Skip to main content

Syngress

    • Logging and Log Management

      • 1st Edition
      • November 29, 2012
      • Kevin Schmidt + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 3 5 3
      • eBook
        9 7 8 1 5 9 7 4 9 6 3 6 0
      Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management introduces information technology professionals to the basic concepts of logging and log management. It provides tools and techniques to analyze log data and detect malicious activity. The book consists of 22 chapters that cover the basics of log data; log data sources; log storage technologies; a case study on how syslog-ng is deployed in a real environment for log collection; covert logging; planning and preparing for the analysis log data; simple analysis techniques; and tools and techniques for reviewing logs for potential problems. The book also discusses statistical analysis; log data mining; visualizing log data; logging laws and logging mistakes; open source and commercial toolsets for log data collection and analysis; log management procedures; and attacks against logging systems. In addition, the book addresses logging for programmers; logging and compliance with regulations and policies; planning for log analysis system deployment; cloud logging; and the future of log standards, logging, and log analysis. This book was written for anyone interested in learning more about logging and log management. These include systems administrators, junior security engineers, application developers, and managers.
    • UTM Security with Fortinet

      • 1st Edition
      • November 27, 2012
      • Kenneth Tam + 5 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 4 7 3
      • eBook
        9 7 8 1 5 9 7 4 9 9 7 7 4
      Traditionally, network security (firewalls to block unauthorized users, Intrusion Prevention Systems (IPS) to keep attackers out, Web filters to avoid misuse of Internet browsing, and antivirus software to block malicious programs) required separate boxes with increased cost and complexity. Unified Threat Management (UTM) makes network security less complex, cheaper, and more effective by consolidating all these components. This book explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise.
    • FISMA and the Risk Management Framework

      • 1st Edition
      • November 27, 2012
      • Daniel R. Philpott + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 6 4 1 4
      • eBook
        9 7 8 1 5 9 7 4 9 6 4 2 1
      FISMA and the Risk Management Framework: The New Practice of Federal Cyber Security deals with the Federal Information Security Management Act (FISMA), a law that provides the framework for securing information systems and managing risk associated with information resources in federal government agencies. Comprised of 17 chapters, the book explains the FISMA legislation and its provisions, strengths and limitations, as well as the expectations and obligations of federal agencies subject to FISMA. It also discusses the processes and activities necessary to implement effective information security management following the passage of FISMA, and it describes the National Institute of Standards and Technology's Risk Management Framework. The book looks at how information assurance, risk management, and information systems security is practiced in federal government agencies; the three primary documents that make up the security authorization package: system security plan, security assessment report, and plan of action and milestones; and federal information security-management requirements and initiatives not explicitly covered by FISMA. This book will be helpful to security officers, risk managers, system owners, IT managers, contractors, consultants, service providers, and others involved in securing, managing, or overseeing federal information systems, as well as the mission functions and business processes supported by those systems.
    • Federal Cloud Computing

      • 1st Edition
      • November 27, 2012
      • Matthew Metheny
      • English
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 9 8
      Federal Cloud Computing: The Definitive Guide for Cloud Service Providers offers an in-depth look at topics surrounding federal cloud computing within the federal government, including the Federal Cloud Computing Strategy, Cloud Computing Standards, Security and Privacy, and Security Automation. You will learn the basics of the NIST risk management framework (RMF) with a specific focus on cloud computing environments, all aspects of the Federal Risk and Authorization Management Program (FedRAMP) process, and steps for cost-effectively implementing the Assessment and Authorization (A&A) process, as well as strategies for implementing Continuous Monitoring, enabling the Cloud Service Provider to address the FedRAMP requirement on an ongoing basis.
    • Augmented Reality

      • 1st Edition
      • November 19, 2012
      • Joseph Rampolla + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 3 3 6
      • eBook
        9 7 8 1 5 9 7 4 9 7 3 4 3
      With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-publish... information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers.
    • The Hacker's Guide to OS X

      • 1st Edition
      • November 16, 2012
      • Alijohn Ghassemlouei + 2 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 0 7
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 4 5
      Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide links from the authors, commentary and updates.
    • The Basics of Cyber Warfare

      • 1st Edition
      • November 16, 2012
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 0 4 7 3 7 2
      • eBook
        9 7 8 0 1 2 4 0 5 1 8 1 2
      The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND). Readers learn the basics of how to defend against espionage, hacking, insider threats, state-sponsored attacks, and non-state actors (such as organized criminals and terrorists). Finally, the book looks ahead to emerging aspects of cyber security technology and trends, including cloud computing, mobile devices, biometrics and nanotechnology. The Basics of Cyber Warfare gives readers a concise overview of these threats and outlines the ethics, laws and consequences of cyber warfare. It is a valuable resource for policy makers, CEOs and CIOs, penetration testers, security administrators, and students and instructors in information security.
    • Advanced Persistent Threat

      • 1st Edition
      • November 13, 2012
      • Eric Cole
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 4 9 1
      • eBook
        9 7 8 1 5 9 7 4 9 9 5 5 2
      The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization’s current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. Advanced Persistent Threat is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions.
    • Data Hiding

      • 1st Edition
      • November 9, 2012
      • Michael T. Raggo + 1 more
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 7 4 3 5
      • eBook
        9 7 8 1 5 9 7 4 9 7 4 1 1
      As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.
    • Violent Python

      • 1st Edition
      • November 8, 2012
      • TJ O'Connor
      • English
      • Paperback
        9 7 8 1 5 9 7 4 9 9 5 7 6
      • eBook
        9 7 8 1 5 9 7 4 9 9 6 4 4
      Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.