Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


41. 

Simple Steps to Data Encryption

Simple Steps to Data Encryption

By: Peter Loshin

Publisher: Syngress

Publication Date: 30-APR-2013

Insert Date: 17-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who want just enough information about encryption to use it safely and securely and appropriately--WITHOUT having to become experts in cryptography. Data encryption is a powerful tool, if used properly. Encryption turns ordinary, readable data into what...

42. 

The Wireshark Field Guide

The Wireshark Field Guide

By: Robert Shimonski

Publisher: Syngress

Publication Date: 14-MAY-2013

Insert Date: 16-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

The Wireshark Field Guide provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing computer network traffic. Wireshark is the world's foremost network protocol analyzer, with a rich feature set that includes deep inspection of hundreds of protocols, live capture, offline analysis and many other features. The Wireshark Field Guide covers the installation, configuration and use of this powerful multi-platform tool. The book give readers the hands-on skills to be more productive with Wireshark as they drill down into...

43. 

The Basics of Web Hacking

The Basics of Web Hacking

By: Josh Pauli

Publisher: Syngress

Publication Date: 18-JUN-2013

Insert Date: 17-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these...

44. 

Risk Management Framework

Risk Management Framework

By: James Broad

Publisher: Syngress

Publication Date: 03-JUL-2013

Insert Date: 16-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The RMF allows an organization to develop an organization-wide risk framework that reduces the resources required to authorize a systems operation. Use of the RMF will help organizations maintain compliance with not only FISMA and OMB requirements but can also be tailored to meet other compliance requirements such as Payment Card Industry (PCI) or Sarbanes Oxley (SOX). With the publishing of NIST SP 800-37 in 2010 and the move of the Intelligence Community and Department of Defense to modified versions of this process, clear implementation guidance is needed to help individuals correctly...

45. 

The Basics of Hacking and Penetration Testing, 2nd Edition

The Basics of Hacking and Penetration Testing, 2nd Edition

By: Patrick Engebretson

Publisher: Syngress

Publication Date: 24-JUN-2013

Insert Date: 16-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and...

46. 

Windows Server 2012 Security from End to Edge and Beyond

Windows Server 2012 Security from End to Edge and Beyond

By: Thomas W Shinder; Yuri Diogenes; Debra Littlejohn Shinder

Publisher: Syngress

Publication Date: 18-APR-2013

Insert Date: 03-MAY-2013

Slots: 1.0

Table of Contents • Start Reading

Windows Server 2012 Security from End to Edge and Beyond shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft...

47. 

Assessing Vendors

Assessing Vendors

By: Josh More

Publisher: Syngress

Publication Date: 10-APR-2013

Insert Date: 03-MAY-2013

Slots: 1.0

Table of Contents • Start Reading

Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This results in a great deal of busywork being required by both the vendors and the organizations. Smaller organizations don't know what to look for and, as a result, often wind up selecting based on price instead of value. This results in service failures and vendors that just milk their customers for as long as they can. Assessing Vendors shows you how to walk the line between under- and over-assessing, so...

48. 

Windows 2012 Server Network Security

Windows 2012 Server Network Security

By: Derrick Rountree

Publisher: Syngress

Publication Date: 19-MAR-2013

Insert Date: 05-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network...

49. 

Cybercrime and Espionage

Cybercrime and Espionage

By: Will Gragido; John Pirc

Publisher: Syngress

Publication Date: 07-JAN-2011

Insert Date: 29-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats” or ‘SMT’s. Whether the goal is to acquire and subsequently sell intellectual property from...

50. 

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks

By: Brian Anderson; Barbara Anderson

Publisher: Syngress

Publication Date: 03-JUN-2010

Insert Date: 28-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB Hacksaw USB Switchblade USB Based Virus/Malicous Code Launch USB Device...

51. 

Applied Cyber Security and the Smart Grid

Applied Cyber Security and the Smart Grid

By: Eric D. Knapp; Raj Samani

Publisher: Syngress

Publication Date: 26-FEB-2013

Insert Date: 21-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the...

52. 

Placing the Suspect Behind the Keyboard

Placing the Suspect Behind the Keyboard

By: Brett Shavers

Publisher: Syngress

Publication Date: 01-FEB-2013

Insert Date: 06-MAR-2013

Slots: 1.0

Table of Contents • Start Reading

Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining...

53. 

How to Cheat at Securing Your Network

How to Cheat at Securing Your Network

By: Ido Dubrawsky

Publisher: Syngress

Publication Date: 02-OCT-2007

Insert Date: 22-FEB-2013

Slots: 1.0

Table of Contents • Start Reading

Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and distils it into concise recommendations and instructions, using real-world, step-by-step instruction. The latest addition to the bestselling "How to Cheat..." series of IT handbooks, this book clearly identifies the primary vulnerabilities of most computer...

54. 

Keys to the Kingdom

Keys to the Kingdom

By: Deviant Ollam

Publisher: Syngress

Publication Date: 06-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking . This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers...

55. 

Network Intrusion Analysis

Network Intrusion Analysis

By: Joe Fichera; Steven Bolt

Publisher: Syngress

Publication Date: 17-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it’s imperative that a thorough and systematic analysis and investigation of the attack is conducted to determine the nature of the threat and the extent of information lost, stolen, or damaged during the attack. A thorough and timely investigation and response can serve to minimize network downtime and ensure that critical business systems are maintained in full...

56. 

CISSP Study Guide, 2nd Edition

CISSP Study Guide, 2nd Edition

By: Eric Conrad; Seth Misenar; Joshua Feldman

Publisher: Syngress

Publication Date: 01-SEP-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam. Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions;...

57. 

The Hacker's Guide to OS X

The Hacker's Guide to OS X

By: Robert Bathurst; Russ Rogers; Alijohn Ghassemlouei

Publisher: Syngress

Publication Date: 31-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates. ...

58. 

Advanced Persistent Threat

Advanced Persistent Threat

By: Eric Cole

Publisher: Syngress

Publication Date: 31-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric...

59. 

PCI Compliance, 3rd Edition

PCI Compliance, 3rd Edition

By: Branden R. Williams; Anton Chuvakin

Publisher: Syngress

Publication Date: 01-SEP-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting...

60. 

UTM Security with Fortinet

UTM Security with Fortinet

By: Kenneth Tam; Martín H. Hoz Salvador; Ken McAlpine; Rick Basile; Bruce Matsugu; Josh More

Publisher: Syngress

Publication Date: 31-DEC-2012

Insert Date: 22-JAN-2013

Slots: 1.0

Table of Contents • Start Reading

Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's...