We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • - A Strategic-Based Approach
    by Timothy (Timothy J. Shimeall Shimeall
    £63.99

    Provides a technology-based survey of methods and techniques that leaves the reader without an understanding of the interrelationships between methods and techniques. This title offers a strategy-based view of these tools and techniques, facilitating selection of overlapping methods for in-depth defense of information.

  • by John R. (Information Technology Consultant and Researcher Vacca
    £43.99

    Serves as a security practitioner's guide to crucial issues in cyber security and IT infrastructure. This book offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as other advancements. It explores practical solutions to a range of cyber-physical and IT infrastructure protection issues.

  • - Techniques, Tactics and Tools for Security Practitioners
    by Jason (CISSP Andress
    £35.49

    Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks.

  • - Tools and Techniques to Attack the Web
    by Josh Pauli
    £26.99

    Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This book introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. It is suitable for beginning hackers.

  • by Brett (Digital Forensics Practitioner Shavers
    £54.49

    A complete reference guide to the use of forensic applications available, software that is used by law enforcement agencies and private forensic examiners. It provides explanations of the complete forensic investigation processes using X-Ways Forensics. It takes you from installation to the advanced features of the software.

  • Save 11%
     
    £38.99

    Provides focused coverage of network and system security technologies. This title explores practical solutions to a range of network and systems security issues. It features comprehensive and updated coverage of the subject area allows the reader to put current technologies to work.

  • by Susan (MCSE Snedaker
    £61.49

    Suitable for anyone in the IT field charged with keeping information secure and systems up and running, this title gives you the planning and risk management techniques for business continuity and disaster recovery (BCDR).

  • - An Excerpt from Placing the Suspect Behind the Keyboard
    by Brett (Digital Forensics Practitioner Shavers
    £17.49

    Investigative case management is more than just organizing your case files. This title provides you with traditional and innovative methods of data analysis to identify and eliminate suspects through a combination of supporting methods of analysis.

  • - Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
    by Brett (Digital Forensics Practitioner Shavers
    £51.49

    Combines physical and digital investigative techniques. This book also combines investigative strategies of digital forensics analysis processes alongside physical investigative techniques in which the reader will gain a holistic approach to their current and future cybercrime investigation.

  • - Understanding the Fundamentals of Cloud Computing in Theory and Practice
    by Derrick ((CISSP Rountree
    £30.99

    Provides readers with an overview of the cloud and how to implement cloud computing in their organizations. This book explains the concepts of cloud computing in practical terms, helping readers understand how to leverage cloud services and provide value to their businesses through moving information to the cloud.

  • - Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
    by David Lilburn (Head Watson
    £67.49

    Includes international procedures, best practices, compliance, and a companion web site with downloadable forms. Written by world-renowned digital forensics experts, this book provides anyone who handles digital evidence with a guide to proper procedure throughout the chain of custody - from incident response through analysis in the lab.

  • Save 19%
    - Understanding the Fundamentals of Cyber Warfare in Theory and Practice
    by Jason (CISSP Andress
    £19.49

    Provides readers with fundamental knowledge of cyber war in both theoretical and practical aspects. This book explores the principles of cyber warfare, including military and cyber doctrine, social engineering, and offensive and defensive tools, tactics and procedures, including computer network exploitation (CNE), attack (CNA) and defense (CND).

  • by Leighton (CTO and Senior Security Engineer for Information Security and Forensics Management Team (ISFMT)) Johnson
    £67.49

  • by Justin Clarke-Salt
    £49.99

    Offers an understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures. This title includes information about these attacks and significant insight from its team of SQL injection experts, who tell you about: understanding SQL Injection, what it is and how it works.

  • - Detecting and Preventing Web Application Security Problems
    by Mike (Web Application Security Solutions Shema
    £43.99

    How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? This book helps you to learn about the common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and more.

  • Save 23%
    - Practical Assessments through Data Collection and Data Analysis
    by Mark (Chief Threat Scientist of Zvelo Inc) Talabis
    £30.99

    Provides a defendable analysis of residual risk associated with your key assets so that risk treatment options can be explored. This title gives you the tools and skills to get a thorough risk assessment for key stakeholders. It focuses on implementing a process, rather than theory, that allows you to derive a quick and valuable assessment.

  • Save 13%
    - Advances, Challenges and Future Research Directions
    by Man Ho (Assistant Professor Au & Raymond (Fulbright Scholar and Senior Lecturer Choo
    £59.99

  • - Exposing Concealed Data in Multimedia, Operating Systems, Mobile Devices and Network Protocols
    by Michael T. (CISSP Raggo
    £43.99

    Provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. This book offers many real-world examples of data concealment on the technologies that including iOS, Android, VMware, MacOS X, Linux and Windows 7.

  • - Investigation, Analysis and Mobile Security for Google Android
    by Andrew (Former adjunct professor (assembly language) and owner of viaForensics) Hoog
    £59.49

    Covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. This book provides a review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, and other low-level functions).

  • - Analyzing and Troubleshooting Network Traffic
    by Robert (Director Shimonski
    £30.99

    Provides hackers, pen testers, and network administrators with practical guidance on capturing and interactively browsing the traffic running on a computer network. This title offers readers with the hands-on skills to be more productive with Wireshark as they drill down into the information contained in real-time network traffic.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.