Librería: ThriftBooks-Atlanta, AUSTELL, GA, Estados Unidos de America
EUR 8,34
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2009
ISBN 10: 1597494224 ISBN 13: 9781597494229
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 6,65
Cantidad disponible: 3 disponibles
Añadir al carritoPaperback. Condición: Very Good. Windows Forensic Analysis DVD Toolkit, Second Edition, is a completely updated and expanded version of Harlan Carvey's best-selling forensics book on incident response and investigating cybercrime on Windows systems. With this book, you will learn how to analyze data during live and post-mortem investigations. New to this edition is Forensic Analysis on a Budget, which collects freely available tools that are essential for small labs, state (or below) law enforcement, and educational organizations. The book also includes new pedagogical elements, Lessons from the Field, Case Studies, and War Stories that present real-life experiences by an expert in the trenches, making the material real and showing the why behind the how. The companion DVD contains significant, and unique, materials (movies, spreadsheet, code, etc.) not available anyplace else because they were created by the author. This book will appeal to digital forensic investigators, IT security professionals, engineers, and system administrators as well as students and consultants. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2007
ISBN 10: 1597490741 ISBN 13: 9781597490740
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 7,66
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Very Good. Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Researchis the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter demonstrates all of the features offered by the MSF as an exploitation platform. With a solid understanding of MSFs capabilities, the book then details techniques for dramatically reducing the amount of time required for developing functional exploits. By working through a real-world vulnerabilities against popular closed source applications, the reader will learn how to use the tools and MSF to quickly build reliable attacks as standalone exploits. The section will also explain how to integrate an exploit directly into the Metasploit Framework by providing a line-by-line analysis of an integrated exploit module. Details as to how the Metasploit engine drives the behind-the-scenes exploitation process will be covered, and along the way the reader will come to understand the advantages of exploitation frameworks. The final section of the book examines the Meterpreter payload system and teaches readers to develop completely new extensions that will integrate fluidly with the Metasploit Framework. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2001
ISBN 10: 192899430X ISBN 13: 9781928994305
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 10,83
Cantidad disponible: 3 disponibles
Añadir al carritoPaperback. Condición: Very Good. The first book to focus on Brocade products - an inovative tecnology company to watch out for! Brocade Switches provide the intelligent architecture that connects Storage Area Networks (SANs) to Local Area Networks and Wide Area Networks. Brocade switches provide the same functionality to Storage Area Networks as Cisco switches provide to the Internet - Brocade Communications, Inc is the dominant company in this rapidly expanding market. Building SANs with Brocade Fibre Channel Fabric Switches is written for system administrators who are designing, building, and maintaining Storage Area Networks with Brocade fibre switches. The book provides the reader with all of the techniques necessary to integrate fibre-based switches with an IP-based network. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 4,76
Cantidad disponible: 1 disponibles
Añadir al carritoSoft cover. Condición: Good. Good condition soft cover, some wear to cover and spine, internally clean and tidy with unmarked pages, in a good readable condition.
EUR 3,68
Cantidad disponible: 1 disponibles
Añadir al carritoCondición: Good. This is an ex-library book and may have the usual library/used-book markings inside.This book has soft covers. In good all round condition. Please note the Image in this listing is a stock photo and may not match the covers of the actual item,900grams, ISBN:9781597491525.
Idioma: Inglés
Publicado por Syngress Media,U.S. 01/07/2000, 2000
ISBN 10: 1928994156 ISBN 13: 9781928994152
Librería: Bahamut Media, Reading, Reino Unido
EUR 11,88
Cantidad disponible: 2 disponibles
Añadir al carritoCondición: Very Good. Shipped within 24 hours from our UK warehouse. Clean, undamaged book with no damage to pages and minimal wear to the cover. Spine still tight, in very good condition. Remember if you are not happy, you are covered by our 100% money back guarantee.
EUR 20,87
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Good. No Jacket. Pages can have notes/highlighting. Spine may show signs of wear. ~ ThriftBooks: Read More, Spend Less.
Idioma: Inglés
Publicado por Syngress Media Inc, Rockland, Massachusetts, U.S.A., 2006
ISBN 10: 1597491152 ISBN 13: 9781597491150
Librería: Feldman's Books, Menlo Park, CA, Estados Unidos de America
EUR 17,86
Cantidad disponible: 1 disponibles
Añadir al carritoPaper Bound. Condición: Fine. First Edition.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2012
ISBN 10: 0124095062 ISBN 13: 9780124095069
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 23,95
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.
