Skip to main content

Syngress

    • Windows 2012 Server Network Security

      • 1st Edition
      • March 19, 2013
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 8 3
      • eBook
        9 7 8 1 5 9 7 4 9 9 6 5 1
      Windows 2012 Server Network Security provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: Secure remote access Network vulnerabilities and mitigations DHCP installations configuration MAC filtering DNS server security WINS installation configuration Securing wired and wireless connections Windows personal firewall Remote desktop services Internet connection sharing Network diagnostics and troubleshooting Windows network security is of primary importance due to the sheer volume of data residing on Windows networks. Windows 2012 Server Network Security provides network administrators with the most focused and in-depth coverage of Windows network security threats along with methods and techniques for securing important mission-critical networks and assets. The book also covers Windows 8.
    • Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data

      • 1st Edition
      • March 8, 2013
      • Eoghan Casey + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 5 0 7 6
      • eBook
        9 7 8 0 1 2 4 1 1 4 8 9 0
      Linux Malware Incident Response is a "first look" at the Malware Forensics Field Guide for Linux Systems, exhibiting the first steps in investigating Linux-based incidents. The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.
    • Applied Cyber Security and the Smart Grid

      • 1st Edition
      • February 26, 2013
      • Eric D. Knapp + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 9 8 9
      • eBook
        9 7 8 0 1 2 4 0 4 6 3 8 2
      Many people think of the Smart Grid as a power distribution group built on advanced smart metering—but that’s just one aspect of a much larger and more complex system. The "Smart Grid" requires new technologies throughout energy generation, transmission and distribution, and even the homes and businesses being served by the grid. This also represents new information paths between these new systems and services, all of which represents risk, requiring a more thorough approach to where and how cyber security controls are implemented. This insight provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.
    • The Basics of Digital Privacy

      • 1st Edition
      • February 17, 2013
      • Denny Cherry
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 0 1 1 3
      • eBook
        9 7 8 0 1 2 8 0 0 1 5 2 3
      Who’s watching you online? These days, it’s hard to be sure. But the recent Edward Snowden revelations of NSA data mining and the constant threat of identity theft from criminals mean your privacy is in jeopardy. The Basics of Digital Privacy teaches you how to protect the privacy of your data and your identity while surfing, searching, and interacting with others in a virtual world. Author Denny Cherry teaches professionals how to keep huge databases secure, and he will introduce you to the basic concepts of protecting your identity, your financial data, and your personal information from prying eyes while using your computer and smartphone. You’ll learn how to stay connected and conduct business online, while protecting your privacy with every keystroke and click. The Basics of Digital Privacy gives you clear, non-technical explanations of how to safely store personal information online, create secure usernames and passwords for websites, and participate in social media without compromising your privacy. Learn how to find out who’s watching you online, and what the law has to say about your privacy rights. A great resource for anyone who ventures into the online world on a daily basis!
    • Placing the Suspect Behind the Keyboard

      • 1st Edition
      • February 1, 2013
      • Brett Shavers
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 8 5 9
      • eBook
        9 7 8 1 5 9 7 4 9 9 8 4 2
      Placing the Suspect Behind the Keyboard is the definitive book on conducting a complete investigation of a cybercrime using digital forensics techniques as well as physical investigative procedures. This book merges a digital analysis examiner's work with the work of a case investigator in order to build a solid case to identify and prosecute cybercriminals. Brett Shavers links traditional investigative techniques with high tech crime analysis in a manner that not only determines elements of crimes, but also places the suspect at the keyboard. This book is a first in combining investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigations.
    • Cybercrime Investigative Case Management

      • 1st Edition
      • December 17, 2012
      • Brett Shavers
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 5 0 6 9
      • eBook
        9 7 8 0 1 2 4 0 9 5 4 6 5
      Investigative Case Management is a "first look" excerpted from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Investigative case management is more than just organizing your case files. It includes the analysis of all evidence collected through digital examinations, interviews, surveillance, and other data sources. In order to place a suspect behind any keyboard, supporting evidence needs to be collected and attributed to a person. This first look provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.
    • Cybercrime Investigation Case Studies

      • 1st Edition
      • December 17, 2012
      • Brett Shavers
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 5 0 5 2
      • eBook
        9 7 8 0 1 2 4 0 9 5 3 5 9
      Cybercrime Investigation Case Studies is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case studies are an effective method of learning the methods and processes that were both successful and unsuccessful in real cases. Using a variety of case types, including civil and criminal cases, with different cybercrimes, a broad base of knowledge can be gained by comparing the cases against each other. The primary goal of reviewing successful cases involving suspects using technology to facilitate crimes is to be able to find and use the same methods in future cases. This "first look" teaches you how to place the suspect behind the keyboard using case studies.
    • Cybercrime Case Presentation

      • 1st Edition
      • December 17, 2012
      • Brett Shavers
      • English
      • Paperback
        9 7 8 0 1 2 4 0 9 5 0 4 5
      • eBook
        9 7 8 0 1 2 4 0 9 5 3 3 5
      Cybercrime Case Presentation is a "first look" excerpt from Brett Shavers' new Syngress book, Placing the Suspect Behind the Keyboard. Case presentation requires the skills of a good forensic examiner and great public speaker in order to convey enough information to an audience for the audience to place the suspect behind the keyboard. Using a variety of visual aids, demonstrative methods, and analogies, investigators can effectively create an environment where the audience fully understands complex technical information and activity in a chronological fashion, as if they observed the case as it happened.
    • Federated Identity Primer

      • 1st Edition
      • December 10, 2012
      • Derrick Rountree
      • English
      • Paperback
        9 7 8 0 1 2 4 0 7 1 8 9 6
      • eBook
        9 7 8 0 1 2 4 0 7 2 0 7 7
      Identity authentication and authorization are integral tasks in today's digital world. As businesses become more technologically integrated and consumers use more web services, the questions of identity security and accessibility are becoming more prevalent. Federated identity links user credentials across multiple systems and services, altering both the utility and security landscape of both. In Federated Identity Primer, Derrick Rountree.
    • Blackhatonomics

      • 1st Edition
      • December 5, 2012
      • Will Gragido + 3 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 4 0 4
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 6 7
      Blackhatonomics explains the basic economic truths of the underworld of hacking, and why people around the world devote tremendous resources to developing and implementing malware. The book provides an economic view of the evolving business of cybercrime, showing the methods and motivations behind organized cybercrime attacks, and the changing tendencies towards cyber-warfare. Written by an exceptional author team of Will Gragido, Daniel J Molina, John Pirc and Nick Selby, Blackhatonomics takes practical academic principles and backs them up with use cases and extensive interviews, placing you right into the mindset of the cyber criminal.