year of publication | ISBN | author(s) | title |
2005 | 978-1-59749-004-7 | Charles Riley · Umer Khan · Michael Sweeney | Cisco PIX Firewalls: Configure / Manage / Troubleshoot |
'' | 978-1-59749-005-4 | James C Foster | Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals |
'' | 978-1-59749-006-1 | Ryan Russell · Riley Eller · Jay Beale · Chris Hurley · Tom Parker · Bri Hatch · Timothy Mullen | Stealing the Network: How to Own an Identity |
'' | 978-1-59749-011-5 | Aaron W. Bayles · Chris Hurley · Johnny Long · Ed Brindley · James C. Foster · Christopher W. Klaus | InfoSec Career Hacking: Sell Your Skillz, Not Your Soul |
'' | 978-1-59749-017-7 | Marcus Sachs · Paul Piccard · Brian Baskin · George Spillman | Securing IM and P2P Applications for the Enterprise |
2005 | 978-1-59749-018-4 | Brian Wotring · Bruce Potter · Marcus J. Ranum | Host Integrity Monitoring Using Osiris and Samhain |
'' | 978-1-59749-019-1 | Al Muller · Seburn Wilson | Configuring VMware ESX Server 2.5 (Vol 1) |
'' | 978-1-59749-020-7 | Neil Archibald · Gilbert Ramirez · Noam Rathaus | Nessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series) |
'' | 978-1-59749-021-4 | Jeremy Faircloth · Jay Beale · Roelof Temmingh · Haroon Meer · Charl van der Walt · HD Moore | Penetration Tester's Open Source Toolkit |
2006 | 978-1-59749-027-6 | B. Barber | How to Cheat at Managing Windows Server Update Services, Volume 1 |
'' | 978-1-59749-030-6 | Lance James | Phishing Exposed |
2005 | 978-1-59749-031-3 | Robert Stephens · Barry Stiefel · Stephen Watkins · Simon Desmeules · Eli Faskha | Configuring Check Point NGX VPN-1/Firewall-1 |
2005 | 978-1-59749-032-0 | Michael Gough | Skype Me! From Single User to Small Enterprise and Beyond |
'' | 978-1-59749-035-1 | Russ Rogers · Ed Fuller · Greg Miles · Matthew Hoagberg · Travis Schack · Ted Dykstra · Bryan Cunningham · Chuck Little | Network Security Evaluation Using the NSA IEM |
'' | 978-1-59749-036-8 | Christian Lahti · Roderick Peterson | Sarbanes-Oxley Compliance Using COBIT and Open Source Tools |
'' | 978-1-59749-037-5 | Susan Snedaker | How to Cheat at IT Project Management |
'' | 978-1-59749-040-5 | Bruce Potter · Chris Hurley · Johnny Long · Tom Owad · Russ Rogers | OS X for Hackers at Heart |
2005 | 978-1-59749-041-2 | Mark Burnett | Perfect Passwords: Selection, Protection, Authentication |
2006 | 978-1-59749-042-9 | Jacob Babbin · Dave Kleiman · Everett F. Carter Jr. · Jeremy Faircloth · Mark Burnett · Esteban Gutierrez | Security Log Management: Identifying Patterns in the Chaos |
2005 | 978-1-59749-047-4 | Frank Thornton · Chris Lanthem | RFID Security |
2006 | 978-1-59749-048-1 | Eric Cole · Sandra Ring | Insider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft |
2007 | 978-1-59749-055-9 | Joshua Brashars · Johnny Long · Brian Baskin | Google Talking |
'' | 978-1-59749-056-6 | Michael Gregg · Brian Baskin | Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious |
2006 | 978-1-59749-057-3 | Debra Littlejohn Shinder · Thomas W Shinder | How to Cheat at Configuring ISA Server 2004 |
'' | 978-1-59749-058-0 | Melissa M. Meyer · Michael Cross · Hal Kurz · Brian Barber | How to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure |
2007 | 978-1-59749-059-7 | Al Muller | Scripting VMware Power Tools: Automating Virtual Infrastructure Administration |
2006 | 978-1-59749-060-3 | Thomas Porter · Jan Kanclirz Jr. · Brian Baskin | Practical VoIP Security |
2007 | 978-1-59749-061-0 | Michael Cross | Developer's Guide to Web Application Security |
2006 | 978-1-59749-063-4 | Michael Gough | Video Conferencing over IP: Configure, Secure, and Troubleshoot |
