Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


1. 

Python Forensics

Python Forensics

By: Chet Hosmer

Publisher: Syngress

Publication Date: 19-MAY-2014

Insert Date: 03-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Python Forensics provides many never-before-published proven forensic modules, libraries, and solutions that can be used right out of the box. In addition, detailed instruction and documentation provided with the code samples will allow even novice Python programmers to add their own unique twists or use the models presented to build new solutions. Rapid development of new cybercrime investigation tools is an essential ingredient in virtually every case and environment. Whether you are performing post-mortem investigation, executing live triage, extracting evidence from mobile...

2. 

The Basics of Information Security, 2nd Edition

The Basics of Information Security, 2nd Edition

By: Jason Andress

Publisher: Syngress

Publication Date: 20-MAY-2014

Insert Date: 31-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply...

3. 

Ninja Hacking

Ninja Hacking

By: Thomas Wilhelm; Jason Andress

Publisher: Syngress

Publication Date: 02-NOV-2010

Insert Date: 03-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today’s ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company’s assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has:...

4. 

Social Engineering Penetration Testing

Social Engineering Penetration Testing

By: Gavin Watson; Andrew Mason; Richard Ackroyd

Publisher: Syngress

Publication Date: 11-APR-2014

Insert Date: 29-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Social engineering attacks target the weakest link in an organization's security—human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques—including email phishing, telephone pretexting, and physical vectors— can be used to elicit information or manipulate individuals into performing actions that...

5. 

Windows Forensic Analysis Toolkit, 4th Edition

Windows Forensic Analysis Toolkit, 4th Edition

By: Harlan Carvey

Publisher: Syngress

Publication Date: 11-MAR-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Harlan Carvey has updated Windows Forensic Analysis Toolkit , now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free...

6. 

Investigating Internet Crimes

Investigating Internet Crimes

By: Todd G. Shipley; Art Bowker

Publisher: Syngress

Publication Date: 12-NOV-2013

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse...

7. 

Computer Incident Response and Forensics Team Management

Computer Incident Response and Forensics Team Management

By: Leighton Johnson

Publisher: Syngress

Publication Date: 08-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when...

8. 

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit

By: Mark Horninger

Publisher: Syngress

Publication Date: 12-APR-2009

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

SQL Server 2008 is the latest update to Microsoft's flagship database management system. This is the largest update since SQL Server 2005. SQL Server 2008 is a much more significant update than SQL Server 2005, because it brings increased ability to deliver data across more platforms, and thus many different types of devices. New functionality also allows for easy storage and retrieval of digitized images and video. These attributes address the recent explosion in the popularity of web-based video and server and desktop virtualization. The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit...

9. 

The Basics of Digital Privacy

The Basics of Digital Privacy

By: Denny Cherry

Publisher: Syngress

Publication Date: 21-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal...

10. 

Cloud Storage Forensics

Cloud Storage Forensics

By: Darren Quick; Ben Martini; Raymond Choo

Publisher: Syngress

Publication Date: 16-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you...

11. 

Managed Code Rootkits

Managed Code Rootkits

By: Erez Metula

Publisher: Syngress

Publication Date: 25-NOV-2010

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack—the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable...

12. 

Targeted Cyber Attacks

Targeted Cyber Attacks

By: Aditya Sood; Richard Enbody

Publisher: Syngress

Publication Date: 18-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile. Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed...

13. 

Collaboration with Cloud Computing

Collaboration with Cloud Computing

By: Ric Messier

Publisher: Syngress

Publication Date: 07-APR-2014

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Collaboration with Cloud Computing discusses the risks associated with implementing these technologies across the enterprise and provides you with expert guidance on how to manage risk through policy changes and technical solutions. Drawing upon years of practical experience and using numerous examples and case studies, author Ric Messier discusses: The evolving nature of information security The risks, rewards, and security considerations when implementing SaaS, cloud computing and VoIP Social media and security risks in the enterprise The risks and rewards of allowing...

14. 

Hack Proofing Your Network 2E, 2nd Edition

Hack Proofing Your Network 2E, 2nd Edition

By: Syngress

Publisher: Syngress

Publication Date: 26-MAR-2002

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that...

15. 

Stealing the Network

Stealing the Network

By: Johnny Long; Timothy Mullen; Ryan Russell

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the...

16. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

17. 

Applied Network Security Monitoring

Applied Network Security Monitoring

By: Chris Sanders; Jason Smith

Publisher: Syngress

Publication Date: 26-NOV-2013

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a...

18. 

Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

By: Cameron H. Malin; Eoghan Casey; James M. Aquilina

Publisher: Syngress

Publication Date: 07-DEC-2013

Insert Date: 12-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a...

19. 

Identity and Access Management

Identity and Access Management

By: Ertem Osmanoglu

Publisher: Syngress

Publication Date: 19-NOV-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. Focuses on real-word implementations Provides end-to-end coverage...

20. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 05-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...