We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • by Anthony Piltzecker
    £54.49

    Shows you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have control over your servers and web sites using tools like IIS7, Windows Server Manager, and Windows PowerShell; and, secure your network with Network Access Protection and the Read-Only Domain Controller.

  • by Ira ((CISSP) Winkler
    £29.99

    Describes the real security threats that you have to worry about, and more importantly, what to do about them. This book is suitable for the business, consumer, and technical users short on time but looking for information along with reader friendly analogies.

  • by Amber (CEO Schroader
    £57.49

    Describes how alternate data storage devices (ADS) are used to both move and hide data. This book features case studies that demonstrate how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more.

  • by James Foster
    £47.49

    Contains 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. This book will presents deep code analysis. It provides working code to develop and modify the most common security tools including Nmap and Nessus. A companion web site contains both commented and uncommented versions of the source code examples.

  • by Rob (Security Solutions Engineer for Juniper Networks Cameron
    £44.99

    NetScreen is a firewall appliance. This book offers a look at the NetScreen firewall product line. It features various aspects of the NetScreen product line from the SOHO devices to the Enterprise NetScreen firewalls. It also covers advanced troubleshooting techniques and the NetScreen Security Manager.

  • by Eric Cole
    £36.49

    Teaches IT professional and law enforcement officials about the dangers posed by insiders to their IT infrastructure and how to mitigate these risks by designing and implementing secure IT systems as well as security and human resource policies. This book begins by identifying the types of insiders who are most likely to pose a threat.

  • by Markus Daehne
    £34.49

    Skype has over 70,000,0000 users worldwide, and 13 forums with over 25,000 members. Skype's Application Programming Interface (API) allows users to develop their own applications. This book helps the reader learns how to install and configure Skype on several platforms including Windows, Max OSX, Linux, and PocketPC.

  • by Steven Andres
    £57.49

    Focusing completely on infrastucture security: network devices, protocols and architectures, this book offers coverage of network design so administrators understand how they should design and protect their enterprises.

  • - Deploying Network and Host IPS
    by Michael Rash
    £47.49

    Provides an introduction to the field of Intrusion Prevention and offers detailed information on various IPS methods and technologies. This book covers specific methods, including both network and host IPS and response technologies such as port deactivation, firewall/router network layer ACL modification, and session sniping.

  • by Syngress
    £47.49

    Covers the following firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper's NetScreen Firewall and SonicWall. This work describes what features can be controlled by a policy, and presents the reader the steps for writing the policy to fit the objective.

  • - Discover, Detect, and Eradicate the Internet's Greatest Threat
    by Paul (Director of Threat Research for Webroot Piccard
    £47.49

    Focuses on defending enterprise networks from sophisticated and malicious spyware. This book examines the various types of insidious spyware and adware propagating across the internet and infiltrating enterprise networks. It reveals spyware's intricate economy and network of malicious hackers and criminals.

  • by Michael (Computer security consultant Gough
    £47.49

    De-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to deploy video conferencing efficiently and cost effectively.

  • Save 34%
    by Michael Cross
    £24.99

    Provides explicit hacks, tutorials, penetration tests, and demonstrations for security professionals and Web application developers to defend their applications. This book defines Web application security, why it should be addressed in the lifecycle in development and quality assurance, and how it differs from other types of Internet security.

  • by Debra (MCSE Littlejohn Shinder
    £30.99

    Written by an expert on Installing, Configuring, Managing and Troubleshooting ISA Server, this book can be used as a quick reference to ISA Server. It includes independent advice on when the "Microsoft Way" works, and when another approach might be more appropriate to your situation.

  • - From Mischief to Malicious
    by Robert (Chief Scientist of Internet Security Systems Graham
    £47.49

    An anthology that helps you protect your enterprise from IT security threats. It provides coverage of forensic detection and removal of spyware, the transformation of spyware, global IRC security, and more. It covers secure enterprise-wide deployment of technologies including Voice Over IP, Pocket PCs, smart phones, and more.

  • by Brien (Freelance technical writer Posey
    £57.49

    Reports vulnerabilities so that they can be mitigated before unauthorized intruders can wreck havoc on your network. This book pinpoints the important concepts with examples and screenshots so that systems administrators and security engineers can understand how to get the GFI security tools working quickly and effectively.

  • by Syngress
    £57.49

    Teaches system administrators how to configure, deploy, and troubleshoot "Symantec Enterprise Edition" in an enterprise network. This book reflects Symantec's philosophy of 'Centralized Antivirus Management'. It provides system administrators with a holistic approach to defending their networks from malicious viruses.

  • by Vice President of Advanced Network Technologies Chaffin & Larry (CEO/Chairman of Pluto Networks
    £57.49

    A guide to deploying Voice Over IP (VoIP) products. It begins with a discussion of the protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks.

  • by Dave (International Association of Counter Terrorism and Security Professionals Kleiman
    £47.49

    Describes the common challenges faced by system administrators related to system recovery, data backup and system performance enhancements. This book introduces the readers to the complete suite of Winternals solutions including Recovery Manager, Defrag Manager, and the Administrator's Pak. The companion web site includes many working scripts.

  • - Configure / Manage / Troubleshoot
    by Umer Khan
    £47.49

    The Cisco Pix firewall is a market leading firewall. This title covers the objectives on the Cisco Pix certification exam. It is useful as a study guide, as well as a professional reference.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.