We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • Save 11%
    - Implementing Security Controls into the Modern Power Infrastructure
    by Eric D. (Director <br>Strategic Alliances for Wurldtech Security Technologies) Knapp
    £38.99

    Many people think of the Smart Grid as a power distribution group built on advanced smart metering-but that's just one aspect of a much larger and more complex system. This title provides a detailed architecture of the entire Smart Grid, with recommended cyber security measures for everything from the supply chain to the consumer.

  • Save 23%
    - Attacking the Core
    by Enrico (Kernel Programmer Perla
    £30.99

    Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.

  • by Sean-Philip (CISSP Oriyano
    £43.99

    Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.

  • Save 11%
    by Harlan (DFIR analyst Carvey
    £41.99

    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.

  • Save 10%
    - Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
    by Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    £35.99

    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.

  • by B. (Senior Technology Consultant with Sierra Systems Consultants Inc. Barber
    £41.49

    Over 95 per cent of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service (WSUS) is designed to provide patches and updates to every one of these computers. This book begins by describing the feature set of WSUS, and the benefits it provides to system administrators.

  • by Marcus Sachs
    £42.49

    Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.

  • by Dan ((CISSP)) York
    £24.99

    Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • by Carl (CCIE Timm
    £24.99

    Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.

  • by Mike (Web Application Security Solutions Shema
    £24.99

    Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • by Brad (Chief researcher of Renderlab.net) Haines
    £25.99

    Pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. This book helps you discover the best ways to defend against these vicious hacks with step-by-step instructions and techniques to make your computer and network impenetrable.

  • - Exam XK0-003 Study Guide
    by Chris (managing consultant for Liberty Trio Happel
    £22.49

    Keyed to the XK0-003 revision of the CompTIA Linux+exam, this book is streamlined to include only core certification information and is presented for ease of last-minute studying. It covers the main objectives of the exam with key concepts highlighted. It also includes 'Top Five toughest questions and answers to help you to prepare.

  • - Exam N10-004 Study Guide
    by Naomi (Consultant Alpern
    £22.49

    Covers the main objectives of CompTIA Network+ exam, highlighting key concepts. This title features Exam Warnings that highlight particularly tough sections of the exam. It includes review of five toughest questions by topic.

  • - Exam SY0-201 Study Guide
    by Ido (Chief Security Advisor Dubrawsky
    £22.49

    Focuses on the essentials needed to pass the Security+ certification exam. The book includes: Exam Objectives - Fast Track Review; Key words/definitions; Five Toughest questions and their answers; and, Exam Warnings - What to pay attention to. It also includes review of five toughest questions by topic.

  • - Identifying Patterns in the Chaos
    by Jacob (Contractor with a government agency filling the role of Intrusion Detection Team Lead) Babbin
    £47.49

    Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing the 'Top 10' security logs that IT professionals should be regularly analyzing.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.