Syngress

Assessing Vendors
A Hands-On Guide to Assessing Infosec and IT Vendors- 1st Edition
- April 10, 2013
- Josh More
- English

Windows 2012 Server Network Security
Securing Your Windows Network Systems and Infrastructure- 1st Edition
- March 19, 2013
- Derrick Rountree
- English

Linux Malware Incident Response: A Practitioner's Guide to Forensic Collection and Examination of Volatile Data
An Excerpt from Malware Forensic Field Guide for Linux Systems- 1st Edition
- March 8, 2013
- Eoghan Casey + 2 more
- English

Applied Cyber Security and the Smart Grid
Implementing Security Controls into the Modern Power Infrastructure- 1st Edition
- February 26, 2013
- Eric D. Knapp + 1 more
- English

The Basics of Digital Privacy
Simple Tools to Protect Your Personal Information and Your Identity Online- 1st Edition
- February 17, 2013
- Denny Cherry
- English

Placing the Suspect Behind the Keyboard
Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects- 1st Edition
- February 1, 2013
- Brett Shavers
- English

Cybercrime Case Presentation
An Excerpt from Placing The Suspect Behind The Keyboard- 1st Edition
- December 17, 2012
- Brett Shavers
- English

Cybercrime Investigative Case Management
An Excerpt from Placing the Suspect Behind the Keyboard- 1st Edition
- December 17, 2012
- Brett Shavers
- English

Cybercrime Investigation Case Studies
An Excerpt from Placing the Suspect Behind the Keyboard- 1st Edition
- December 17, 2012
- Brett Shavers
- English

Logging and Log Management
The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management- 1st Edition
- November 29, 2012
- Kevin Schmidt + 2 more
- English