Skip to main content

Syngress

    • Quantum Cryptography and Annealing for Securing Industrial IoT

      • 1st Edition
      • March 1, 2026
      • Seifedine Kadry + 5 more
      • English
      • Paperback
        9 7 8 0 4 4 3 3 8 3 4 9 6
      • eBook
        9 7 8 0 4 4 3 3 8 3 5 0 2
      Quantum Cryptography and Annealing for Securing Industrial IoT explores cutting-edge quantum security strategies designed to protect Industrial Internet of Things (IIoT) platforms. Focusing on the convergence between quantum and post-quantum cryptography, the book delves into practical implementations that safeguard IIoT devices and strengthen infrastructure. With the proliferation of interconnected systems in modern industry, the need for robust security has never been more urgent. The authors emphasize real-world applications, offering readers actionable insights into how quantum cryptosystems are integrated within IIoT environments to counter emerging threats, particularly those posed by quantum computing advancements.Beyond its focus on practical solutions, the book provides a thorough analysis of IIoT hardware resilience, addressing vulnerabilities to physical and side-channel attacks. It evaluates the performance of quantum cryptosystems and discusses how interdisciplinary teams collaborate to engineer secure IIoT systems. Balancing theory with application, the authors highlight challenges faced in implementing quantum cryptographic principles and present innovative approaches to overcome them.
    • Eleventh Hour CISSP®

      • 4th Edition
      • January 1, 2026
      • Eric Conrad + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 3 1 8 6 8 8 2
      • eBook
        9 7 8 0 4 4 3 1 8 6 8 9 9
      Eleventh Hour CISSP®: Study Guide, Fourth Edition provides a study guide keyed directly to the most current version of the CISSP exam. This streamlined book includes only core certification information, making it ideal for last-minute studying. The main objectives of the exam are covered concisely, with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide with many more joining their ranks. All eight domains are covered completely and concisely, giving readers the best possible chance of acing the exam.This new edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge.
    • Edge Intelligence

      • 1st Edition
      • January 1, 2026
      • Jawad Ahmad + 5 more
      • English
      • Paperback
        9 7 8 0 4 4 3 3 8 2 9 7 0
      • eBook
        9 7 8 0 4 4 3 3 8 2 9 8 7
      Edge Intelligence: Advanced Deep Transfer Learning for IoT Security presents a comprehensive exploration into the critical intersection of cybersecurity, edge computing, and deep learning, offering practitioners, researchers, and cybersecurity professionals a definitive guide to protect IoT/IIoT systems. This book delves into the synergistic potential of edge computing and advanced machine/deep learning algorithms, providing insights into lightweight and resource-efficient models with a special focus on resource-constrained edge devices. The rapidly evolving nature of cyberattacks underscores the need for updated and integrated resources that address the intersection of cybersecurity, edge computing, and deep learning. The authors address this issue by offering practical insights, lightweight models, and proactive defense mechanisms tailored to the unique challenges of securing edge devices and networks. This book is not only written to provide its audience effective strategies to detect and mitigate network intrusions by leveraging edge intelligence and advanced deep transfer learning techniques but also to provide practical insights and implementation guidelines tailored to resource-constrained edge devices.
    • Professional Penetration Testing

      • 3rd Edition
      • January 21, 2025
      • Thomas Wilhelm
      • English
      • Paperback
        9 7 8 0 4 4 3 2 6 4 7 8 8
      • eBook
        9 7 8 0 4 4 3 2 6 4 7 9 5
      Professional Penetration Testing: Creating and Learning in a Hacking Lab, Third Edition walks the reader through the entire process of setting up and running a pen test lab. Penetration testing—the act of testing a computer network to find security vulnerabilities before they are maliciously exploited—is a crucial component of information security in any organization. Chapters cover planning, metrics, and methodologies, the details of running a pen test, including identifying and verifying vulnerabilities, and archiving, reporting and management practices. The material presented will be useful to beginners through advanced practitioners.Here, author Thomas Wilhelm has delivered penetration testing training to countless security professionals, and now through the pages of this book, the reader can benefit from his years of experience as a professional penetration tester and educator. After reading this book, the reader will be able to create a personal penetration test lab that can deal with real-world vulnerability scenarios. "...this is a detailed and thorough examination of both the technicalities and the business of pen-testing, and an excellent starting point for anyone getting into the field." –Network Security
    • Antivirus Engines

