Other ISBN ranges for Syngress: Syngress (978-1-928994-...) · Syngress (978-1-931836-...) · Syngress (978-1-932266-...)

year of pub­li­ca­ti­onISBNauthor(s)title
2005978-1-59749-004-7Charles Riley · Umer Khan · Michael SweeneyCisco PIX Firewalls: Configure / Manage / Troubleshoot
  ''978-1-59749-005-4James C FosterSockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals
  ''978-1-59749-006-1Ryan Russell · Riley Eller · Jay Beale · Chris Hurley · Tom Parker · Bri Hatch · Timothy MullenStealing the Network: How to Own an Identity
  ''978-1-59749-011-5Aaron W. Bayles · Chris Hurley · Johnny Long · Ed Brindley · James C. Foster · Christopher W. KlausInfoSec Career Hacking: Sell Your Skillz, Not Your Soul
  ''978-1-59749-017-7Marcus Sachs · Paul Piccard · Brian Baskin · George SpillmanSecuring IM and P2P Applications for the Enterprise
2005978-1-59749-018-4Brian Wotring · Bruce Potter · Marcus J. RanumHost Integrity Monitoring Using Osiris and Samhain
  ''978-1-59749-019-1Al Muller · Seburn WilsonConfiguring VMware ESX Server 2.5 (Vol 1)
  ''978-1-59749-020-7Neil Archibald · Gilbert Ramirez · Noam RathausNessus, Snort, & Ethereal Power Tools: Customizing Open Source Security Applications (Jay Beale's Open Source Security Series)
  ''978-1-59749-021-4Jeremy Faircloth · Jay Beale · Roelof Temmingh · Haroon Meer · Charl van der Walt · HD MoorePenetration Tester's Open Source Toolkit
2006978-1-59749-027-6B. BarberHow to Cheat at Managing Windows Server Update Services, Volume 1
  ''978-1-59749-030-6Lance JamesPhishing Exposed
2005978-1-59749-031-3Robert Stephens · Barry Stiefel · Stephen Watkins · Simon Desmeules · Eli FaskhaConfiguring Check Point NGX VPN-1/Firewall-1
2005978-1-59749-032-0Michael GoughSkype Me! From Single User to Small Enterprise and Beyond
  ''978-1-59749-035-1Russ Rogers · Ed Fuller · Greg Miles · Matthew Hoagberg · Travis Schack · Ted Dykstra · Bryan Cunningham · Chuck LittleNetwork Security Evaluation Using the NSA IEM
  ''978-1-59749-036-8Christian Lahti · Roderick PetersonSarbanes-Oxley Compliance Using COBIT and Open Source Tools
  ''978-1-59749-037-5Susan SnedakerHow to Cheat at IT Project Management
  ''978-1-59749-040-5Bruce Potter · Chris Hurley · Johnny Long · Tom Owad · Russ RogersOS X for Hackers at Heart
2005978-1-59749-041-2Mark BurnettPerfect Passwords: Selection, Protection, Authentication
2006978-1-59749-042-9Jacob Babbin · Dave Kleiman · Everett F. Carter Jr. · Jeremy Faircloth · Mark Burnett · Esteban GutierrezSecurity Log Management: Identifying Patterns in the Chaos
2005978-1-59749-047-4Frank Thornton · Chris LanthemRFID Security
2006978-1-59749-048-1Eric Cole · Sandra RingInsider Threat: Protecting the Enterprise from Sabotage, Spying, and Theft
2007978-1-59749-055-9Joshua Brashars · Johnny Long · Brian BaskinGoogle Talking
  ''978-1-59749-056-6Michael Gregg · Brian BaskinSyngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
2006978-1-59749-057-3Debra Littlejohn Shinder · Thomas W ShinderHow to Cheat at Configuring ISA Server 2004
  ''978-1-59749-058-0Melissa M. Meyer · Michael Cross · Hal Kurz · Brian BarberHow to Cheat at Designing a Windows Server 2003 Active Directory Infrastructure
2007978-1-59749-059-7Al MullerScripting VMware Power Tools: Automating Virtual Infrastructure Administration
2006978-1-59749-060-3Thomas Porter · Jan Kanclirz Jr. · Brian BaskinPractical VoIP Security
2007978-1-59749-061-0Michael CrossDeveloper's Guide to Web Application Security
2006978-1-59749-063-4Michael GoughVideo Conferencing over IP: Configure, Secure, and Troubleshoot
  ''978-1-59749-064-1Paul Piccard · Jeremy Faircloth · Brian BaskinCombating Spyware in the Enterprise: Discover, Detect, and Eradicate the Internet's Greatest Threat
2007978-1-59749-073-3Angela Orebaugh · Gilbert Ramirez · Jay Beale · Joshua WrightWireshark & Ethereal Network Protocol Analyzer Toolkit (Jay Beale's Open Source Security)
  ''978-1-59749-074-0David Maynor · Thomas WilhelmMetasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
2006978-1-59749-076-4Susan SnedakerSyngress IT Security Project Management Handbook
2006978-1-59749-078-8Larry ChaffinBuilding a VoIP Network with Nortel's Multimedia Communication Server 5100
  ''978-1-59749-079-5Dave Kleiman · Laura Hunter · Mahesh Satyanarayana · Kimon Andreou · Nancy G Altholz · Lawrence Abrams · Darren Windham · Tony BradleyWinternals Defragmentation, Recovery, and Administration Field Guide
2007978-1-59749-081-8Johnny Long · Timothy Mullen · Ryan RussellStealing the Network: How to Own a Shadow
2006978-1-59749-088-7Syngress · Dale Liu · Stephanie Miller · Mark Lucas · Abhishek Singh · Jennifer DavisFirewall Policies and VPN Configurations
  ''978-1-59749-089-4Kevin Clague · Mario Ferrari · Miguel Agullo · Guilio Ferrari · Doug CarlsonClassic Lego Mindstorms Projects and Software Tools: Award-Winning Designs from Master Builders
2007978-1-59749-099-3Brian Caswell · Jay Beale · Andrew R BakerSnort IDS and IPS Toolkit (Jay Beale's Open Source Security)
2006978-1-59749-100-6Hal FlynnDesigning and Building Enterprise DMZs
  ''978-1-59749-101-3Steve Manzuik · Andre Gold · Chris GatfordNetwork Security Assessment: From Vulnerability to Patch
2007978-1-59749-104-4Tom St DenisCryptography for Developers
2006978-1-59749-105-1Pawan K. Bhardwaj · Dave Kleiman · Brian BarberHow to Cheat at Windows System Administration Using Command Line Scripts (How to Cheat)
  ''978-1-59749-106-8Rogier Dittner · David Rule · Ken Majors · Matthijs Ten Seldam · Twan GrotenhuisVirtualization with Microsoft Virtual Server 2005
2006978-1-59749-109-9Michael Gregg · Stephen Watkins · George Mays · Chris Ries · Ronald M. Bandes · Brandon FranklinHack the Stack: Using Snort and Ethereal to Master The 8 Layers of An Insecure Network
  ''978-1-59749-110-5Mark OsborneHow to Cheat at Managing Information Security
2007978-1-59749-111-2Chris Hurley · Russ Rogers · Frank Thornton · Brian BakerWarDriving and Wireless Penetration Testing
2006978-1-59749-112-9Tom St DenisBigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
  ''978-1-59749-113-6Joe Grand · Frank Thornton · Albert Yarusso · Lee Barken · Tom Owad · Ryan Russell · Bobby Kinstle · Marcus R BrownJoe Grand's Best of Hardware, Wireless, and Game Console Hacking
2007978-1-59749-114-3T. BradleyEssential Computer Security: Everyone's Guide to Email, Internet, and Wireless Security
2006978-1-59749-115-0Robert SladeDictionary of Information Security
  ''978-1-59749-116-7Laura P. Taylor · L. TaylorFISMA Certification & Accreditation Handbook
2007978-1-59749-118-1Rob Cameron · Chris Cantrell · Anne Hemni · Lisa LorenzinConfiguring Juniper Networks NetScreen and SSG Firewalls
  ''978-1-59749-122-8Brian T. Contos · Colby Derodeff · William P. Crowell · Dan DunkelPhysical and Logical Security Convergence: Powered By Enterprise Security Management
2007978-1-59749-123-5Eric SeagrenSecure Your Network for Free
  ''978-1-59749-128-0Paul CrowleyCD and DVD Forensics
