will Be...
Sale price$15.72 Regular price$17.30
Quantity
Add to cart
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up,New Security Risk Management: Building an Information Security Risk Management Program from the Ground Up,New
Add to wishlist
Quick view
Add to compare
Security Risk Management: Building an Information Security Risk Management Program...
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be...
Sale price$45.56 Regular price$65.09
Quantity
Add to cart
Sold out
Simple Steps to Data Encryption: A Practical Guide to Secure Computing,Used Simple Steps to Data Encryption: A Practical Guide to Secure Computing,Used
Add to wishlist
Quick view
Add to compare
Simple Steps to Data Encryption: A Practical Guide to Secure...
Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is...
Sale price$52.38 Regular price$74.83
Quantity
Add to cart
Social Engineering Penetration Testing,Used Social Engineering Penetration Testing,Used
Add to wishlist
Quick view
Add to compare
Social Engineering Penetration Testing,Used
Social engineering attacks target the weakest link in an organization's security human beings. Everyone knows these attacks are effective, and everyone knows they are on...
Sale price$32.94 Regular price$47.06
Quantity
Add to cart

Recently viewed products