Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


81. 

Syngress Force Emerging Threat Analysis

Syngress Force Emerging Threat Analysis

By: Robert Graham

Publisher: Syngress

Publication Date: 30-DEC-2006

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and security solutions for cutting edge technologies and emerging attack methodologies. The book begins with a chapter from ISS Founder Chris Klaus, who is one of the most prominent and well respected security experts in the world. Klaus discusses both...

82. 

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft

By: Eric Cole; Sandra Ring

Publisher: Syngress

Publication Date: 01-MAR-2006

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The Secret Service, FBI, NSA, CERT (Computer Emergency Response Team) and George Washington University have all identified “Insider Threats? as one of the most significant challenges facing IT, security, law enforcement, and intelligence professionals today. This book will teach IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. The book will begin by identifying the types of insiders who are most...

83. 

Perfect Password

Perfect Password

By: Mark Burnett

Publisher: Syngress

Publication Date: 11-DEC-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals. Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate...

84. 

Phishing Exposed

Phishing Exposed

By: Lance James

Publisher: Syngress

Publication Date: 06-JAN-2006

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view...

85. 

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

By: Chris Hurley; Johnny Long; Aaron W Bayles; Ed Brindley

Publisher: Syngress

Publication Date: 26-JUN-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

“InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight...

86. 

Stealing the Network: How to Own an Identity

Stealing the Network: How to Own an Identity

By: Ryan Russell; Peter A Riley; Jay Beale; Chris Hurley; Tom Parker; Brian Hatch

Publisher: Syngress

Publication Date: 01-JUL-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The first two books in this series “Stealing the Network: How to Own the Box? and “Stealing the Network: How to Own a Continent? have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the...

87. 

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

By: James C Foster

Publisher: Syngress

Publication Date: 12-APR-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP,...

88. 

The Real MCTS/MCITP Exam 70-647 Prep Kit

The Real MCTS/MCITP Exam 70-647 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 12-JUN-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

89. 

The Real MCTS/MCITP Exam 70-646 Prep Kit

The Real MCTS/MCITP Exam 70-646 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 17-JUN-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

90. 

The Real MCTS/MCITP Exam 70-643 Prep Kit

The Real MCTS/MCITP Exam 70-643 Prep Kit

By: Brien Posey; Colin Bowern; Jeffery A. Martin; John Karnay; Arno Theron; Mohan Krishnamurthy

Publisher: Syngress

Publication Date: 21-APR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following...

91. 

The Real MCTS/MCITP Exam 70-648 Prep Kit

The Real MCTS/MCITP Exam 70-648 Prep Kit

By: Brien Posey

Publisher: Syngress

Publication Date: 18-APR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large...

92. 

The Real MCTS/MCITP Exam 70-640 Prep Kit

The Real MCTS/MCITP Exam 70-640 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 31-MAR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

93. 

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

By: Eric Cole; Michael Nordfelt; Sandra Ring; Ted Fair

Publisher: Syngress

Publication Date: 12-APR-2005

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel...

94. 

Wireless Hacking: Projects for Wi-Fi Enthusiasts

Wireless Hacking: Projects for Wi-Fi Enthusiasts

By: Lee Barken

Publisher: Syngress

Publication Date: 11-NOV-2004

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (“Wi-Fi?) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and...

95. 

Aggressive Network Self-Defense

Aggressive Network Self-Defense

By: Neil R. Wyler

Publisher: Syngress

Publication Date: 12-FEB-2005

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking,...

96. 

How to Cheat at Designing Security for a Windows Server 2003 Network

How to Cheat at Designing Security for a Windows Server 2003 Network

By: Chris Ruston; Chris Peiris

Publisher: Syngress

Publication Date: 08-APR-2006

Insert Date: 05-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable...

97. 

Building Robots With Lego Mindstorms

Building Robots With Lego Mindstorms

By: Mario Ferrari; Guilio Ferrari

Publisher: Syngress

Publication Date: 05-JAN-2002

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile...

98. 

SQL Injection Attacks and Defense, 2nd Edition

SQL Injection Attacks and Defense, 2nd Edition

By: Justin Clarke

Publisher: Syngress

Publication Date: 20-JUN-2012

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award " SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL...

99. 

Eleventh Hour CISSP

Eleventh Hour CISSP

By: Eric Conrad; Seth Misenar; Joshua Feldman; Larry Greenblatt

Publisher: Syngress

Publication Date: 15-AUG-2010

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The only guide you need for last-minute studying Answers the toughest questions and highlights core topics Can be paired with any other study guide so you are completely prepared ...

100. 

PCI Compliance, 2nd Edition

PCI Compliance, 2nd Edition

By: Anton Chuvakin; Branden R. Williams

Publisher: Syngress

Publication Date: 15-DEC-2009

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand...