Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Syngress


81. 

Phishing Exposed

Phishing Exposed

By: Lance James

Publisher: Syngress

Publication Date: 06-JAN-2006

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Phishing Exposed unveils the techniques phishers employ that enable them to successfully commit fraudulent acts against the global financial industry. Also highlights the motivation, psychology and legal aspects encircling this deceptive art of exploitation. The External Threat Assessment Team will outline innovative forensic techniques employed in order to unveil the identities of these organized individuals, and does not hesitate to remain candid about the legal complications that make prevention and apprehension so difficult today. This title provides an in-depth, high-tech view...

82. 

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

InfoSec Career Hacking: Sell Your Skillz, Not Your Soul

By: Chris Hurley; Johnny Long; Aaron W Bayles; Ed Brindley

Publisher: Syngress

Publication Date: 26-JUN-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

“InfoSec Career Hacking? starts out by describing the many, different InfoSec careers available including Security Engineer, Security Analyst, Penetration Tester, Auditor, Security Administrator, Programmer, and Security Program Manager. The particular skills required by each of these jobs will be described in detail, allowing the reader to identify the most appropriate career choice for them. Next, the book describes how the reader can build his own test laboratory to further enhance his existing skills and begin to learn new skills and techniques. The authors also provide keen insight...

83. 

Stealing the Network: How to Own an Identity

Stealing the Network: How to Own an Identity

By: Ryan Russell; Peter A Riley; Jay Beale; Chris Hurley; Tom Parker; Brian Hatch

Publisher: Syngress

Publication Date: 01-JUL-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The first two books in this series “Stealing the Network: How to Own the Box? and “Stealing the Network: How to Own a Continent? have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques. In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the...

84. 

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals

By: James C Foster

Publisher: Syngress

Publication Date: 12-APR-2005

Insert Date: 08-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP,...

85. 

The Real MCTS/MCITP Exam 70-647 Prep Kit

The Real MCTS/MCITP Exam 70-647 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 12-JUN-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate skills as a Windows Server 2008 Enterprise Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-647. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

86. 

The Real MCTS/MCITP Exam 70-646 Prep Kit

The Real MCTS/MCITP Exam 70-646 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 17-JUN-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate skills as a Windows Server 2008 Server Administrator. This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646. The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCITP candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

87. 

The Real MCTS/MCITP Exam 70-643 Prep Kit

The Real MCTS/MCITP Exam 70-643 Prep Kit

By: Brien Posey; Colin Bowern; Jeffery A. Martin; John Karnay; Arno Theron; Mohan Krishnamurthy

Publisher: Syngress

Publication Date: 21-APR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2008 applications platform configuration skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following...

88. 

The Real MCTS/MCITP Exam 70-648 Prep Kit

The Real MCTS/MCITP Exam 70-648 Prep Kit

By: Brien Posey

Publisher: Syngress

Publication Date: 18-APR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2003 Microsoft Certified Systems Administrators (MCSAs) AD and Application Platform Technical Specialists skills. The object of this exam is to validate only the skills that are are different from the existing MCSA skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exams 70-640 and 70-643. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large...

89. 

The Real MCTS/MCITP Exam 70-640 Prep Kit

The Real MCTS/MCITP Exam 70-640 Prep Kit

By: Anthony Piltzecker

Publisher: Syngress

Publication Date: 31-MAR-2008

Insert Date: 07-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. The Microsoft Certified Technology Specialist (MCTS) on Windows Server 2008 credential is intended for information technology (IT) professionals who work in the complex computing environment of medium to large companies. The MCTS candidate should have at least one year of experience implementing and administering a network operating system in an environment that has the following characteristics: 250 to 5,000 or...

90. 

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

By: Eric Cole; Michael Nordfelt; Sandra Ring; Ted Fair

Publisher: Syngress

Publication Date: 12-APR-2005

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

This book shows everyday computer users how to become cyber-sleuths. It takes readers through the many different issues involved in spying on someone online. It begins with an explanation of reasons and ethics, covers the psychology of spying, describes computer and network basics, and takes readers step-by-step through many common online activities, and shows what can be done to compromise them. The book's final section describes personal privacy and counter-spy techniques. By teaching by both theory and example this book empowers readers to take charge of their computers and feel...

91. 

Wireless Hacking: Projects for Wi-Fi Enthusiasts

Wireless Hacking: Projects for Wi-Fi Enthusiasts

By: Lee Barken

Publisher: Syngress

Publication Date: 11-NOV-2004

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (“Wi-Fi?) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and...

92. 

