Skip to main content

Syngress

    • Cyber Security Awareness for Lawyers

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 0 0
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 7 8
      Cyber Security Awareness for Lawyers is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do--especially as Lawyers--to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Cyber Security Awareness for Accountants and CPAs

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 2 4
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 9 2
      Cyber Security Awareness for Accountants and CPAs is a concise overview of the cyber security threats posed to companies and organizations. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as accountants and CPAs, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Mobile Data Loss

      • 1st Edition
      • December 9, 2015
      • Michael T. Raggo
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 8 6 4 3
      • eBook
        9 7 8 0 1 2 8 0 2 9 0 1 5
      The mobile threat landscape is evolving bringing about new forms of data loss. No longer can organizations rely on security policies designed during the PC era. Mobile is different and therefore requires a revised approach to countermeasures to mitigate data loss. Understanding these differences is fundamental to creating a new defense-in-depth strategy designed for mobile. Mobile Data Loss: Threats & Countermeasures reviews the mobile threat landscape using a hacker mind-set to outline risks and attack vectors that include malware, risky apps, operating system compromises, network attacks, and user behaviours. This provides the basis for then outlining countermeasures for defining a holistic mobile security methodology that encompasses proactive protections, response mechanisms, live monitoring, and incident response. Designing a comprehensive mobile security strategy is key. Mobile Data Loss: Threats & Countermeasures outlines the threats and strategies for protecting devices from a plethora of data loss vectors.
    • Meeting People via WiFi and Bluetooth

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 2 1 7
      • eBook
        9 7 8 0 1 2 8 0 5 1 0 8 5
      Meeting People via WiFi and Bluetooth will contain an overview of how to track people using Wireless 802.11 Radio Frequencies (Wi-Fi) and Bluetooth 802.15 Radio Frequencies. The content contained here came from research and materials originally presented at Defcon Wireless CTF Village in August 2015 entitled "Meeting People Via Wi-Fi". The book will go over the hardware and software needed in order to do this tracking, how to use these particular tools in order to do attribution, and tips for protecting yourself from being attributed via those signals.
    • Cyber Security Awareness for CEOs and Management

      • 1st Edition
      • December 9, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 4 5
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 0 8
      Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches. The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
    • Essential Skills for Hackers

      • 1st Edition
      • December 9, 2015
      • Kevin Cardwell + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 5 2
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 1 5
      Essential Skills for Hackers is about the skills you need to be in the elite hacker family. The book will mainly about two things: TCP/IP 101, and Protocol Analysis. The better the hacker, the more we will be able to master TCP/IP. Once the reader understands what TCP/IP is, what it looks like, the book will go into Protocol Analysis and how analyzing the protocol or, in a more general sense, looking at packets on the wire, we will be able to determine what exactly is taking place on a network. By doing this, readers can identify when something on the network doesn’t match what it should and, more importantly, can create any type of sequence of events or packets that they want on the network and see how the defenses or the machines that we send them to react.
    • Cyber Security Awareness for Corporate Directors and Board Members

      • 1st Edition
      • December 8, 2015
      • Henry Dalziel + 1 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 7 5 6 9
      • eBook
        9 7 8 0 1 2 8 0 5 1 1 2 2
      Cyber Security Awareness for Corporate Directors and Board Members is a concise overview of the cyber threat to you, your business, your livelihood, and what you need to do--especially as board members and directors of boards-- to lower the risk, reduce or eliminate liability, and protect reputation. The book details the severity of the treat to companies, and what to do as corporate directors and board members to build a defense against potential breaches.
    • Security Controls Evaluation, Testing, and Assessment Handbook

      • 1st Edition
      • December 7, 2015
      • Leighton Johnson
      • English
      • Paperback
        9 7 8 0 1 2 8 0 2 3 2 4 2
      • eBook
        9 7 8 0 1 2 8 0 2 5 6 4 2
      Security Controls Evaluation, Testing, and Assessment Handbook provides a current and well-developed approach to evaluation and testing of security controls to prove they are functioning correctly in today's IT systems. This handbook shows you how to evaluate, examine, and test installed security controls in the world of threats and potential breach actions surrounding all industries and systems. If a system is subject to external or internal threats and vulnerabilities - which most are - then this book will provide a useful handbook for how to evaluate the effectiveness of the security controls that are in place. Security Controls Evaluation, Testing, and Assessment Handbook shows you what your security controls are doing and how they are standing up to various inside and outside threats. This handbook provides guidance and techniques for evaluating and testing various computer security controls in IT systems. Author Leighton Johnson shows you how to take FISMA, NIST Guidance, and DOD actions and provide a detailed, hands-on guide to performing assessment events for information security professionals who work with US federal agencies. As of March 2014, all agencies are following the same guidelines under the NIST-based Risk Management Framework. This handbook uses the DOD Knowledge Service and the NIST Families assessment guides as the basis for needs assessment, requirements, and evaluation efforts for all of the security controls. Each of the controls can and should be evaluated in its own unique way, through testing, examination, and key personnel interviews. Each of these methods is discussed.
    • Digital Forensics

      • 1st Edition
      • December 7, 2015
      • John Sammons
      • English
      • Paperback
        9 7 8 0 1 2 8 0 4 5 2 6 8
      • eBook
        9 7 8 0 1 2 8 0 4 5 4 2 8
      Digital Forensics: Threatscape and Best Practices surveys the problems and challenges confronting digital forensic professionals today, including massive data sets and everchanging technology. This book provides a coherent overview of the threatscape in a broad range of topics, providing practitioners and students alike with a comprehensive, coherent overview of the threat landscape and what can be done to manage and prepare for it. Digital Forensics: Threatscape and Best Practices delivers you with incisive analysis and best practices from a panel of expert authors, led by John Sammons, bestselling author of The Basics of Digital Forensics.
    • Breaking into Information Security

      • 1st Edition
      • December 5, 2015
      • Josh More + 2 more
      • English
      • Paperback
        9 7 8 0 1 2 8 0 0 7 8 3 9
      • eBook
        9 7 8 0 1 2 8 0 0 9 8 9 5
      Whether you want to break into information security, move from one job to another, or transition into management, Breaking into Information Security will help. No other book surveys all the different jobs available in the industry, frankly discusses the positives and negatives of each, and what you need to learn to get into and out of each role. Unlike books that focus on a specific skill set or on how to gain a certification or get a job, this book encompasses the "big picture," including why certifications, if any, are worthwhile for you. In a profession where new career paths aren’t always clear, Breaking into Information Security will teach you how to identify where you are in your career today, understand where you wish to go, and provide proven methods to get there. From entry-level jobs to the extremely specific skills needed to be an InfoSec consultant, this book covers it all, including in-job skill building, working within the community, and building your skills after hours. If you are seeking to advance in the highly competitive field of information security, this book will give you the edge you need to break in.