'' | 978-1-59749-064-1 | Paul Piccard · Jeremy Faircloth · Brian Baskin | Combating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat |
2007 | 978-1-59749-073-3 | Angela Orebaugh · Gilbert Ramirez · Jay Beale · Joshua Wright | Wireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security) |
'' | 978-1-59749-074-0 | David Maynor · Thomas Wilhelm | Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research |
2006 | 978-1-59749-076-4 | Susan Snedaker | Syngress IT Security Project Management Handbook |
2006 | 978-1-59749-078-8 | Larry Chaffin | Building a VoIP Network with Nortel's Multimedia Communication Server 5100 |
'' | 978-1-59749-079-5 | Dave Kleiman · Laura Hunter · Mahesh Satyanarayana · Kimon Andreou · Nancy G Altholz · Lawrence Abrams · Darren Windham · Tony Bradley | Winternals Defragmentation, Recovery, and Administration Field Guide |
2007 | 978-1-59749-081-8 | Johnny Long · Timothy Mullen · Ryan Russell | Stealing the Network: How to Own a Shadow |
2006 | 978-1-59749-088-7 | Syngress · Dale Liu · Stephanie Miller · Mark Lucas · Abhishek Singh · Jennifer Davis | Firewall Policies and VPN Configurations |
'' | 978-1-59749-089-4 | Kevin Clague · Mario Ferrari · Miguel Agullo · Guilio Ferrari · Doug Carlson | Classic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders |
2007 | 978-1-59749-099-3 | Brian Caswell · Jay Beale · Andrew R Baker | Snort IDS and IPS Toolkit (Jay Beale's Open Source Security) |
2006 | 978-1-59749-100-6 | Hal Flynn | Designing and Building Enterprise DMZs |
'' | 978-1-59749-101-3 | Steve Manzuik · Andre Gold · Chris Gatford | Network Security Assessment: From Vulnerability to Patch |
2007 | 978-1-59749-104-4 | Tom St Denis | Cryptography for Developers |
2006 | 978-1-59749-105-1 | Pawan K. Bhardwaj · Dave Kleiman · Brian Barber | How to Cheat at Windows System Administration Using Command Line Scripts (How to Cheat) |
'' | 978-1-59749-106-8 | Rogier Dittner · David Rule · Ken Majors · Matthijs Ten Seldam · Twan Grotenhuis | Virtualization with Microsoft Virtual Server 2005 |
2006 | 978-1-59749-109-9 | Michael Gregg · Stephen Watkins · George Mays · Chris Ries · Ronald M. Bandes · Brandon Franklin | Hack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network |
'' | 978-1-59749-110-5 | Mark Osborne | How to Cheat at Managing Information Security |
2007 | 978-1-59749-111-2 | Chris Hurley · Russ Rogers · Frank Thornton · Brian Baker | WarDriving and Wireless Penetration Testing |
2006 | 978-1-59749-112-9 | Tom St Denis | BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic |
'' | 978-1-59749-113-6 | Joe Grand · Frank Thornton · Albert Yarusso · Lee Barken · Tom Owad · Ryan Russell · Bobby Kinstle · Marcus R Brown | Joe Grand's Best of Hardware, Wireless, and Game Console Hacking |
2007 | 978-1-59749-114-3 | T. Bradley | Essential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security |
2006 | 978-1-59749-115-0 | Robert Slade | Dictionary of Information Security |
'' | 978-1-59749-116-7 | Laura P. Taylor · L. Taylor | FISMA Certification & Accreditation Handbook |
2007 | 978-1-59749-118-1 | Rob Cameron · Chris Cantrell · Anne Hemni · Lisa Lorenzin | Configuring Juniper Networks NetScreen and SSG Firewalls |
'' | 978-1-59749-122-8 | Brian T. Contos · Colby Derodeff · William P. Crowell · Dan Dunkel | Physical and Logical Security Convergence: Powered By Enterprise Security Management |
2007 | 978-1-59749-123-5 | Eric Seagren | Secure Your Network for Free |
'' | 978-1-59749-128-0 | Paul Crowley | CD and DVD Forensics |
'' | 978-1-59749-129-7 | Brian Contos | Enemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures |
'' | 978-1-59749-133-4 | Anthony Reyes · Richard Brittson · Kevin O'Shea · James Steele | Cyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors |
'' | 978-1-59749-134-1 | Paul Sanghera | RFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001) |
2007 | 978-1-59749-135-8 | Craig Schiller · Jim Binkley | Botnets: The Killer Web App |
'' | 978-1-59749-137-2 | Henrik Walther | How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access |
'' | 978-1-59749-138-9 | Jack Wiles · Johnny Long · Russ Rogers · Ron Green | Techno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators |
'' | 978-1-59749-139-6 | Anthony Piltzecker | Microsoft Vista for IT Security Professionals |
'' | 978-1-59749-151-8 | Ben Jackson · Champ Clark | Asterisk Hacking |
2007 | 978-1-59749-152-5 | Mario Ferrari · Guilio Ferrari | Building Robots with LEGO Mindstorms NXT |
'' | 978-1-59749-153-2 | Ido Dubrawsky · Jeremy Faircloth · Michael Gregg · Eli Faskha | Security+ Study Guide |
'' | 978-1-59749-154-9 | Seth Fogie · Jeremiah Grossman · Robert Hansen · Anton Rager · Petko D. Petkov | XSS Attacks: Cross Site Scripting Exploits and Defense |
'' | 978-1-59749-155-6 | Chris Adams · Brian Frederick · Pattrick Santry | How to Cheat at IIS 7 Server Administration |
'' | 978-1-59749-156-3 | Harlan Carvey | Windows Forensic Analysis Including DVD Toolkit |
2007 | 978-1-59749-163-1 | Amber Schroader · Tyler Cohen | Alternate Data Storage Forensics |
'' | 978-1-59749-165-5 | Branden R. Williams · Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY. | PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
'' | 978-1-59749-166-2 | Paul Asadoorian · Larry Pesce | Linksys WRT54G Ultimate Hacking |
'' | 978-1-59749-167-9 | David E. Williams | Virtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress |
'' | 978-1-59749-168-6 | Ira Winkler | Zen and the Art of Information Security |
2007 | 978-1-59749-169-3 | Thomas Porter CISSP CCNP CCDA CCS · Michael Gough | How to Cheat at VoIP Security |
'' | 978-1-59749-172-3 | Susan Snedaker | Business Continuity and Disaster Recovery Planning for IT Professionals |
'' | 978-1-59749-173-0 | Harlan Carvey · Jeremy Faircloth | Perl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring |
'' | 978-1-59749-174-7 | Pawan K. Bhardwaj · Laura Hunter | How to Cheat at Microsoft Vista Administration |
'' | 978-1-59749-176-1 | Johnny Long · Bill Gardner · Justin Brown | Google Hacking for Penetration Testers |
2008 | 978-1-59749-193-8 | Joe Levy · Khai Tran · Patrick Lydon · Jeremy Pollock · Susan Weigand · Dave Parry | SonicWALL Secure Wireless Network Integrated Solutions Guide |
2007 | 978-1-59749-194-5 | David Rule Jr. | How to Cheat at Configuring VmWare ESX Server |
2007 | 978-1-59749-195-2 | Noam Rathaus · Gadi Evron | Open Source Fuzzing Tools |
'' | 978-1-59749-196-9 | Timothy Blum · Kevvie Fowler · Raymond Arthur Gabriel · K. Brian Kelley · Matt Shepherd | How to Cheat at Securing SQL Server 2005 |
'' | 978-1-59749-197-6 | Dave Kleiman · Craig Wright · Jesse "James" Varsalone · Timothy Clinton · Michael Gregg | The Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator |
'' | 978-1-59749-198-3 | Josh Shaul · Aaron Ingram | Practical Oracle Security: Your Unauthorized Guide to Relational Database Security |
'' | 978-1-59749-199-0 | Thomas W Shinder · Debra Littlejohn Shinder · Adrian F. Dimcev · James Eaton-Lee · Jason Jones · Steve Moffat | Dr. Tom Shinder's ISA Server 2006 Migration Guide |
2007 | 978-1-59749-200-3 | Kevin Fletcher · Mark Lucas · Brian Burton · Trent Fausett · Patrick Foxhoven · Kevin Miller · Kevin Peterson · Brad Woodberg | Juniper Networks Secure Access SSL VPN Configuration Guide |
2008 | 978-1-59749-208-9 | Russ Rogers | Nessus Network Auditing |