  ''978-1-59749-129-7Brian ContosEnemy at the Water Cooler: True Stories of Insider Threats and Enterprise Security Management Countermeasures
  ''978-1-59749-133-4Anthony Reyes · Richard Brittson · Kevin O'Shea · James SteeleCyber Crime Investigations: Bridging the Gaps Between Security Professionals, Law Enforcement, and Prosecutors
  ''978-1-59749-134-1Paul SangheraRFID+: CompTIA RFID+ Study Guide and Practice Exam (RF0-001)
2007978-1-59749-135-8Craig Schiller · Jim BinkleyBotnets: The Killer Web App
  ''978-1-59749-137-2Henrik WaltherHow to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access
  ''978-1-59749-138-9Jack Wiles · Johnny Long · Russ Rogers · Ron GreenTechno Security's Guide to Managing Risks for IT Managers, Auditors and Investigators
  ''978-1-59749-139-6Anthony PiltzeckerMicrosoft Vista for IT Security Professionals
  ''978-1-59749-151-8Ben Jackson · Champ ClarkAsterisk Hacking
2007978-1-59749-152-5Mario Ferrari · Guilio FerrariBuilding Robots with LEGO Mindstorms NXT
  ''978-1-59749-153-2Ido Dubrawsky · Jeremy Faircloth · Michael Gregg · Eli FaskhaSecurity+ Study Guide
  ''978-1-59749-154-9Seth Fogie · Jeremiah Grossman · Robert Hansen · Anton Rager · Petko D. PetkovXSS Attacks: Cross Site Scripting Exploits and Defense
  ''978-1-59749-155-6Chris Adams · Brian Frederick · Pattrick SantryHow to Cheat at IIS 7 Server Administration
  ''978-1-59749-156-3Harlan CarveyWindows Forensic Analysis Including DVD Toolkit
2007978-1-59749-163-1Amber Schroader · Tyler CohenAlternate Data Storage Forensics
  ''978-1-59749-165-5Branden R. Williams · Anton Chuvakin Ph.D. Stony Brook University Stony Brook NY.PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
  ''978-1-59749-166-2Paul Asadoorian · Larry PesceLinksys WRT54G Ultimate Hacking
  ''978-1-59749-167-9David E. WilliamsVirtualization with Xen(tm): Including XenEnterprise, XenServer, and XenExpress
  ''978-1-59749-168-6Ira WinklerZen and the Art of Information Security
2007978-1-59749-169-3Thomas Porter CISSP CCNP CCDA CCS · Michael GoughHow to Cheat at VoIP Security
  ''978-1-59749-172-3Susan SnedakerBusiness Continuity and Disaster Recovery Planning for IT Professionals
  ''978-1-59749-173-0Harlan Carvey · Jeremy FairclothPerl Scripting for Windows Security: Live Response, Forensic Analysis, and Monitoring
  ''978-1-59749-174-7Pawan K. Bhardwaj · Laura HunterHow to Cheat at Microsoft Vista Administration
  ''978-1-59749-176-1Johnny Long · Bill Gardner · Justin BrownGoogle Hacking for Penetration Testers
2008978-1-59749-193-8Joe Levy · Khai Tran · Patrick Lydon · Jeremy Pollock · Susan Weigand · Dave ParrySonicWALL Secure Wireless Network Integrated Solutions Guide
2007978-1-59749-194-5David Rule Jr.How to Cheat at Configuring VmWare ESX Server
2007978-1-59749-195-2Noam Rathaus · Gadi EvronOpen Source Fuzzing Tools
  ''978-1-59749-196-9Timothy Blum · Kevvie Fowler · Raymond Arthur Gabriel · K. Brian Kelley · Matt ShepherdHow to Cheat at Securing SQL Server 2005
  ''978-1-59749-197-6Dave Kleiman · Craig Wright · Jesse "James" Varsalone · Timothy Clinton · Michael GreggThe Official CHFI Study Guide (Exam 312-49): for Computer Hacking Forensic Investigator
  ''978-1-59749-198-3Josh Shaul · Aaron IngramPractical Oracle Security: Your Unauthorized Guide to Relational Database Security
  ''978-1-59749-199-0Thomas W Shinder · Debra Littlejohn Shinder · Adrian F. Dimcev · James Eaton-Lee · Jason Jones · Steve MoffatDr. Tom Shinder's ISA Server 2006 Migration Guide
