Skip to main content

Syngress

    • Eleventh Hour CISSP®

      • 3rd Edition
      • September 3, 2016
      • Joshua Feldman + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 2 4 8 9
      • eBook
        9 7 8 0 1 2 8 1 1 3 7 7 6
      Eleventh Hour CISSP: Study Guide, Third Edition provides readers with a study guide on the most current version of the Certified Information Systems Security Professional exam. This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
    • Coding for Penetration Testers

      • 2nd Edition
      • September 3, 2016
      • Jason Andress + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 4 7 2 7
      • eBook
        9 7 8 0 1 2 8 0 5 4 7 3 4
      Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used. While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.
    • The Basics of Cyber Safety

      • 1st Edition
      • August 20, 2016
      • John Sammons + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 4 1 6 6 5 0 9
      • eBook
        9 7 8 0 1 2 4 1 6 6 3 9 4
      The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online.
    • Audio Content Security

      • 1st Edition
      • July 16, 2016
      • Sogand Ghorbani + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 1 1 3 8 3 7
      • eBook
        9 7 8 0 1 2 8 1 1 3 8 4 4
      Audio Content Security: Attack Analysis on Audio Watermarking describes research using a common audio watermarking method for four different genres of music, also providing the results of many test attacks to determine the robustness of the watermarking in the face of those attacks. The results of this study can be used for further studies and to establish the need to have a particular way of audio watermarking for each particular group of songs, each with different characteristics. An additional aspect of this study tests and analyzes two parameters of audio host file and watermark on a specific evaluation method (PSNR) for audio watermarking.
    • Information Security Science

      • 1st Edition
      • June 21, 2016
      • Carl Young
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 6 4 3 7
      • eBook
        9 7 8 0 1 2 8 0 9 6 4 6 8
      Information Security Science: Measuring the Vulnerability to Data Compromises provides the scientific background and analytic techniques to understand and measure the risk associated with information security threats. This is not a traditional IT security book since it includes methods of information compromise that are not typically addressed in textbooks or journals. In particular, it explores the physical nature of information security risk, and in so doing exposes subtle, yet revealing, connections between information security, physical security, information technology, and information theory. This book is also a practical risk management guide, as it explains the fundamental scientific principles that are directly relevant to information security, specifies a structured methodology to evaluate a host of threats and attack vectors, identifies unique metrics that point to root causes of technology risk, and enables estimates of the effectiveness of risk mitigation. This book is the definitive reference for scientists and engineers with no background in security, and is ideal for security analysts and practitioners who lack scientific training. Importantly, it provides security professionals with the tools to prioritize information security controls and thereby develop cost-effective risk management strategies.
    • Cyber Guerilla

      • 1st Edition
      • June 13, 2016
      • Jelle Van Haaster + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 5 1 9 7 9
      • eBook
        9 7 8 0 1 2 8 0 5 2 8 4 6
      Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.
    • Executing Windows Command Line Investigations

      • 1st Edition
      • June 11, 2016
      • Chet Hosmer + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 9 2 6 8 2
      • eBook
        9 7 8 0 1 2 8 0 9 2 7 1 2
      The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
    • DNS Security

      • 1st Edition
      • June 10, 2016
      • Allan Liska + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 3 0 6 7
      • eBook
        9 7 8 0 1 2 8 0 3 3 3 9 5
      DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
    • Data Breach Preparation and Response

      • 1st Edition
      • June 8, 2016
      • Kevvie Fowler
      • English
      • Paperback
        9 7 8 0 1 2 8 0 3 4 5 1 4
      • eBook
        9 7 8 0 1 2 8 0 3 4 5 0 7
      Data Breach Preparation and Response: Breaches are Certain, Impact is Not is the first book to provide 360 degree visibility and guidance on how to proactively prepare for and manage a data breach and limit impact. Data breaches are inevitable incidents that can disrupt business operations and carry severe reputational and financial impact, making them one of the largest risks facing organizations today. The effects of a breach can be felt across multiple departments within an organization, who will each play a role in effectively managing the breach. Kevvie Fowler has assembled a team of leading forensics, security, privacy, legal, public relations and cyber insurance experts to create the definitive breach management reference for the whole organization.
    • Cybersecurity and Applied Mathematics

      • 1st Edition
      • June 7, 2016
      • Leigh Metcalf + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 4 5 2 0
      • eBook
        9 7 8 0 1 2 8 0 4 4 9 9 5
      Cybersecurity and Applied Mathematics explores the mathematical concepts necessary for effective cybersecurity research and practice, taking an applied approach for practitioners and students entering the field. This book covers methods of statistical exploratory data analysis and visualization as a type of model for driving decisions, also discussing key topics, such as graph theory, topological complexes, and persistent homology. Defending the Internet is a complex effort, but applying the right techniques from mathematics can make this task more manageable. This book is essential reading for creating useful and replicable methods for analyzing data.