'' | 978-1-59749-212-6 | Anthony Piltzecker | How to Cheat at Administering Office Communications Server 2007 |
2007 | 978-1-59749-213-3 | Jeremy Faircloth · Chris Hurley · Jesse Varsalone | Penetration Tester's Open Source Toolkit, Vol. 2 |
2008 | 978-1-59749-215-7 | Johnny Long · Jack Wiles | No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing |
2007 | 978-1-59749-216-4 | Christian B Lahti · Roderick Peterson | Sarbanes-Oxley IT Compliance Using Open Source Tools |
'' | 978-1-59749-217-1 | Rogier Dittner · David Rule Jr. | The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server |
2008 | 978-1-59749-218-8 | Thomas W Shinder | The Best Damn Firewall Book Period |
2007 | 978-1-59749-223-2 | Jack Wiles | Techno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook |
'' | 978-1-59749-224-9 | Craig Schiller · Seth Fogie · Colby DeRodeff · Michael Gregg | InfoSecurity 2008 Threat Analysis |
'' | 978-1-59749-227-0 | susan-snedaker | The Best Damn IT Security Management Book Period |
2007 | 978-1-59749-228-7 | Jack Wiles · Anthony Reyes · Jesse Varsalone | The Best Damn Cybercrime and Digital Forensics Book Period |
2008 | 978-1-59749-233-1 | Jesse Varsalone · Kelly Brown · Robert J. Shimonski · Jan Kanclirz · Ron Barrett · Mitch Garvis | The Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-234-8 | Brien Posey | The Real MCTS/MCITP Exam 70-649 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-235-5 | Anthony Piltzecker · Naomi Alpern · Tariq Azad · Laura Hunter · John Karnay · Jeffrery Martin · Gene Whitley | The Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-236-2 | Brien Posey | The Real MCTS/MCITP Exam 70-648 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-237-9 | IOActive | Reverse Engineering Code with IDA Pro |
2008 | 978-1-59749-240-9 | Andrew Hay · Daniel Cid · Rory Bray | OSSEC Host-Based Intrusion Detection Guide |
'' | 978-1-59749-241-6 | Angela Orebaugh · Becky Pinkard | Nmap in the Enterprise: Your Guide to Network Scanning |
2006 | 978-1-59749-243-0 | Chris Ruston · Chris Peiris | How to Cheat at Designing Security for a Windows Server 2003 Network |
2008 | 978-1-59749-244-7 | Jesse Varsalone | Microsoft Forefront Security Administration Guide |
'' | 978-1-59749-245-4 | Ralph Bonnell | Check Point NGX R65 Security Administration |
'' | 978-1-59749-246-1 | Brien Posey | The Real MCTS/MCITP Exam 70-642 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-247-8 | Brien Posey · Colin Bowern · Jeffery A. Martin · John Karnay · Arno Theron · Mohan Krishnamurthy | The Real MCTS/MCITP Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions |
2008 | 978-1-59749-248-5 | Naomi Alpern · Tariq Azad · Dustin Hannifin · Shawn Tooley | The Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions |
'' | 978-1-59749-249-2 | Tariq Bin Azad | The Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions |
2006 | 978-1-59749-250-8 | Chris Lathem · Benjamin W. Fortenberry · Joshua Reed | Configuring SonicWALL Firewalls |
'' | 978-1-59749-251-5 | Anthony Piltzecker | How to Cheat at Managing Microsoft Operations Manager 2005 |
2008 | 978-1-59749-254-6 | Paul Baccas · Kevin Finisterre · Larry H. · David Harley · Gary Porteus · Chris Hurley · Johnny Long | OS X Exploits and Defense: Own it...Just Like Windows or Linux! |
'' | 978-1-59749-256-0 | Gene K. Landy · Amy J. Mastrobattista | The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law |
'' | 978-1-59749-257-7 | Jan Kanclirz · Brian Baskin · Thomas Wilhelm | Netcat Power Tools |
2008 | 978-1-59749-266-9 | Craig S. Wright | The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments |
'' | 978-1-59749-267-6 | Max Schubert · Derrick Bennett · Jonathan Gines · Andrew Hay · John Strand | Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices |
'' | 978-1-59749-268-3 | Cameron H. Malin · Eoghan Casey · James M. Aquilina | Malware Forensics: Investigating and Analyzing Malicious Code |
'' | 978-1-59749-269-0 | Chris Pogue · Cory Altheide · Todd Haverkos | UNIX and Linux Forensic Analysis DVD Toolkit |
'' | 978-1-59749-270-6 | Bhanu P Jena | Methods in Nano Cell Biology, Volume 90 (Methods in Cell Biology) |
2008 | 978-1-59749-272-0 | Sergios Theodoridis · Konstantinos Koutroumbas | Pattern Recognition |
'' | 978-1-59749-275-1 | Fergus Strachan | Integrating ISA Server 2006 with Microsoft Exchange 2007 |
'' | 978-1-59749-276-8 | Debra Littlejohn Shinder · Michael Cross | Scene of the Cybercrime |
2012 | 978-1-59749-277-5 | Martin Pritchard | Geotechnics Design and Applications Manual |
2008 | 978-1-59749-278-2 | Owen Bishop B.Sc | Programming Lego Mindstorms NXT |
'' | 978-1-59749-281-2 | Tariq Azad | Securing Citrix XenApp Server in the Enterprise |
'' | 978-1-59749-282-9 | Jack Wiles · Ted Claypoole · Phil Drake · Paul A. Henry · Lester J. Johnson Jr. · Sean Lowther · Greg Miles · Marc Weber Tobias | Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure |
2008 | 978-1-59749-284-3 | Joey Hirao · Mimi Choi · Perry Cox · Steven Passer | SAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices |
'' | 978-1-59749-285-0 | Brien Posey | GFI Network Security and PCI Compliance Power Tools |
'' | 978-1-59749-286-7 | Andrew Hay · Keli Hay · Peter Giannoulis | Nokia Firewall, VPN, and IPSO Configuration Guide |
'' | 978-1-59749-296-6 | Karen A. Schuler | E-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support |
'' | 978-1-59749-297-3 | Ryan R. Kubasiak · Sean Morrissey | Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit |
2008 | 978-1-59749-298-0 | Ken Dunham | Mobile Malware Attacks and Defense |
'' | 978-1-59749-305-5 | John Hoopes | Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting |
2009 | 978-1-59749-418-2 | Dale Liu | Cisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity |
'' | 978-1-59749-419-9 | Shawn Tooley · Gareth R. James | The Real Citrix CCA Exam Preparation Kit: Prepare for XenApp 5.0 |
'' | 978-1-59749-420-5 | Mark Horninger | The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance |
'' | 978-1-59749-421-2 | '' | The Real MCTS SQL Server 2008 Exam 70-433 Prep Kit: Database Design |
2009 | 978-1-59749-422-9 | Harlan Carvey | Windows Forensic Analysis DVD Toolkit |
'' | 978-1-59749-424-3 | Justin Clarke-Salt | SQL Injection Attacks and Defense |
'' | 978-1-59749-425-0 | Thomas Wilhelm | Professional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab |
'' | 978-1-59749-429-8 | Robert Shimonski · Naomi Alpern · Michael Cross · Dustin L. Fritz · Mohan Krishnamurthy · Scott Sweitzer | CompTIA Network+ Certification Study Guide |
2010 | 978-1-59749-431-1 | Thomas Olzak · James Sabovik · Jason Boomer · Robert M Keefer | Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization |
2013 | 978-1-59749-470-0 | Cameron H. Malin · Eoghan Casey · James M. Aquilina | Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides |
2012 | 978-1-59749-472-4 | '' | Malware Forensic Field Guide for Windows Systems: Digital Forensics Field Guides |
2009 | 978-1-59749-482-3 | Brian Barber | CompTIA Linux+ Certification Study Guide (2009 Exam): Exam XK0-003 |
2010 | 978-1-59749-486-1 | Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin · Massimiliano Oldani | A Guide to Kernel Exploitation: Attacking the Core |
'' | 978-1-59749-489-2 | Olzak | Microsoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization |
2009 | 978-1-59749-499-1 | Anton Chuvakin · Branden R. Williams | PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
2010 | 978-1-59749-534-9 | Vacca | Managing Information Security |
2010 | 978-1-59749-535-6 | John R. Vacca | Network and System Security |
'' | 978-1-59749-536-3 | Vacca | Network and System Security |
'' | 978-1-59749-537-0 | Clint Garrison | Digital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data |
'' | 978-1-59749-538-7 | Terrence V. Lillard | Digital Forensics For Network, Internet, and Cloud Computing: A Forensic Evidence Guide For Moving Targets and Data |
'' | 978-1-59749-541-7 | Brad Haines | Seven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks) |
2010 | 978-1-59749-543-1 | Mike Shema | Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks) |
'' | 978-1-59749-545-5 | Carl Timm · Richard Perez | Seven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks) |
'' | 978-1-59749-547-9 | Dan York | Seven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks) |
'' | 978-1-59749-549-3 | Stacy Prowell · Rob Kraus · Mike Borkin | Seven Deadliest Network Attacks (Syngress Seven Deadliest Attacks) |
'' | 978-1-59749-551-6 | Rob Kraus · Brian Barber · Mike Borkin · Naomi Alpern | Seven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series) |
2010 | 978-1-59749-553-0 | Brian Anderson · Barbara Anderson | Seven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series) |
'' | 978-1-59749-554-7 | Anderson | Seven Deadliest USB Attacks |
'' | 978-1-59749-557-8 | Diane Barrett · Greg Kipper | Virtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments |
'' | 978-1-59749-562-2 | Orchilles | Microsoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7 |
'' | 978-1-59749-563-9 | Eric Conrad · Seth Misenar · Joshua Feldman | CISSP Study Guide |
2010 | 978-1-59749-566-0 | Eric Conrad · Seth Misenar · Joshua Feldman | Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour) |
'' | 978-1-59749-568-4 | Jayson E. Street · Kent Nabors · Brian Baskin | Dissecting the Hack: The F0rb1dd3n Network, Revised Edition |
'' | 978-1-59749-570-7 | Tony Flick · Justin Morehouse | Securing the Smart Grid: Next Generation Power Grid Security |
2011 | 978-1-59749-572-1 | Timothy "Thor" Mullen | Thor's Microsoft Security Bible: A Collection of Practical Security Techniques |
2010 | 978-1-59749-574-5 | Erez Metula | Managed Code Rootkits: Hooking into Runtime Environments |
2011 | 978-1-59749-576-9 | Mike Murr | Human Compromise: The Art of Social Engineering |
2010 | 978-1-59749-579-0 | Dustin Hannifin | Microsoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference |
2011 | 978-1-59749-580-6 | Harlan Carvey | Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry |
2010 | 978-1-59749-582-0 | Gareth R. James | Citrix XenDesktop Implementation: A Practical Guide for IT Professionals |
2011 | 978-1-59749-586-8 | Cory Altheide · Harlan Carvey | Digital Forensics with Open Source Tools |
'' | 978-1-59749-587-5 | Cory Altheide | Digital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target S |
2010 | 978-1-59749-588-2 | Thomas Wilhelm · Jason Andress | Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques |
2011 | 978-1-59749-592-9 | Vic (J.R.) Winkler | Securing the Cloud: Cloud Computer Security Techniques and Tactics |
2010 | 978-1-59749-596-7 | Stephen Pearson · Richard Watson | Digital Triage Forensics: Processing the Digital Crime Scene |
'' | 978-1-59749-604-9 | Mario Heiderich · Eduardo Alberto Vela Nava · Gareth Heyes · David Lindsay | Web Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-' |
2010 | 978-1-59749-611-7 | Deviant Ollam | Practical Lock Picking: A Physical Penetration Tester's Training Guide |