Aggressive Network Self-Defense

Aggressive Network Self-Defense

By: Neil R. Wyler

Publisher: Syngress

Publication Date: 12-FEB-2005

Insert Date: 06-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures. Although such tactics are extremely controversial, many security professionals are reaching into the dark side of their tool box to identify, target, and suppress their adversaries. This book will provide a detailed analysis of the most timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking,...

93. 

How to Cheat at Designing Security for a Windows Server 2003 Network

How to Cheat at Designing Security for a Windows Server 2003 Network

By: Chris Ruston; Chris Peiris

Publisher: Syngress

Publication Date: 08-APR-2006

Insert Date: 05-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority. While considering the security needs of your organiztion, you need to balance the human and the technical in order to create the best security design for your organization. Securing a Windows Server 2003 enterprise network is hardly a small undertaking, but it becomes quite manageable...

94. 

Building Robots With Lego Mindstorms

Building Robots With Lego Mindstorms

By: Mario Ferrari; Guilio Ferrari

Publisher: Syngress

Publication Date: 05-JAN-2002

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Lego robots! Mindstorms are sweeping the world and fans need to learn how to programme them Lego Mindstorms are a new generation of Lego Robots that can be manipulated using microcomputers, light and touch sensors, an infrared transmitter and CD-ROMs. Since Lego launched Lego Mindstorms in late 1998 sales have skyrocketed - with no sign of slowing down. Mindstorms have captured the imagination of adults and children alike, creating a subculture of Mindstorm enthusiasts around the world. The kits are now a staple part of engineering and computer science classes at many high profile...

95. 

SQL Injection Attacks and Defense, 2nd Edition

SQL Injection Attacks and Defense, 2nd Edition

By: Justin Clarke

Publisher: Syngress

Publication Date: 20-JUN-2012

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

SQL Injection Attacks and Defense, First Edition: Winner of the Best Book Bejtlich Read Award " SQL injection is probably the number one problem for any server-side application, and this book unequaled in its coverage." –Richard Bejtlich, Tao Security blog SQL injection represents one of the most dangerous and well-known, yet misunderstood, security vulnerabilities on the Internet, largely because there is no central repository of information available for penetration testers, IT security consultants and practitioners, and web/software developers to turn to for help. SQL...

96. 

Eleventh Hour CISSP

Eleventh Hour CISSP

By: Eric Conrad; Seth Misenar; Joshua Feldman; Larry Greenblatt

Publisher: Syngress

Publication Date: 15-AUG-2010

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The Eleventh Hour CISSP Study Guide is keyed to the latest CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The only guide you need for last-minute studying Answers the toughest questions and highlights core topics Can be paired with any other study guide so you are completely prepared ...

97. 

PCI Compliance, 2nd Edition

PCI Compliance, 2nd Edition

By: Anton Chuvakin; Branden R. Williams

Publisher: Syngress

Publication Date: 15-DEC-2009

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition: Each chapter has how-to guidance to walk you through implementing concepts, and real-world scenarios to help you relate to the information and better grasp how it impacts your data. This book provides the information that you need to understand...

98. 

Eleventh Hour Linux+

Eleventh Hour Linux+

By: Graham Speake; Brian Barber; Chris Happel; Terrence V. Lillard

Publisher: Syngress

Publication Date: 15-NOV-2009

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The 11th Hour Linux+ Study Guide is keyed to the XK0-003 revision of the CompTIA Linux+exam. This book is streamlined to include only core certification information and is presented for ease of last-minute studying. Main objectives of the exam are covered with key concepts highlighted. Fast Facts quickly review fundamentals Exam Warnings highlight particularly tough sections of the exam Crunch Time sidebars point out key concepts to remember Did You Know? sidebars cover sometimes forgotten details Top Five Toughest Questions and answers help you to prepare The 11th...

99. 

SAP Security Configuration and Deployment

SAP Security Configuration and Deployment

By: Joey Hirao

Publisher: Syngress

Publication Date: 31-OCT-2008

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

Throughout the world, high-profile large organizations (aerospace and defense, automotive, banking, chemicals, financial service providers, healthcare, high tech, insurance, oil and gas, pharmaceuticals, retail, telecommunications, and utilities) and governments are using SAP software to process their most mission-critical, highly sensitive data. With more than 100,000 installations, SAP is the world's largest enterprise software company and the world's third largest independent software supplier overall. Despite this widespread use, there have been very few books written on SAP...

100. 

InfoSecurity 2008 Threat Analysis

InfoSecurity 2008 Threat Analysis

By: Craig Schiller; Seth Fogie; Colby DeRodeff; Michael Gregg

Publisher: Syngress

Publication Date: 29-OCT-2007

Insert Date: 04-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security...