Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


21. 

Social Media Security

Social Media Security

By: Michael Cross

Publisher: Syngress

Publication Date: 01-NOV-2013

Insert Date: 22-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g.,...

22. 

The Basics of IT Audit

The Basics of IT Audit

By: Stephen D. Gantz

Publisher: Syngress

Publication Date: 31-OCT-2013

Insert Date: 22-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to...

23. 

Cyber Warfare, 2nd Edition

Cyber Warfare, 2nd Edition

By: Jason Andress; Steve Winterfeld

Publisher: Syngress

Publication Date: 01-OCT-2013

Insert Date: 02-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Cyber Warfare explores the battlefields, participants and tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the...

24. 

Eleventh Hour CISSP, 2nd Edition

Eleventh Hour CISSP, 2nd Edition

By: Eric Conrad; Seth Misenar; Joshua Feldman

Publisher: Syngress

Publication Date: 16-OCT-2013

Insert Date: 02-NOV-2013

Slots: 1.0

Table of Contents • Start Reading

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the...

25. 

Unified Communications Forensics

Unified Communications Forensics

By: Nicholas Mr. Grant; Joseph II Shaw

Publisher: Syngress

Publication Date: 07-OCT-2013

Insert Date: 31-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated...

26. 

Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd Edition

Business Continuity and Disaster Recovery Planning for IT Professionals, 2nd Edition

By: Susan Snedaker

Publisher: Syngress

Publication Date: 10-SEP-2013

Insert Date: 31-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Powerful Earthquake Triggers Tsunami in Pacific. Hurricane Isaac Makes Landfall in the Gulf Coast. Wildfires Burn Hundreds of Houses and Businesses in Colorado. Tornado Touches Down in Missouri. These headlines not only have caught the attention of people around the world, they have had a significant effect on IT professionals as well. The new 2 nd Edition of Business Continuity and Disaster Recovery for IT Professionals gives you the most up-to-date planning and risk management techniques for business continuity and disaster recovery (BCDR). With distributed networks, increasing...

27. 

Introduction to Cyber-Warfare

Introduction to Cyber-Warfare

By: Paulo Shakarian; Jana Shakarian; Andrew Ruef

Publisher: Syngress

Publication Date: 16-MAY-2013

Insert Date: 25-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Introduction to Cyber-Warfare: A Multidisciplinary Approach, written by experts on the front lines, gives you an insider's look into the world of cyber-warfare through the use of recent case studies. The book examines the issues related to cyber warfare not only from a computer science perspective but from military, sociological, and scientific perspectives as well. You'll learn how cyber-warfare has been performed in the past as well as why various actors rely on this new means of warfare and what steps can be taken to prevent it. Provides a multi-disciplinary approach to...

28. 

How to Cheat at IIS 7 Server Administration

How to Cheat at IIS 7 Server Administration

By: Chris Adams

Publisher: Syngress

Publication Date: 22-JUN-2007

Insert Date: 12-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and reliably hosting Web applications and services. With the new version of IIS, there are more security options, 40 new feature models that allow administrators to customize their settings, and a new set of administration tools. Administrators migrating from version 6 will find this How to Cheat book the perfect vehicle for getting up to speed fast on the new version. IIS version 7 is the perfect product for the How to Cheat series. This new...

29. 

The Basics of Cloud Computing

The Basics of Cloud Computing

By: Derrick Rountree; Ileana Castrillo

Publisher: Syngress

Publication Date: 03-SEP-2013

Insert Date: 04-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

As part of the Syngress Basics series, The Basics of Cloud Computing provides readers with an overview of the cloud and how to implement cloud computing in their organizations. Cloud computing continues to grow in popularity, and while many people hear the term and use it in conversation, many are confused by it or unaware of what it really means. This book helps readers understand what the cloud is and how to work with it, even if it isn’t a part of their day-to-day responsibility. Authors Derrick Rountree and Ileana Castrillo explains the concepts of cloud computing in practical...

30. 

FISMA Compliance Handbook

FISMA Compliance Handbook

By: Laura P. Taylor

Publisher: Syngress

Publication Date: 20-AUG-2013

Insert Date: 04-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed. This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA...

31. 

X-Ways Forensics Practitioner’s Guide

X-Ways Forensics Practitioner’s Guide

By: Brett Shavers; Eric Zimmerman

Publisher: Syngress

Publication Date: 10-AUG-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

The X-Ways Forensics Practitioner's Guide is more than a manual-it's a complete reference guide to the full use of one of the most powerful forensic applications available, software that is used by a wide array of law enforcement agencies and private forensic examiners on a daily basis. In the X-Ways Forensics Practitioner's Guide, the authors provide you with complete coverage of this powerful tool, walking you through configuration and X-Ways fundamentals, and then moving through case flow, creating and importing hash databases, digging into OS artifacts, and conducting searches. ...

32. 

Practical Anonymity

Practical Anonymity

By: Peter Loshin

Publisher: Syngress

Publication Date: 19-JUL-2013

Insert Date: 03-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

For those with legitimate reason to use the Internet anonymously--diplomats, military and other government agencies, journalists, political activists, IT professionals, law enforcement personnel, political refugees and others--anonymous networking provides an invaluable tool, and many good reasons that anonymity can serve a very important purpose. Anonymous use of the Internet is made difficult by the many websites that know everything about us, by the cookies and ad networks, IP-logging ISPs, even nosy officials may get involved. It is no longer possible to turn off browser cookies to...

33. 

Digital Forensics Processing and Procedures

Digital Forensics Processing and Procedures

By: David Lilburn Watson; Andrew Jones

Publisher: Syngress

Publication Date: 30-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This is the first digital forensics book that covers the complete lifecycle of digital evidence and the chain of custody. This comprehensive handbook includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book is a must for any digital forensics lab. It provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody--from incident response through analysis in the lab. A step-by-step guide to designing, building and using a...

34. 

Professional Penetration Testing, 2nd Edition

Professional Penetration Testing, 2nd Edition

By: Thomas Wilhelm

Publisher: Syngress

Publication Date: 27-JUN-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. ...

35. 

Network and System Security, 2nd Edition

Network and System Security, 2nd Edition

By: John R. Vacca

Publisher: Syngress

Publication Date: 26-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters...

36. 

Managing Information Security, 2nd Edition

Managing Information Security, 2nd Edition

By: John R. Vacca

Publisher: Syngress

Publication Date: 21-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’...

37. 

Cyber Security and IT Infrastructure Protection

Cyber Security and IT Infrastructure Protection

By: John R. Vacca

Publisher: Syngress

Publication Date: 22-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security,...

38. 

Job Reconnaissance

Job Reconnaissance

By: Josh More

Publisher: Syngress

Publication Date: 20-SEP-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the...

39. 

Simple Steps to Data Encryption

Simple Steps to Data Encryption

By: Peter Loshin

Publisher: Syngress

Publication Date: 30-APR-2013

Insert Date: 17-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what...

40. 

The Wireshark Field Guide

The Wireshark Field Guide

By: Robert Shimonski

Publisher: Syngress

Publication Date: 14-MAY-2013

Insert Date: 16-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into...