We a good story
Quick delivery in the UK

Books published by Syngress Media,U.S.

Filter
Filter
Sort bySort Popular
  • by Syngress
    £51.99

    Covers major Cisco Internetworking concepts and configurations. This book offers cross reference to Cisco internetworking topics that include: Voice Over IP, Remote Access, Wireless, AVVID, and QoS. It also covers technologies that include: AVVID, SIP, MGCP, and more.

  • by Syngress
    £61.49

    Offers coverage of IPv6 strategies, configuration scenarios, and techniques to successfully deploy an IPv6 addressing and subnetting scheme on your network. This book covers: increasing the IP address size from 32 bits to 128 bits; supporting more levels of addressing hierarchy; and, supporting an increased number of addressable nodes.

  • by Neil R. Wyler
    £47.49

    Provide a detailed analysis of the timely and dangerous attack vectors targeted at operating systems, applications, and critical infrastructure and the cutting-edge counter-measures used to nullify the actions of an attacking, criminal hacker. This book demonstrates and explores controversial network strike back and countermeasure techniques.

  • - Exam N10-004 2E
    by Robert (Director Shimonski
    £54.49

    CompTIA's Network+ certification is a globally-recognized, vendor neutral exam that has helped over 235,000 IT professionals reach further and higher in their careers. This title covers the core Network+ material including basic design principles, management and operation of a network infrastructure, and testing tools.

  • by Frank (Owner Thornton
    £47.49

    RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. For security professionals needing to get up and running fast with the topic of RFID, this book presents a "How to Cheat" approach to the topic.

  • by Johnny (Security Researcher Long
    £34.49

    Teaches readers how to use Instant Messaging and Phone calls over the Internet. This book covers the program Google Talk, from detailed information about each of its features, to an analysis of how it works. It also covers techniques from the computer programmers and hackers to bend and tweak the program to do exciting and unexpected things.

  • by Robert (Information security and management consultant and Senior Instructor for (ISC)^2 Slade
    £29.99

    Presents a compilation of security terms and definitions that working security professionals and IT students will find helpful. This work covers malware, wireless technologies, and phishing. It also helps IT professionals and IT students to identify terms used in practice, in journals and articles, and on websites.

  • - Prevent Attacks from Outside and Inside Your Organization
    by Aaron (Senior Microsoft Consultant. COE Lead for Unified Communications Tiensivu
    £50.99

    Describes various technologies and features in Windows Server 2008, such as improvements to networking and remote access features, centralized server role management, and an improved file system. This book outlines steps for installing only the necessary components and subsystems of Windows Server 2008 in your environment.

  • - Investigating and Analyzing Malicious Code
    by Eoghan (Eoghan Casey Casey
    £62.99

    Covers the field of 'live forensics', where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. This book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code.

  • by Susan (MCSE Snedaker
    £57.49

    Covers management issues facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries, this volume includes topics such as: Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design Integration.

  • by Johnny (Security Researcher) Long
    £57.49

    Contains information on a wide variety of topics related to Techno Security. This book takes the approach of identifying some of the risks, threats, and vulnerabilities, discussing the countermeasures to address them. It shows how to hack without touching a computer using tailgating, lock bumping, shoulder surfing, and dumpster diving.

  • - Including Outlook Web, Mobile, and Voice Access
    by Henrik (Senior Microsoft Server Consultant Walther
    £34.49

    A reference for the multitasked system administrators. It tries to balance the growing needs for performance, cost effectiveness, and security. It includes coverage of major release of Exchange Server. It emphasizes best-practice security measures for various areas and in particular the area of remote access via Outlook.

  • - The Killer Web Applications
    by Craig (CISO for Portland State University and President of Hawkeye Security Training Schiller
    £47.49

    Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals using real world examples. It covers what they are, how they operate, and the environment and technology that makes them possible. It analyzes botnets for opportunities to detect, track, and remove them.

  • - Study Guide and Practice Exams
    by Paul (Educator Sanghera
    £36.49

    A guide to CompTIA's RFID+ Security exam.

  • - Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
    by James Steele
    £54.49

    Discusses the hard questions cyber crime investigators are asking. This book includes chapters that discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. It examines issues relating to cyber crime definitions, the electronic crime scene, and preparing and presenting a cyber crime investigation in court.

  • by William P (Former Deputy Director Crowell
    £57.49

    Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape. This work details enterprise security management as it relates to incident detection and incident management.

  • - Preventing Intellectual Property Theft and Economic Espionage in the 21st Century
    by Richard (Internationally recognized expert in the areas of Security Power
    £64.99

    The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.

  • - True Stories of Insider Threats and Enterprise Security Management Countermeasures
    by Brian T (CISSP Contos
    £47.49

    Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.

Join thousands of book lovers

Sign up to our newsletter and receive discounts and inspiration for your next reading experience.