2007978-1-59749-200-3Kevin Fletcher · Mark Lucas · Brian Burton · Trent Fausett · Patrick Foxhoven · Kevin Miller · Kevin Peterson · Brad WoodbergJuniper Networks Secure Access SSL VPN Configuration Guide
2008978-1-59749-208-9Russ RogersNessus Network Auditing
  ''978-1-59749-212-6Anthony PiltzeckerHow to Cheat at Administering Office Communications Server 2007
2007978-1-59749-213-3Jeremy Faircloth · Chris Hurley · Jesse VarsalonePenetration Tester's Open Source Toolkit, Vol. 2
2008978-1-59749-215-7Johnny Long · Jack WilesNo Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing
2007978-1-59749-216-4Christian B Lahti · Roderick PetersonSarbanes-Oxley IT Compliance Using Open Source Tools
  ''978-1-59749-217-1Rogier Dittner · David Rule Jr.The Best Damn Server Virtualization Book Period: Including Vmware, Xen, and Microsoft Virtual Server
2008978-1-59749-218-8Thomas W ShinderThe Best Damn Firewall Book Period
2007978-1-59749-223-2Jack WilesTechno Security's Guide to E-Discovery and Digital Forensics: A Comprehensive Handbook
  ''978-1-59749-224-9Craig Schiller · Seth Fogie · Colby DeRodeff · Michael GreggInfoSecurity 2008 Threat Analysis
  ''978-1-59749-227-0susan-snedakerThe Best Damn IT Security Management Book Period
2007978-1-59749-228-7Jack Wiles · Anthony Reyes · Jesse VarsaloneThe Best Damn Cybercrime and Digital Forensics Book Period
2008978-1-59749-233-1Jesse Varsalone · Kelly Brown · Robert J. Shimonski · Jan Kanclirz · Ron Barrett · Mitch GarvisThe Real MCTS/MCITP Exam 70-620 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-234-8Brien PoseyThe Real MCTS/MCITP Exam 70-649 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-235-5Anthony Piltzecker · Naomi Alpern · Tariq Azad · Laura Hunter · John Karnay · Jeffrery Martin · Gene WhitleyThe Real MCTS/MCITP Exam 70-640 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-236-2Brien PoseyThe Real MCTS/MCITP Exam 70-648 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-237-9IOActiveReverse Engineering Code with IDA Pro
2008978-1-59749-240-9Andrew Hay · Daniel Cid · Rory BrayOSSEC Host-Based Intrusion Detection Guide
  ''978-1-59749-241-6Angela Orebaugh · Becky PinkardNmap in the Enterprise: Your Guide to Network Scanning
2006978-1-59749-243-0Chris Ruston · Chris PeirisHow to Cheat at Designing Security for a Windows Server 2003 Network
2008978-1-59749-244-7Jesse VarsaloneMicrosoft Forefront Security Administration Guide
  ''978-1-59749-245-4Ralph BonnellCheck Point NGX R65 Security Administration
  ''978-1-59749-246-1Brien PoseyThe Real MCTS/MCITP Exam 70-642 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-247-8Brien Posey · Colin Bowern · Jeffery A. Martin · John Karnay · Arno Theron · Mohan KrishnamurthyThe Real MCTS/MCITP Exam 70-643 Prep Kit: Independent and Complete Self-Paced Solutions
2008978-1-59749-248-5Naomi Alpern · Tariq Azad · Dustin Hannifin · Shawn TooleyThe Real MCTS/MCITP Exam 70-646 Prep Kit: Independent and Complete Self-Paced Solutions
  ''978-1-59749-249-2Tariq Bin AzadThe Real MCTS/MCITP Exam 70-647 Prep Kit: Independent and Complete Self-Paced Solutions
2006978-1-59749-250-8Chris Lathem · Benjamin W. Fortenberry · Joshua ReedConfiguring SonicWALL Firewalls
  ''978-1-59749-251-5Anthony PiltzeckerHow to Cheat at Managing Microsoft Operations Manager 2005
2008978-1-59749-254-6Paul Baccas · Kevin Finisterre · Larry H. · David Harley · Gary Porteus · Chris Hurley · Johnny LongOS X Exploits and Defense: Own it...Just Like Windows or Linux!