      • 1st Edition
      • October 21, 2024
      • Paul A. Gagniuc
      • English
      • Paperback
        9 7 8 0 4 4 3 3 2 9 5 2 4
      • eBook
        9 7 8 0 4 4 3 3 2 9 5 3 1
      Antivirus Engines: From Methods to Innovations, Design, and Applications offers an in-depth exploration of the core techniques employed in modern antivirus software. It provides a thorough technical analysis of detection methods, algorithms, and integration strategies essential for the development and enhancement of antivirus solutions. The examples provided are written in Python, showcasing foundational, native implementations of key concepts, allowing readers to gain practical experience with the underlying mechanisms of antivirus technology.The text covers a wide array of scanning techniques, including heuristic and smart scanners, hexadecimal inspection, and cryptographic hash functions such as MD5 and SHA for file integrity verification. These implementations highlight the crucial role of various scanning engines, from signature-based detection to more advanced models like behavioral analysis and heuristic algorithms. Each chapter provides clear technical examples, demonstrating the integration of modules and methods required for a comprehensive antivirus system, addressing both common and evolving threats.Beyond simple virus detection, the content illustrates how polymorphic malware, ransomware, and state-sponsored attacks are tackled using multi-layered approaches. Through these examples, students, researchers, and security professionals gain practical insight into the operation of antivirus engines, enhancing their ability to design or improve security solutions in a rapidly changing threat environment.
    • Industrial Network Security

      • 3rd Edition
      • March 26, 2024
      • Eric D. Knapp
      • English
      • Paperback
        9 7 8 0 4 4 3 1 3 7 3 7 2
      • eBook
        9 7 8 0 4 4 3 1 3 7 3 8 9
      As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems—energy production, water, gas, and other vital systems—becomes more important, and heavily mandated. Industrial Network Security, Third Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems.Author Eric Knapp examines the unique protocols and applications that are the foundation of Industrial Control Systems (ICS) and provides clear guidelines for their protection. This comprehensive reference gives you thorough understanding of the challenges facing critical infrastructures, new guidelines and security measures for infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation.
    • CISSP® Study Guide

      • 4th Edition
      • January 25, 2023
      • Joshua Feldman + 2 more
      • English
      • Paperback
        9 7 8 0 4 4 3 1 8 7 3 4 6
      • eBook
        9 7 8 0 4 4 3 1 8 7 3 5 3
      CISSP® Study Guide, Fourth Edition provides the latest updates on CISSP® certification, the most prestigious, globally-recognized, vendor neutral exam for information security professionals. In this new edition, readers will learn about what's included in the newest version of the exam’s Common Body of Knowledge. The eight domains are covered completely and as concisely as possible. Each domain has its own chapter, including specially designed pedagogy to help readers pass the exam. Clearly stated exam objectives, unique terms/definitions, exam warnings, learning by example, hands-on exercises, and chapter ending questions help readers fully comprehend the material.
    • Research Methods for Cyber Security

      • 1st Edition
      • April 19, 2017
      • Thomas W. Edgar + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 3 4 9 2
      • eBook
        9 7 8 0 1 2 8 1 2 9 3 0 2
      Research Methods for Cyber Security teaches scientific methods for generating impactful knowledge, validating theories, and adding critical rigor to the cyber security field. This book shows how to develop a research plan, beginning by starting research with a question, then offers an introduction to the broad range of useful research methods for cyber security research: observational, mathematical, experimental, and applied. Each research method chapter concludes with recommended outlines and suggested templates for submission to peer reviewed venues. This book concludes with information on cross-cutting issues within cyber security research. Cyber security research contends with numerous unique issues, such as an extremely fast environment evolution, adversarial behavior, and the merging of natural and social science phenomena. Research Methods for Cyber Security addresses these concerns and much more by teaching readers not only the process of science in the context of cyber security research, but providing assistance in execution of research as well.
    • Securing the Internet of Things

      • 1st Edition
      • January 11, 2017
      • Shancang Li + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 8 2
      • eBook
        9 7 8 0 1 2 8 0 4 5 0 5 3
      Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet of Things (IoT). This booming field, moving from strictly research to the marketplace, is advancing rapidly, yet security issues abound. This book explains the fundamental concepts of IoT security, describing practical solutions that account for resource limitations at IoT end-node, hybrid network architecture, communication protocols, and application characteristics. Highlighting the most important potential IoT security risks and threats, the book covers both the general theory and practical implications for people working in security in the Internet of Things.
    • Federal Cloud Computing

      • 2nd Edition
      • January 5, 2017
      • Matthew Metheny
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 7 1 0 6
      • eBook
        9 7 8 0 1 2 8 0 9 6 8 7 1
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers, Second Edition offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis. This updated edition will cover the latest changes to FedRAMP program, including clarifying guidance on the paths for Cloud Service Providers to achieve FedRAMP compliance, an expanded discussion of the new FedRAMP Security Control, which is based on the NIST SP 800-53 Revision 4, and maintaining FedRAMP compliance through Continuous Monitoring. Further, a new chapter has been added on the FedRAMP requirements for Vulnerability Scanning and Penetration Testing.