Skip to main content

Syngress

    • Hacking with Kali

      • 1st Edition
      • December 4, 2013
      • James Broad + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 7 4 9 2
      • eBook
        9 7 8 0 1 2 4 0 7 8 8 3 3
      Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing lifecycle; one major tool from each phase is explained. The book culminates with a chapter on reporting that will provide examples of documents used prior to, during and after the pen test. This guide will benefit information security professionals of all levels, hackers, systems administrators, network administrators, and beginning and intermediate professional pen testers, as well as students majoring in information security.
    • Applied Network Security Monitoring

      • 1st Edition
      • November 26, 2013
      • Chris Sanders + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 2 0 8 1
      • eBook
        9 7 8 0 1 2 4 1 7 2 1 6 6
      Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster. The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data. If you've never performed NSM analysis, Applied Network Security Monitoring will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
    • Cloud Storage Forensics

      • 1st Edition
      • November 16, 2013
      • Darren Quick + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 9 9 7 0 5
      • eBook
        9 7 8 0 1 2 4 1 9 9 9 1 0
      To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you how their framework can be used to undertake research into the data remnants on both cloud storage servers and client devices when a user undertakes a variety of methods to store, upload, and access data in the cloud. By determining the data remnants on client devices, you gain a better understanding of the types of terrestrial artifacts that are likely to remain at the Identification stage of an investigation. Once it is determined that a cloud storage service account has potential evidence of relevance to an investigation, you can communicate this to legal liaison points within service providers to enable them to respond and secure evidence in a timely manner.
    • Investigating Internet Crimes

      • 1st Edition
      • November 12, 2013
      • Todd G. Shipley + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 8 1 7 8
      • eBook
        9 7 8 0 1 2 4 0 7 9 2 9 8
      Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse range of criminal activities. Today's online crime includes attacks against computer data and systems, identity theft, distribution of child pornography, penetration of online financial services, using social networks to commit crimes, and the deployment of viruses, botnets, and email scams such as phishing. Symantec's 2012 Norton Cybercrime Report stated that the world spent an estimated $110 billion to combat cybercrime, an average of nearly $200 per victim. Law enforcement agencies and corporate security officers around the world with the responsibility for enforcing, investigating and prosecuting cybercrime are overwhelmed, not only by the sheer number of crimes being committed but by a lack of adequate training material. This book provides that fundamental knowledge, including how to properly collect and document online evidence, trace IP addresses, and work undercover.
    • Introduction to Information Security

      • 1st Edition
      • November 12, 2013
      • Timothy Shimeall + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 6 9 9
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 2 9
      Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical information. This understanding provides a basis for engineering and risk-management decisions in the defense of information.Informat... security is a rapidly growing field, with a projected need for thousands of professionals within the next decade in the government sector alone. It is also a field that has changed in the last decade from a largely theory-based discipline to an experience-based discipline. This shift in the field has left several of the classic texts with a strongly dated feel.
    • Computer Incident Response and Forensics Team Management

      • 1st Edition
      • November 8, 2013
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 6 5
      • eBook
        9 7 8 0 1 2 4 0 4 7 2 5 9
      Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when and where the transition to forensics investigation should occur during an incident response event. The book also provides discussions of key incident response components.
    • Social Media Security

      • 1st Edition
      • November 1, 2013
      • Michael Cross
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 8 6 6
      • eBook
        9 7 8 1 5 9 7 4 9 9 8 7 3
      Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. With value from micro-level personal networking to macro-level outreach, social networking has become pervasive in people’s lives and is now becoming a significant driving force in business. These new platforms have provided new approaches to many critical enterprise functions, including identifying, communicating, and gathering feedback with customers (e.g., Facebook, Ning); locating expertise (e.g., LinkedIn); providing new communication platforms (e.g., Twitter); and collaborating with a community, small or large (e.g., wikis).However, many organizations have stayed away from potential benefits of social networks because of the significant risks associated with them. This book will help an organization understand the risks present in social networks and provide a framework covering policy, training and technology to address those concerns and mitigate the risks presented to leverage social media in their organization. The book also acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.
    • The Basics of IT Audit

      • 1st Edition
      • October 31, 2013
      • Stephen D. Gantz
      • English
      • Paperback
        9 7 8 0 1 2 4 1 7 1 5 9 6
      • eBook
        9 7 8 0 1 2 4 1 7 1 7 6 3
      The Basics of IT Audit: Purposes, Processes, and Practical Information provides you with a thorough, yet concise overview of IT auditing. Packed with specific examples, this book gives insight into the auditing process and explains regulations and standards such as the ISO-27000, series program, CoBIT, ITIL, Sarbanes-Oxley, and HIPPA. IT auditing occurs in some form in virtually every organization, private or public, large or small. The large number and wide variety of laws, regulations, policies, and industry standards that call for IT auditing make it hard for organizations to consistently and effectively prepare for, conduct, and respond to the results of audits, or to comply with audit requirements. This guide provides you with all the necessary information if you're preparing for an IT audit, participating in an IT audit or responding to an IT audit.
    • Eleventh Hour CISSP

      • 2nd Edition
      • October 16, 2013
      • Joshua Feldman + 2 more
      • English
      • eBook
        9 7 8 0 1 2 4 1 7 1 4 5 9
      Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally recognized, vendor neutral exam for information security professionals. Over 67,000 professionals are certified worldwide with many more joining their ranks. This new Second Edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All 10 domains are covered as completely and as concisely as possible, giving you the best possible chance of acing the exam.
    • Unified Communications Forensics

      • 1st Edition
      • October 7, 2013
      • Nicholas Mr. Grant + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 2 7
      • eBook
        9 7 8 0 1 2 4 0 4 6 0 5 4
      Unified Communications Forensics: Anatomy of Common UC Attacks is the first book to explain the issues and vulnerabilities and demonstrate the attacks, forensic artifacts, and countermeasures required to establish a secure (UC) environment. This book is written by leading UC experts Nicholas Grant and Joseph W. Shaw II and provides material never before found on the market, including: • analysis of forensic artifacts in common UC attacks • an in-depth look at established UC technologies and attack exploits • hands-on understanding of UC attack vectors and associated countermeasures • companion website http://secvoip.com giving readers access to the most up-to-date information on UC attacks.