Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


1. 

Hack Proofing Your Network 2E, 2nd Edition

Hack Proofing Your Network, 2nd Edition

By: Syngress

Publisher: Syngress

Publication Date: 26-MAR-2002

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is...

2. 

Stealing the Network

Stealing the Network

By: Johnny Long; Timothy Mullen; Ryan Russell

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 15-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet. Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the...

3. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

4. 

Applied Network Security Monitoring

Applied Network Security Monitoring

By: Chris Sanders; Jason Smith

Publisher: Syngress

Publication Date: 26-NOV-2013

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a...

5. 

Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

By: Cameron H. Malin; Eoghan Casey; James M. Aquilina

Publisher: Syngress

Publication Date: 07-DEC-2013

Insert Date: 12-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a...

6. 

Identity and Access Management

Identity and Access Management

By: Ertem Osmanoglu

Publisher: Syngress

Publication Date: 19-NOV-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers,...

7. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 16-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...

8. 

Social Media Security

Social Media Security

By: Michael Cross

Publisher: Syngress

Publication Date: 01-NOV-2013

Insert Date: 22-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g.,...

9. 

The Basics of IT Audit

The Basics of IT Audit

By: Stephen D. Gantz

Publisher: Syngress

Publication Date: 31-OCT-2013

Insert Date: 22-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to...

10. 

Cyber Warfare, 2nd Edition

Cyber Warfare, 2nd Edition

By: Jason Andress; Steve Winterfeld

Publisher: Syngress

Publication Date: 01-OCT-2013

Insert Date: 02-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the...

11. 

Eleventh Hour CISSP, 2nd Edition

Eleventh Hour CISSP, 2nd Edition

By: Eric Conrad; Seth Misenar; Joshua Feldman

Publisher: Syngress

Publication Date: 04-DEC-2013

Insert Date: 02-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the...

12. 

Unified Communications Forensics

Unified Communications Forensics

By: Nicholas Mr. Grant; Joseph II Shaw

Publisher: Syngress

Publication Date: 07-OCT-2013

Insert Date: 31-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated...

13. 

Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd Edition

Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd Edition

By: Susan Snedaker

Publisher: Syngress

Publication Date: 10-SEP-2013

Insert Date: 31-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2 nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks, increasing...

14. 

Introduction to Cyber-Warfare

Introduction to Cyber-Warfare

By: Paulo Shakarian; Jana Shakarian; Andrew Ruef

Publisher: Syngress

Publication Date: 16-MAY-2013

Insert Date: 25-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it. Provides a multi-disciplinary approach to...

15. 

How to Cheat at IIS 7 Server Administration

How to Cheat at IIS 7 Server Administration

By: Chris Adams

Publisher: Syngress

Publication Date: 22-JUN-2007

Insert Date: 12-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of administration tools. Administrators migrating from version 6 will find this How to Cheat book the perfect vehicle for getting up to speed fast on the new version. IIS version 7 is the perfect product for the How to Cheat series. This new...

16. 

The Basics of Cloud Computing

The Basics of Cloud Computing

By: Derrick Rountree; Ileana Castrillo

Publisher: Syngress

Publication Date: 03-SEP-2013

Insert Date: 04-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical...

17. 

FISMA Compliance Handbook

FISMA Compliance Handbook

By: Laura P. Taylor

Publisher: Syngress

Publication Date: 20-AUG-2013

Insert Date: 04-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA...

18. 

X-Ways Forensics Practitioner’s Guide

X-Ways Forensics Practitioner’s Guide

By: Brett Shavers; Eric Zimmerman

Publisher: Syngress

Publication Date: 10-AUG-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. ...

19. 

Practical Anonymity

Practical Anonymity

By: Peter Loshin

Publisher: Syngress

Publication Date: 26-AUG-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to...

20. 

Digital Forensics Processing and Procedures

Digital Forensics Processing and Procedures

By: David Watson; Andrew Jones

Publisher: Syngress

Publication Date: 30-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building and using a...