Skip to main content

Syngress

  • The Basics of Digital Forensics

    • 3rd Edition
    • John Sammons
    • English
    The Basics of Digital Forensics, Third Edition provides a foundation for people new to the digital forensics field. This book offers guidance on how to conduct examinations by discussing what digital forensics is, the methodologies used, key tactical concepts, and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud and the Internet are discussed. Also, learn how to collect evidence, document the scene, and how deleted data can be recovered. The new Third Edition of this book includes four all-new chapters, additional pedagogical features within each chapter, and an expansive appendix with useful information in an easy-to-use format. The book provides readers with real-world examples and all the key technologies used in digital forensics, as well as coverage of network intrusion response, how hard drives are organized, and electronic discovery. This valuable resource also covers how to incorporate quality assurance into an investigation, how to prioritize evidence items to examine (triage), case processing, and what goes into making an expert witness. New chapters in the Third Edition cover imaging and processing, digital forensic analysis, IoT forensics, as well as documentation and reporting.
  • Quantum Cryptography and Annealing for Securing Industrial IoT

    • 1st Edition
    • Seifedine Kadry + 5 more
    • English
    Quantum Cryptography and Annealing for Securing Industrial IoT focuses on the rapidly evolving field of quantum security solutions for Industrial Internet of Things (IIoT) platforms, emphasizing the critical intersection of quantum cryptography, post-quantum cryptography, and their practical applications in IIoT. The book’s primary objective is to drive advancements that significantly intersect quantum cryptography in securing IIoT devices, elevate secure IIoT infrastructures, and optimize the overall delivery. Distinguishing itself by prioritizing practical applications, it offers a nuanced perspective on how technological integrations in quantum cryptosystems are actively employed in real-world scenarios. The authors meticulously examine the role of quantum cryptosystems in the design, analysis, and optimization of IIoT-specific hardware, covering their resilience to physical and side-channel attacks and evaluating performance. This book strikes a balance between theoretical concepts and practical applications, providing insights into the challenges and solutions encountered in applying quantum cryptographical principles to IIoT engineering problems.
  • Edge Intelligence

    Advanced Deep Transfer Learning for IoT Security
    • 1st Edition
    • Jawad Ahmad + 5 more
    • English
    Edge Intelligence: Advanced Deep Transfer Learning for IoT Security presents a comprehensive exploration into the critical intersection of cybersecurity, edge computing, and deep learning, offering practitioners, researchers, and cybersecurity professionals a definitive guide to protect IoT/IIoT systems. This book delves into the synergistic potential of edge computing and advanced machine/deep learning algorithms, providing insights into lightweight and resource-efficient models with a special focus on resource-constrained edge devices. The rapidly evolving nature of cyberattacks underscores the need for updated and integrated resources that address the intersection of cybersecurity, edge computing, and deep learning. The authors address this issue by offering practical insights, lightweight models, and proactive defense mechanisms tailored to the unique challenges of securing edge devices and networks. This book is not only written to provide its audience effective strategies to detect and mitigate network intrusions by leveraging edge intelligence and advanced deep transfer learning techniques but also to provide practical insights and implementation guidelines tailored to resource-constrained edge devices.
  • Professional Penetration Testing

    Creating and Learning in a Hacking Lab
    • 3rd Edition
    • Thomas Wilhelm
    • English
    Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
  • Antivirus Engines

    From Methods to Innovations, Design, and Applications
    • 1st Edition
    • Paul A. Gagniuc
    • English
    Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.
  • Industrial Network Security

    Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
    • 3rd Edition
    • Eric D. Knapp
    • English
    As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.Author Eric Knapp examines the unique protocols and applications that are the foundation of Industrial Control Systems (ICS) and provides clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
  • CISSP® Study Guide

    • 4th Edition
    • Joshua Feldman + 2 more
    • English
    CISSP® Study Guide, Fourth Edition provides the latest updates on CISSP® certification, the most prestigious, globally-recognized, vendor neutral exam for information security professionals. In this new edition, readers will learn about what's included in the newest version of the exam’s Common Body of Knowledge. The eight domains are covered completely and as concisely as possible. Each domain has its own chapter, including specially designed pedagogy to help readers pass the exam. Clearly stated exam objectives, unique terms/definitions, exam warnings, learning by example, hands-on exercises, and chapter ending questions help readers fully comprehend the material.
  • Research Methods for Cyber Security

    • 1st Edition
    • Thomas W. Edgar + 1 more
    • English
    Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.
  • Securing the Internet of Things

    • 1st Edition
    • Shancang Li + 1 more
    • English
    Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
  • Federal Cloud Computing

    The Definitive Guide for Cloud Service Providers
    • 2nd Edition
    • Matthew Metheny
    • English
    Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.