We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • Save 23%
    - Building an Information Security Risk Management Program from the Ground Up
    by Evan (Omgeo Wheeler
    £30.99

    Teaches you practical techniques that can be used on a daily basis, while also explaining the fundamentals so you understand the rationale behind these practices. This book helps you break free from the so-called "best practices" argument by articulating risk exposures in business terms.

  • - How to Own a Continent
    by Ryan (Ryan Russell (aka Blue Boar) has worked in the IT field for over 16 years.) Russell
    £47.49

    A work of fiction which provides an insight into the boundaries of hacking and cyber-terrorism. It is written by a team of the cyber-security specialists in the world.

  • - Study Guide
    by Joshua (Senior Vice President for Security Technology Feldman
    £22.49

  • - Mastering FortiOS
    by Kenneth (Senior Security Engineer at Fortinet Tam
    £47.49

    Explains the advantages of using UTM and how it works, presents best practices on deployment, and is a hands-on, step-by-step guide to deploying Fortinet's FortiGate in the enterprise. This book provides tips, tricks, and proven suggestions and guidelines to set up FortiGate implementations.

  • by Derrick ((CISSP Rountree
    £43.99

  • by Stephen D. (CISSP-ISSAP Gantz & Daniel R. (Daniel Philpott Philpott
    £59.49

  • by Josh (Senior Security Consultant More
    £26.99

    Assessing vendors is a tricky process. Large and regulated organizations are forced to demonstrate due diligence in vendor assessment, but often do not know how to do this. This title shows you how to walk the line between under- and over-assessing, so decisions can be made on sufficient data without wasting time, or making decisions too quickly.

  • by Stephen Pearson
    £54.49

    Digital Triage Forensics (DTF) is a procedural model for the investigation of digital crime scenes including both traditional crime scenes and the more complex battlefield crime scenes. This book presents the tools, training, and techniques from this practice. It outlines pre- and post-blast investigations.

  • by James C (Deputy Director of Global Security Development for Computer Sciences Foster
    £47.49

    Contains sections that include Coding, which covers the basics in coding complemented with programming tips and tricks in C/C++, Java, Perl and NASL; Sockets - the technology that allows programs and scripts to communicate over a network is sockets; and, Shellcode which is commonly defined as bytecode converted from Assembly.

  • - Leveraging Social Networking While Mitigating Risk
    by Michael (Hospital for Special Surgery) Cross
    £43.99

    Social networks, particularly public ones, have become part of the fabric of how we communicate and collaborate as a society. This book acknowledges that many organizations have already exposed themselves to more risk than they think from social networking and offers strategies for "dialing it back" to retake control.

  •  
    £43.99

    Offers focused coverage of how to protect mission critical systems, and how to deploy security management systems, IT security, ID management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more.

  • - A Practical Guide to Secure Computing
    by Peter (Internet-Standard.com Loshin
    £26.99

    Data encryption is a powerful tool, if used properly. This title provides with a step by step hands-on guide that includes: simple descriptions of actual threat scenarios; simple, step-by-step instructions for securing data; how to use open source, time-proven and peer-reviewed cryptographic software; and easy to follow tips for safer computing.

  • - Keeping Your VoIP Network Safe
    by Regis J. Jr (TC International Consulting (Bud) Bates
    £43.99

    Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company's secrets. Drawing upon years of practical experience and using numerous examples and case studies, technology guru Bud Bates discusses the business realities that necessitate VoIP system security and the threats to VoIP over both wire and wireless networks. He also provides essential guidance on how to conduct system security audits and how to integrate your existing IT security plan with your VoIP system and security plans, helping you prevent security breaches and eavesdropping.

  • - A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
    by Johnny (Security Researcher Long
    £43.99

    In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, the authors get paid to uncover weaknesses in those systems and exploit them. This book reveals those secrets.

  • - A Digital Forensic Investigator's Guide to Virtual Environments
    by Greg (Futurist and Strategic Forecaster in Emerging Technologies) Kipper
    £54.49

    Virtualization creates new and difficult challenges for forensic investigations. This book offers an in-depth view into the world of virtualized environments and the implications they have on forensic investigations. It also explains the process of virtualization and the different types of virtualized environments.

  • - Cross Site Scripting Exploits and Defense
    by Seth (Vice President Fogie
    £57.49

    Discusses the concepts, methodology, and technology that makes XSS a valid concern. This book explains various types of XSS attacks, how they are implemented, used, and abused. It provides examples of XSS malware and demonstrates real cases where XSS is a dangerous risk that exposes internet users to sensitive data theft and monetary losses.

  • by Eric (Eric Seagren Seagren
    £38.99

    Demonstrates how to get big dollar security for your network using freely available tools. This book explains security principles and then demonstrates how to achieve them using only freely available software.

  • Save 11%
    by Shancang (Senior Lecturer in the cyber security research Unit Li
    £36.99

  • Save 11%
  • Save 11%
    - Measuring the Vulnerability to Data Compromises
    by Carl (Managing Director and Chief Security Officer Young
    £42.49

  • Save 11%
    by Iraj Sadegh Amiri & Mohammad Reza Khalifeh (B.Eng (Electronics) Soltanian
    £42.49

  • Save 11%
    - Uncovering Covert Communication Methods with Forensic Analysis
    by Brett (Digital Forensics Practitioner Shavers & John (MFCE Bair
    £36.99

  • by Derrick ((CISSP Rountree
    £22.49

    Identity authentication and authorization are integral tasks in the digital world. This book describes technology behind and implementation of federated identity systems. It helps you decide if federated identity is good for your system or web service. It also helps you learn about internet authentication and federated authentication.

  • by Rob (CISSP Kraus
    £24.99

    Pinpoints the dangerous hacks and exploits specific to Microsoft applications, laying out the anatomy of these attacks including how to make your system more secure.

  • - Architecting, Designing, Planning, and Deploying Windows Server 2012 Security Solutions
    by Yuri Diogenes
    £63.99

    Shows you how to architect, design, plan and deploy Windows 8 and related Microsoft security technologies in the enterprise. This book provides a single source where you can learn how to secure Windows 8 in many systems, including core, endpoint and anywhere access.

  • - Hiding in Plain Sight Online
    by Peter (Internet-Standard.com Loshin
    £26.99

    A guide that skips the theoretical and technical details and focuses on getting from zero to anonymous as fast as possible. It features step-by-step instructions for configuring and using anonymous networking software.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.