Librería: Roland Antiquariat UG haftungsbeschränkt, Weinheim, Alemania
EUR 9,70
Cantidad disponible: 1 disponibles
Añadir al carritoSoftcover. 502 p. Unread book. Very good condition. Book shows slight signs of storage. Otherwise very good copy. Slight crease to the front cover. 9781928994206 Sprache: Englisch Gewicht in Gramm: 907.
Idioma: Inglés
Publicado por Syngress Media Inc, Rockland, Massachusetts, U.S.A., 2007
ISBN 10: 159749061X ISBN 13: 9781597490610
Librería: Feldman's Books, Menlo Park, CA, Estados Unidos de America
EUR 22,32
Cantidad disponible: 1 disponibles
Añadir al carritoPaper Bound. Condición: Fine. First Edition.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2015
ISBN 10: 0128047178 ISBN 13: 9780128047170
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 26,68
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: New. In the book we will be talking about Deploying Secure Containers for Training and Development. The book covers the technology behind Linux-based containers and what they can be used for. Details on how to use containers in training and development are also provided.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2011
ISBN 10: 1597496375 ISBN 13: 9781597496377
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 20,40
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Very Good. Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists. Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the books 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war. This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
EUR 6,17
Cantidad disponible: 1 disponibles
Añadir al carritoSoftcover. Condición: Moyen. Ancien livre de bibliothèque. Traces de pliures sur la couverture. Edition 2002. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Acceptable. Former library book. Traces of creases on the cover. Edition 2002. Ammareal gives back up to 15% of this item's net price to charity organizations.
EUR 6,17
Cantidad disponible: 1 disponibles
Añadir al carritoSoftcover. Condición: Bon. Ancien livre de bibliothèque. Légères traces d'usure sur la couverture. Couverture différente. Edition 2004. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Good. Former library book. Slight signs of wear on the cover. Different cover. Edition 2004. Ammareal gives back up to 15% of this item's net price to charity organizations.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2002
ISBN 10: 1931836604 ISBN 13: 9781931836609
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 21,01
Cantidad disponible: 3 disponibles
Añadir al carritoPaperback. Condición: Very Good. LEGO MINDSTORMS lets you design and program robots that can do just about anything! You've just purchased the LEGO MINDSTORMS Ultimate Builder Kit. Now what? Overwhelmed by the creative possibilities? The Builder Kit is targeted towards those who want to become "master LEGO builders." 10 Cool LEGO MINDSTORM Ultimate Builder Projects: Amazing Projects You Can Build in Under an Hour provides step-by-step instructions and detailed illustrations for users of all skill levels and proficiencies. This MINDSTORMS kit features many rare parts, a spare motor, a turntable, special gears, transparent beams, and even a pneumatics system-parts that can be confusing and that will be new to many LEGO builders. 10 Cool LEGO MINDSTORM Ultimate Builder Projects teaches readers how to incorporate these new features into their creations as they build 10 unique robots. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2006
ISBN 10: 1597491101 ISBN 13: 9781597491105
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 21,57
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Very Good. This is the only book that covers all the topics that any budding security manager needs to know! This book is written for managers responsible for IT/Security departments from mall office environments up to enterprise networks. These individuals do not need to know about every last bit and byte, but they need to have a solid understanding of all major, IT security issues to effectively manage their departments. This book is designed to cover both the basic concepts of security, non technical principle and practices of security and provides basic information about the technical details of many of the products - real products, not just theory. Written by a well known Chief Information Security Officer, this book gives the information security manager all the working knowledge needed to: Design the organization chart of his new security organization Design and implement policies and strategies Navigate his way through jargon filled meetings Understand the design flaws of his E-commerce and DMZ infrastructure. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Librería: Tamery, Paris, Francia
EUR 20,00
Cantidad disponible: 1 disponibles
Añadir al carritoCouverture souple. Condición: Très bon. #Broché : 600 pages #Parution : janvier 2004 #Résumé : Check Point Next Generation with Application Intelligence Security Administration focuses on Check Point NG FP 4. FP 4, offers security professionals an astounding array of products that upgrade and enhance the security and communication features of Check Point NG. Like Check Point NG Security Administration, this book provides readers with the perfect balance of the theories and concepts behind internet security, and the practical applications of Check Point NG FP 4. Readers can learn how to use all of these products to create a secure network with virtual private networking features. Security professionals will buy, read, and keep this book because it will cover all features of Check Point NG FP 4 like no other book will.
