Advanced Persistent Security

Ira Winkler Author
Araceli Treu Gomes Author
(2016)

Syngress Force Emerging...

Robert Graham Author
(2006)

Syngress IT Security Project...

Susan Snedaker Author
(2006)

The Real MCTS/MCITP Exam...

Anthony Piltzecker Author
(2011)

The Real MCTS/MCITP Exam...

Anthony Piltzecker Author
(2011)

The Real MCTS/MCITP Exam...

Brien Posey Author
(2011)

The Real MCTS/MCITP Exam...

Brien Posey Author
Colin Bowern Author
(2011)

The Real MCTS/MCITP Exam...

Anthony Piltzecker Author
(2011)

The Real MCTS/MCITP Exam...

Anthony Piltzecker Author
(2011)

The Real MCTS/MCITP Exam...

Brien Posey Author
(2008)

The Real MCTS/MCITP Exam...

Brien Posey Author
(2011)

Virtualization with Microsoft...

Andy Jones Author
Rogier Dittner Author
(2006)

WarDriving and Wireless...

Chris Hurley Author
Russ Rogers Author
(2006)

Winternals Defragmentation,...

Dave Kleiman Author
Laura E Hunter Author
(2006)

Zen and the Art of...

Ira Winkler Author
(2011)

Configuring VMware ESX Server...

Al Muller Author
Seburn Wilson Author
(2005)

Ethereal Packet Sniffing

Syngress Author
(2004)

Inside the SPAM Cartel

Spammer-X Spammer-X Author
(2004)

Nessus Network Auditing

Jay Beale Author
Haroon Meer Author
(2004)

Nessus, Snort, and Ethereal...

Brian Caswell Author
Jay Beale Author
(2005)

RFID Security

Frank Thornton Author
Chris Lanthem Author
(2006)

Security Log Management

Jacob Babbin Author
(2006)

Security+ Study Guide

Ido Dubrawsky Author
Jeremy Faircloth Author
(2007)

Snort 2.1 Intrusion Detection

Brian Caswell Author
Jay Beale Author
(2004)

Snort Intrusion Detection 2.0

Syngress Author
(2003)

InfoSecurity 2008 Threat...

Craig Schiller Author
Seth Fogie Author
(2011)

Metasploit Toolkit for...

David Maynor Author
(2011)

AVIEN Malware Defense Guide...

David Harley Author
Robert S. Vibert Author of introduction, etc.
(2011)

Black Hat Physical Device...

Drew Miller Author
(2005)

Building a VoIP Network with...

Larry Chaffin Author
(2006)

Check Point Next Generation...

Syngress Author
(2004)

Combating Spyware in the...

Paul Piccard Author
(2006)

CYA Securing Exchange Server...

Mark Fugatt Author
Henrik Walther Author
(2004)

CYA Securing IIS 6.0

Chris Peiris Author
Ken Schaefer Author
(2004)

Cyber Adversary Characterization

Marcus Sachs Author
Tom Parker Author
(2004)

Dr. Tom Shinder's Configuring...

Debra Littlejohn Shinder Author
Thomas W Shinder Author
(2004)

Thor's OS Xodus

Timothy "Thor" Mullen Author
(2015)

Security Controls Evaluation,...

Leighton Johnson Author
(2015)

Cyber Security Awareness for...

Henry Dalziel Author
David Willson Author
(2015)

Deploying Secure Containers...

Henry Dalziel Author
Jon Schipp Author
(2015)

Meeting People via WiFi and...

Henry Dalziel Author
Joshua Schroeder Author
(2015)

Protecting Patient Information

Paul Cerrato Author
(2016)

OS X Incident Response

Jaron Bradley Author
(2016)

Data Breach Preparation and...

Kevvie Fowler Author
(2016)

Executing Windows Command...

Chet Hosmer Author
Joshua Bartolomie Author
(2016)

Coding for Penetration Testers

Jason Andress Author
Ryan Linn Author
(2016)

Data Hiding Techniques in...

Nihad Ahmad Hassan Author
Rami Hijazi Author
(2016)

Penetration Tester's Open...

Jeremy Faircloth Author
(2016)

Contemporary Digital Forensic...

Kim-Kwang Raymond Choo Editor
Ali Dehghantanha Editor
(2016)

Lossless Information Hiding...

Zhe-Ming Lu Author
Shi-Ze Guo Author
(2016)