We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • Save 11%
    - Open Source Intelligence and Web Reconnaissance Concepts and Techniques
    by Sudhanshu (Security Analyst for iViZ Techno Solutions Chauhan
    £38.99

    Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals seeking to find the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment, i.e. Reconnaissance, is not given enough attention by security professionals, hackers and penetration testers. Often, the information present openly is as critical as the confidential data. Hacking Web Intelligence dives deep into the technical aspects of information gathering and assembling it for actionable intelligence. . Hacking Web Intelligence shows you how to dig into the web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods. . Hacking Web Intelligence provides an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization and much more.

  • - From Reactive to Proactive Process
    by Jason (CISSP-ISSAP Sachowski
    £57.99

  • - Testing and Analyzing Using Open Source and Low-Cost Tools
    by Chris (Senior Methodologist for Spirent Communications) Chapman
    £38.99

  • by Jeremy ((Security+ Faircloth
    £57.99

  • Save 10%
    - Defending the Domain Name System
    by Allan (Allan Liska Liska
    £31.49

  • Save 12%
    - Advanced Digital Forensic Analysis of the Windows Registry
    by Harlan (DFIR analyst Carvey
    £48.49

  • Save 11%
    by Bill (Bill Gardner OSCP Gardner
    £41.99

  • - Leveraging Big Data for Predictive Analysis
    by John (Director Pirc
    £35.99

  • - Protecting Your Database from Attackers
    by Denny ((MCSA Cherry
    £45.99

  • - New Tools for Protection and Forensics
    by Henry (Founder Dalziel
    £25.99

    How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware. This book is primarily designed for infosec professionals, consultants, network administrators, CIO's, CTO's, CISO's and senior executives who work within the financial industry and are responsible for their company's endpoint protection. How to Defeat Advanced Malware: New Tools for Protection and Forensicsis the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.

  • - For Mobile and Stationary Devices
    by Iraj Sadegh Amiri
    £59.49

  • by Allan (Allan Liska Liska
    £59.49

  • - Executing Social Engineering Pen Tests, Assessments and Defense
    by Gavin (Professional Services Manager at RandomStorm) Watson
    £33.49

    Social engineering attacks target the weakest link in an organization's security--human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques--including email phishing, telephone pretexting, and physical vectors-- can be used to elicit information or manipulate individuals into performing actions that may aid in an attack. Using the book's easy-to-understand models and examples, you will have a much better understanding of how best to defend against these attacks. The authors of Social Engineering Penetration Testing show you hands-on techniques they have used at RandomStorm to provide clients with valuable results that make a real difference to the security of their businesses. You will learn about the differences between social engineering pen tests lasting anywhere from a few days to several months. The book shows you how to use widely available open-source tools to conduct your pen tests, then walks you through the practical steps to improve defense measures in response to test results.

  • - A Workbench for Inventing and Sharing Digital Forensic Technology
    by Chet (President Hosmer
    £62.99

  • - Understanding the Fundamentals of InfoSec in Theory and Practice
    by Jason (CISSP Andress
    £23.99

  • - Advanced Analysis Techniques for Windows 8
    by Harlan (DFIR analyst Carvey
    £67.49

  • by Darren (Darren Quick is an Electronic Evidence Specialist in the Electronic Crime Section of the South Australia Police Quick
    £62.99

    To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. This title presents the evidence-based cloud forensic framework.

  • Save 11%
    - While Ensuring Evidentiary Integrity
    by Chet (President Hosmer
    £42.49

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.