We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • by Michael (President Gregg
    £47.49

  • by Frank (Owner Thornton
    £51.99

    Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. This book is suitable for those individuals that use the Linux operating system.

  • by Pawan K ((MCSE Bhardwaj
    £38.99

    Helps system administrators learn more than hundred tips for automating daily system administration tasks using Windows command line scripts.

  • by Stacy (Senior Member of the CERT technical staff and Chief Scientist at STAR* Lab) Prowell
    £24.99

    Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay.

  • by Syngress
    £42.49

    A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.

  • by Brian Wotring
    £43.99

    Talks about the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book cover what you need to know to correctly deploy a centralized host integrity monitoring solution.

  • - Countdown to Darkness
    by Rob Shein
    £47.49

    Contains portrayals of researching, developing, and defending the Internet from a malicious "Zero-Day" attack. This book, about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists, is useful for the security and IT community.

  • by Syngress
    £42.49

    A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.

  • by Syngress
    £38.99

    Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.

  • by Syngress
    £54.49

    Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.

  • by Noam (Co-founder and CTO Rathaus
    £57.49

    Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. This book teaches how fuzzing finds vulnerabilities. It shows how to eliminate buffer overflows and format strings.

  • by Frank (Owner Thornton
    £47.49

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. This title discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.

  • by Tom (senior software developer and cryptographer for the Advanced Micro Devices Corporation.) St Denis
    £57.49

    Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography, this book discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms, the implementation of symmetric ciphers and other codes and finally, portable coding practices.

  • - Auditing the Hacker Mind
    by Marcus Sachs
    £47.49

    The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.

  • by Syngress
    £42.49

    TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. This book teaches how to prevent, detect, troubleshoot and correct TCP/IP network problems. It focuses on identifying problem areas, including correcting protocol errors, DNS route problems, application faults and slow response times.

  • - Building Multi Protocol Label Switching Networks
    by Syngress
    £54.49

    Introduces readers to mpls concepts, installation, migration, operation, inspection, and troubleshooting. This book discusses specific router and switch platforms and includes such topics as frame-mode mpls, cell-mode mpls, label distribution protocol, tag distribution protocol, label distribution protocol migration, mpls configuration, and more.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.