Product Type
Condition
Binding
Collectible Attributes
Seller Location
Seller Rating
Published by Syngress Media,U.S., United States, Rockland, MA, 2007
ISBN 10: 159749156XISBN 13: 9781597491563
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Book
Paperback. Condition: Good. This is the only book available on the market that addresses and discusses in-depth forensic analysis of Windows systems. "Windows Forensic Analysis DVD Toolkit" takes the reader to a whole new, undiscovered level of forensic analysis for Windows systems, providing unique information and resources not available anywhere else. This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the federal government, students, and consultants. This book also brings this material to the doorstep of system administrators, who are often the front line troops when an incident occurs, but due to staffing and budgets do not have the necessary knowledge to effectively respond. The companion DVD for the book contains significant, unique materials (movies, spreadsheet, code, etc.) not available any place else, as they were created by the author. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine.
Published by Syngress Media,U.S., United States, Rockland, MA, 2003
ISBN 10: 1931836876ISBN 13: 9781931836876
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Book
Paperback. Condition: Very Good. Stealing the Network: How to Own the Box is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. The book has been read, but is in excellent condition. Pages are intact and not marred by notes or highlighting. The spine remains undamaged.
Published by Syngress Media,U.S., United States, Rockland, MA, 2004
ISBN 10: 1931836124ISBN 13: 9781931836128
Seller: WorldofBooks, Goring-By-Sea, WS, United Kingdom
Book
Paperback. Condition: Good. In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003. The book has been read but remains in clean condition. All pages are intact and the cover is intact. Some minor wear to the spine.
Published by Syngress Media,U.S., Rockland, MA, 2016
ISBN 10: 0128112484ISBN 13: 9780128112489
Seller: CitiRetail, Stevenage, United Kingdom
Book
Paperback. Condition: new. Paperback. Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted.The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exams Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Published by Syngress Media,U.S., Rockland, MA, 2012
ISBN 10: 1597499579ISBN 13: 9781597499576
Seller: CitiRetail, Stevenage, United Kingdom
Book
Paperback. Condition: new. Paperback. Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attackers tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. This book shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Published by Syngress Media,U.S., Rockland, MA, 2012
ISBN 10: 1597499838ISBN 13: 9781597499835
Seller: AussieBookSeller, Truganina, VIC, Australia
Book
Paperback. Condition: new. Paperback. Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the authors previous book, Practical Lock Picking.This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. As with Deviant Ollams previous book, Practical Lock Picking, Keys to the Kingdom includes full-color versions of all diagrams and photographs. Check out the companion website which includes instructional videos that provide readers with a full-on training seminar from the author. Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Published by Syngress Media,U.S., Rockland, MA, 2014
ISBN 10: 0124201148ISBN 13: 9780124201149
Seller: CitiRetail, Stevenage, United Kingdom
Book
Paperback. Condition: new. Paperback. As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systemsenergy production, water, gas, and other vital systemsbecomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Shipping may be from our UK warehouse or from our Australian or US warehouses, depending on stock availability.
Published by Syngress Media,U.S., Rockland, MA, 2014
ISBN 10: 0124201148ISBN 13: 9780124201149
Seller: AussieBookSeller, Truganina, VIC, Australia
Book
Paperback. Condition: new. Paperback. As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systemsenergy production, water, gas, and other vital systemsbecomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.