Idioma: Inglés
Publicado por Syngress Media Inc, 2004
Librería: Redux Books, Grand Rapids, MI, Estados Unidos de America
EUR 30,27
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: As New. New paperback from bookstore stock. An unread copy. May have minor rubbing and scuffing from shelf wear. Remainder mark.; 100% Satisfaction Guaranteed! Ships same or next business day!
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2009
ISBN 10: 1597494976 ISBN 13: 9781597494977
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 30,39
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam.The book begins with a review of important concepts that are needed for successful operating system installation. These include computer hardware, environment settings, partitions, and network settings. The book presents the strategies for creating filesystems; different types of filesystems; the tools used to create filesystems; and the tools used to administer filesystems. It explains the Linux boot process; how to configure system and user profiles as well as the common environment variables; and how to use BASH command line interpreter.The remaining chapters discuss how to install, configure, support, and remove applications; the configuration of Linux as a workstation and as a server; securing the Linux system; and common tools for managing a system. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2013
ISBN 10: 0124116442 ISBN 13: 9780124116443
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 30,83
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: New. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Idioma: Inglés
Publicado por Syngress Media,U.S., United States, Rockland, MA, 2012
ISBN 10: 1597499617 ISBN 13: 9781597499613
Librería: WorldofBooks, Goring-By-Sea, WS, Reino Unido
EUR 24,51
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: Very Good. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals.The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exams Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including:Clearly stated exam objectives; Unique terms/Definitions; Exam Warnings; Learning by Example; Hands-On Exercises; Chapter ending questions. Furthermore, special features include:Two practice exams; Tiered chapter ending questions that allow for a gradual learning curve;anda self-test appendix. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2013
ISBN 10: 0124116442 ISBN 13: 9780124116443
Librería: Rarewaves USA, OSWEGO, IL, Estados Unidos de America
EUR 31,71
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: New. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students.
Idioma: Inglés
Publicado por Syngress Media,U.S., Rockland, MA, 2013
ISBN 10: 0124116442 ISBN 13: 9780124116443
Librería: Grand Eagle Retail, Bensenville, IL, Estados Unidos de America
EUR 32,87
Cantidad disponible: 1 disponibles
Añadir al carritoPaperback. Condición: new. Paperback. The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Librería: Roland Antiquariat UG haftungsbeschränkt, Weinheim, Alemania
EUR 17,50
Cantidad disponible: 1 disponibles
Añadir al carritoBook + CD-Rom. 740 p. Unread book, 740 p. Very good condition. Slight traces of storage. 9781928994480 Sprache: Englisch Gewicht in Gramm: 1329 Softcover: 19.1 x 4.5 x 24.1 cm.
EUR 12,24
Cantidad disponible: 1 disponibles
Añadir al carritoSoftcover. Condición: Très bon. Edition 2004. Ammareal reverse jusqu'à 15% du prix net de cet article à des organisations caritatives. ENGLISH DESCRIPTION Book Condition: Used, Very good. Edition 2004. Ammareal gives back up to 15% of this item's net price to charity organizations.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2012
ISBN 10: 0124071899 ISBN 13: 9780124071896
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 34,57
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree.
Idioma: Inglés
Publicado por Syngress Media,U.S., US, 2013
ISBN 10: 0124096077 ISBN 13: 9780124096073
Librería: Rarewaves.com USA, London, LONDO, Reino Unido
EUR 36,07
Cantidad disponible: Más de 20 disponibles
Añadir al carritoPaperback. Condición: New. Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, digging too deeply, or making decisions too quickly. This hands-on guide will show you how to use an iterative approach to vendor analysis, so you can rapidly filter out the vendors that are clear failures and then select likely winners. It will then show you how to do progressively deeper dives into the likely winners so you can select a preferred vendor. Finally, you will learn how to negotiate with your preferred vendor to get reasonable prices and services. Provides an iterative approach to vendor assessment, showing you how to make decisions on sufficient data without wasting time Includes checklists to help you navigate the decision-making process, while considering all the important factors needed to make a sound decision Helps you understand and evaluate vendors based on key concepts such as performance criteria, functional testing, production, and price.
Librería: Revaluation Books, Exeter, Reino Unido
EUR 25,75
Cantidad disponible: 2 disponibles
Añadir al carritoPaperback. Condición: Brand New. 1st edition. 216 pages. 9.10x7.40x0.60 inches. In Stock.