'' | 978-1-59749-612-4 | '' | Practical Lock Picking: A Physical Penetration Tester's Training Guide |
2011 | 978-1-59749-613-1 | Will Gragido · John Pirc | Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats |
'' | 978-1-59749-615-5 | Evan Wheeler | Security Risk Management: Building an Information Security Risk Management Program from the Ground Up |
'' | 978-1-59749-625-4 | Denny Cherry | Securing SQL Server: Protecting Your Database from Attackers |
'' | 978-1-59749-627-8 | Jeremy Faircloth | Penetration Tester's Open Source Toolkit |
2011 | 978-1-59749-637-7 | Jason Andress · Steve Winterfeld | Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners |
'' | 978-1-59749-638-4 | Jason Andress | Cyber Warfare: Techniques, Tactics and Tools for Security Practitioners |
2012 | 978-1-59749-639-1 | Josh Zachry | When Botnets Attack |
2011 | 978-1-59749-643-8 | Larry Daniel · Lars Daniel | Digital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom |
'' | 978-1-59749-645-2 | Eric D. Knapp · Joel Thomas Langill | Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems |
'' | 978-1-59749-647-6 | Tom Laszewski · Prakash Nauduri | Migrating to the Cloud: Oracle Client/Server Modernization |
'' | 978-1-59749-651-3 | Andrew Hoog | Android Forensics: Investigation, Analysis and Mobile Security for Google Android |
2011 | 978-1-59749-653-7 | Jason Andress | The Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice |
'' | 978-1-59749-654-4 | '' | The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice |
'' | 978-1-59749-655-1 | Patrick Engebretson | The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series) |
'' | 978-1-59749-656-8 | Patrick Engebretson | The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy |
'' | 978-1-59749-659-9 | Andrew Hoog · Katie Strzempka | iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices |
2011 | 978-1-59749-660-5 | Andrew Hoog | iPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices |
2012 | 978-1-59749-661-2 | John Sammons | The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics |
'' | 978-1-59749-662-9 | John Sammons | The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics |
2011 | 978-1-59749-725-1 | Dinkar Sitaram | Moving To The Cloud: Developing Apps in the New World of Cloud Computing |
2012 | 978-1-59749-727-5 | Harlan Carvey | Windows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7 |
2011 | 978-1-59749-729-9 | Jason Andress · Ryan Linn | Coding for Penetration Testers: Building Better Tools |
'' | 978-1-59749-730-5 | Jason Andress | Coding for Penetration Testers: Building Better Tools |
2012 | 978-1-59749-948-4 | Branden R. Williams · Anton Chuvakin | PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance |
'' | 978-1-59749-954-5 | Alijohn Bathurst | The Hacker's Guide to OS X: Exploiting OS X from the Root Up |
'' | 978-1-59749-955-2 | Eric Cole | Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization |
2012 | 978-1-59749-957-6 | TJ O'Connor | Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers |
'' | 978-1-59749-961-3 | Eric Conrad · Seth Misenar · Joshua Feldman | CISSP Study Guide |
'' | 978-1-59749-963-7 | Justin Clarke | SQL Injection Attacks and Defense |
'' | 978-1-59749-983-5 | Deviant Ollam | Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks |
2013 | 978-1-59749-985-9 | Brett Shavers | Placing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects |
2012 | 978-1-59749-989-7 | Deviant Ollam | Practical Lock Picking: A Physical Penetration Tester's Training Guide |
2006 | 978-1-59749-997-2 | James C. Foster · Vincent T. Liu | Writing Security Tools and Exploits |