Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


21. 

Professional Penetration Testing, 2nd Edition

Professional Penetration Testing, 2nd Edition

By: Thomas Wilhelm

Publisher: Syngress

Publication Date: 27-JUN-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Professional Penetration Testing walks you through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. With this book, you will find out how to turn hacking skills into a professional career. Chapters cover planning, metrics, and methodologies; the details of running a pen test, including identifying and verifying vulnerabilities; and archiving, reporting and management practices. ...

22. 

Network and System Security, 2nd Edition

Network and System Security, 2nd Edition

By: John R. Vacca

Publisher: Syngress

Publication Date: 26-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Network and System Security provides focused coverage of network and system security technologies. It explores practical solutions to a wide range of network and systems security issues. Chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. Coverage includes building a secure organization, cryptography, system intrusion, UNIX and Linux security, Internet security, intranet security, LAN security; wireless network security, cellular network security, RFID security, and more. Chapters...

23. 

Managing Information Security, 2nd Edition

Managing Information Security, 2nd Edition

By: John R. Vacca

Publisher: Syngress

Publication Date: 21-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Managing Information Security offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth coverage of the current technology and practice as it relates to information security management solutions. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’...

24. 

Cyber Security and IT Infrastructure Protection

Cyber Security and IT Infrastructure Protection

By: John R. Vacca

Publisher: Syngress

Publication Date: 22-AUG-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues. Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security,...

25. 

Job Reconnaissance

Job Reconnaissance

By: Josh More

Publisher: Syngress

Publication Date: 20-SEP-2013

Insert Date: 02-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

There is considerably more skill in the IT and security communities than is reflected in the jobs people are able to attain. Most people's limiting factor in their ability to get better jobs is not technical skills or even the soft skills necessary to do well in a new job. It is that getting a job is a completely different skill set and one that most people only practice every few years. Job Reconnaissance: Using Hacking Skills to Win the Job Hunt Game explains the job hunting process, why the most commonly followed models fail and how to better approach the search. It covers the...

26. 

Simple Steps to Data Encryption

Simple Steps to Data Encryption

By: Peter Loshin

Publisher: Syngress

Publication Date: 30-APR-2013

Insert Date: 17-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what...

27. 

The Wireshark Field Guide

The Wireshark Field Guide

By: Robert Shimonski

Publisher: Syngress

Publication Date: 14-MAY-2013

Insert Date: 16-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into...

28. 

The Basics of Web Hacking

The Basics of Web Hacking

By: Josh Pauli

Publisher: Syngress

Publication Date: 02-SEP-2013

Insert Date: 17-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these...

29. 

Risk Management Framework

Risk Management Framework

By: James Broad

Publisher: Syngress

Publication Date: 03-JUL-2013

Insert Date: 16-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly...

30. 

The Basics of Hacking and Penetration Testing, 2nd Edition

The Basics of Hacking and Penetration Testing, 2nd Edition

By: Patrick Engebretson

Publisher: Syngress

Publication Date: 02-SEP-2013

Insert Date: 16-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and...

31. 

Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond

By: Thomas W Shinder; Yuri Diogenes; Debra Littlejohn Shinder

Publisher: Syngress

Publication Date: 18-APR-2013

Insert Date: 03-MAY-2013

Slots: 1.0

Table of Contents • Start Reading

Windows 8 Security from End to Edge and Beyond shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access. Tom Shinder and Yuri Diogenes are both Microsoft employees who...

32. 

Assessing Vendors

Assessing Vendors

By: Josh More

Publisher: Syngress

Publication Date: 10-APR-2013

Insert Date: 03-MAY-2013

Slots: 1.0

Table of Contents • Start Reading

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so...

33. 

Cyber Crime and Espionage

Cybercrime and Espionage

By: Will Gragido; John Pirc

Publisher: Syngress

Publication Date: 07-JAN-2011

Insert Date: 29-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed Subversive Multi-Vector Threats. Whether the goal is to acquire and subsequently sell intellectual property from one...

34. 

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks

By: Brian Anderson; Barbara Anderson

Publisher: Syngress

Publication Date: 03-JUN-2010

Insert Date: 28-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device...

35. 

Applied Cyber Security and the Smart Grid

Applied Cyber Security and the Smart Grid

By: Eric D. Knapp; Raj Samani

Publisher: Syngress

Publication Date: 26-FEB-2013

Insert Date: 21-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the...

36. 

Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard

By: Brett Shavers

Publisher: Syngress

Publication Date: 01-FEB-2013

Insert Date: 06-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining...

37. 

How to Cheat at Securing Your Network

How to Cheat at Securing Your Network

By: Ido Dubrawsky

Publisher: Syngress

Publication Date: 02-OCT-2007

Insert Date: 22-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer...

38. 

Keys to the Kingdom

Keys to the Kingdom

By: Deviant Ollam

Publisher: Syngress

Publication Date: 06-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking . This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers...

39. 

Network Intrusion Analysis

Network Intrusion Analysis

By: Joe Fichera; Steven Bolt

Publisher: Syngress

Publication Date: 17-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full...

40. 

CISSP Study Guide, 2nd Edition

CISSP Study Guide, 2nd Edition

By: Eric Conrad; Seth Misenar; Joshua Feldman

Publisher: Syngress

Publication Date: 01-SEP-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions;...