We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • Save 23%
    - Attacking the Core
    by Enrico (Kernel Programmer Perla
    £30.99

    Covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). This title discusses the most popular OS families - UNIX derivatives, Mac OS X, and Windows - and how to gain complete control over them.

  • by Sean-Philip (CISSP Oriyano
    £43.99

    Presents a framework for defending your network against attacks in an environment where it might seem impossible. This title discusses along with their delivery methods, such as browser exploitation, use of rich Internet applications, and file format vulnerabilities. It includes antivirus and anti-spyware, intrusion detection systems.

  • Save 11%
    by Harlan (DFIR analyst Carvey
    £41.99

    Focuses on investigating and analyzing computer systems and media using open source tools. This book explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. It details core concepts and techniques of forensic file system analysis.

  • Save 19%
    - Ethical Hacking and Penetration Testing Made Easy
    by Patrick (Assistant Professor of Information Assurance & Senior Penetration Tester for security firm in the Midwest) Engebretson
    £19.49

    Serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. This title helps you learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test.

  • - Practical Penetration Testing Techniques
    by James (President and Owner Broad
    £35.49

    Introduces you the distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, this book walks you through creating a custom version of the Kali live distribution.

  • Save 10%
    - Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
    by Deviant (Member of the Board of Directors of the U.S. division of TOOOL Ollam
    £35.99

    Lockpicking has become a popular topic with many in the security community. This title addresses the topics of impressioning, master key escalation, skeleton keys. It focuses on locks in use as well as ones that have emerged on the market.

  • by T. (CISSP-ISSAP Bradley
    £29.99

    In his role managing the content for a site and a weekly newsletter, the author has learned how to talk to people about computer security. Here, he provides the home user and the small office computer market with information they must know in order to understand the risks of computing on the Internet and what they can do to protect themselves.

  • by Al (Senior Consultant for SBC\Callisma) Muller
    £47.49

    Contains simple and advanced scripting using ESX and Linux commands to provide virtual tools to automate administrative tasks of ESX Server. This book covers the native tools that VMware provides with ESX Server. It discusses the different scripting API's and how they can be leveraged to provide practical tools to manage a virtual infrastructure.

  • by B. (Senior Technology Consultant with Sierra Systems Consultants Inc. Barber
    £38.99

    Over 95 per cent of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service (WSUS) is designed to provide patches and updates to every one of these computers. This book begins by describing the feature set of WSUS, and the benefits it provides to system administrators.

  • by Marcus Sachs
    £42.49

    Many businesses are taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. This book is suitable for system administrators and security professionals who need to bring IM and P2P applications under their control.

  • by Dan ((CISSP)) York
    £24.99

    Lists the most dangerous hacks and exploits specific to Unified Communications, laying out the anatomy of these attacks including how to make your system secure. This title helps you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • by Carl (CCIE Timm
    £24.99

    Lists the most dangerous hacks and exploits specific to social networks like Facebook, Twitter, and MySpace, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks and learn techniques to make your computer and network impenetrable.

  • by Mike (Web Application Security Solutions Shema
    £24.99

    Lists the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system secure. This title lets you discover the ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.

  • by Brad (Chief researcher of Renderlab.net) Haines
    £24.99

    Pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, including how to make your system more secure. This book helps you discover the best ways to defend against these vicious hacks with step-by-step instructions and techniques to make your computer and network impenetrable.

  • by Brian (An avid security researcher with expertise in reverse engineering focusing on vulnerabilities and exploits and advising clients on proper remediation.) Anderson
    £24.99

    Details the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. This title helps you discover the best ways to defend against these vicious hacks with step-by-step instructions.

  • - Exam XK0-003 Study Guide
    by Chris (managing consultant for Liberty Trio Happel
    £22.49

    Keyed to the XK0-003 revision of the CompTIA Linux+exam, this book is streamlined to include only core certification information and is presented for ease of last-minute studying. It covers the main objectives of the exam with key concepts highlighted. It also includes 'Top Five toughest questions and answers to help you to prepare.

  • - Exam N10-004 Study Guide
    by Naomi (Consultant Alpern
    £22.49

    Covers the main objectives of CompTIA Network+ exam, highlighting key concepts. This title features Exam Warnings that highlight particularly tough sections of the exam. It includes review of five toughest questions by topic.

  • - Exam SY0-201 Study Guide
    by Ido (Chief Security Advisor Dubrawsky
    £22.49

    Focuses on the essentials needed to pass the Security+ certification exam. The book includes: Exam Objectives - Fast Track Review; Key words/definitions; Five Toughest questions and their answers; and, Exam Warnings - What to pay attention to. It also includes review of five toughest questions by topic.

  • - Identifying Patterns in the Chaos
    by Jacob (Contractor with a government agency filling the role of Intrusion Detection Team Lead) Babbin
    £47.49

    Teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be used to make their networks efficient and secure using primarily open source tools. This book begins by discussing the 'Top 10' security logs that IT professionals should be regularly analyzing.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.