  ''978-1-59749-256-0Gene K. Landy · Amy J. MastrobattistaThe IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
  ''978-1-59749-257-7Jan Kanclirz · Brian Baskin · Thomas WilhelmNetcat Power Tools
2008978-1-59749-266-9Craig S. WrightThe IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments
  ''978-1-59749-267-6Max Schubert · Derrick Bennett · Jonathan Gines · Andrew Hay · John StrandNagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
  ''978-1-59749-268-3Cameron H. Malin · Eoghan Casey · James M. AquilinaMalware Forensics: Investigating and Analyzing Malicious Code
  ''978-1-59749-269-0Chris Pogue · Cory Altheide · Todd HaverkosUNIX and Linux Forensic Analysis DVD Toolkit
  ''978-1-59749-270-6Bhanu P JenaMethods in Nano Cell Biology, Volume 90 (Methods in Cell Biology)
2008978-1-59749-272-0Sergios Theodoridis · Konstantinos KoutroumbasPattern Recognition
  ''978-1-59749-275-1Fergus StrachanIntegrating ISA Server 2006 with Microsoft Exchange 2007
  ''978-1-59749-276-8Debra Littlejohn Shinder · Michael CrossScene of the Cybercrime
2012978-1-59749-277-5Martin PritchardGeotechnics Design and Applications Manual
2008978-1-59749-278-2Owen Bishop B.ScProgramming Lego Mindstorms NXT
  ''978-1-59749-281-2Tariq AzadSecuring Citrix XenApp Server in the Enterprise
  ''978-1-59749-282-9Jack Wiles · Ted Claypoole · Phil Drake · Paul A. Henry · Lester J. Johnson Jr. · Sean Lowther · Greg Miles · Marc Weber TobiasTechno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure
2008978-1-59749-284-3Joey Hirao · Mimi Choi · Perry Cox · Steven PasserSAP Security Configuration and Deployment: The IT Administrator's Guide to Best Practices
  ''978-1-59749-285-0Brien PoseyGFI Network Security and PCI Compliance Power Tools
  ''978-1-59749-286-7Andrew Hay · Keli Hay · Peter GiannoulisNokia Firewall, VPN, and IPSO Configuration Guide
  ''978-1-59749-296-6Karen A. SchulerE-discovery: Creating and Managing an Enterprisewide Program - A Technical Guide to Digital Investigation and Litigation Support
  ''978-1-59749-297-3Ryan R. Kubasiak · Sean MorrisseyMac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit
2008978-1-59749-298-0Ken DunhamMobile Malware Attacks and Defense
  ''978-1-59749-305-5John HoopesVirtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
2009978-1-59749-418-2Dale LiuCisco Router and Switch Forensics: Investigating and Analyzing Malicious Network Activity
  ''978-1-59749-419-9Shawn Tooley · Gareth R. JamesThe Real Citrix CCA Exam Preparation Kit: Prepare for XenApp 5.0
  ''978-1-59749-420-5Mark HorningerThe Real MCTS SQL Server 2008 Exam 70-432 Prep Kit: Database Implementation and Maintenance
  ''978-1-59749-421-2   ''The Real MCTS SQL Server 2008 Exam 70-433 Prep Kit: Database Design
2009978-1-59749-422-9Harlan CarveyWindows Forensic Analysis DVD Toolkit
  ''978-1-59749-424-3Justin Clarke-SaltSQL Injection Attacks and Defense
  ''978-1-59749-425-0Thomas WilhelmProfessional Penetration Testing: Volume 1: Creating and Learning in a Hacking Lab
  ''978-1-59749-429-8Robert Shimonski · Naomi Alpern · Michael Cross · Dustin L. Fritz · Mohan Krishnamurthy · Scott SweitzerCompTIA Network+ Certification Study Guide
2010978-1-59749-431-1Thomas Olzak · James Sabovik · Jason Boomer · Robert M KeeferMicrosoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
2013978-1-59749-470-0Cameron H. Malin · Eoghan Casey · James M. AquilinaMalware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides
2012978-1-59749-472-4   ''Malware Forensic Field Guide for Windows Systems: Digital Forensics Field Guides
2009978-1-59749-482-3Brian BarberCompTIA Linux+ Certification Study Guide (2009 Exam): Exam XK0-003
2010978-1-59749-486-1Enrico Perla B.Sc. Computer Science University of Torino M.Sc. Computer Science Trinity College Dublin · Massimiliano OldaniA Guide to Kernel Exploitation: Attacking the Core
  ''978-1-59749-489-2OlzakMicrosoft Virtualization: Master Microsoft Server, Desktop, Application, and Presentation Virtualization
2009978-1-59749-499-1Anton Chuvakin · Branden R. WilliamsPCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
2010978-1-59749-534-9VaccaManaging Information Security
2010978-1-59749-535-6John R. VaccaNetwork and System Security
  ''978-1-59749-536-3VaccaNetwork and System Security
  ''978-1-59749-537-0Clint GarrisonDigital Forensics for Network, Internet, and Cloud Computing: A Forensic Evidence Guide for Moving Targets and Data
  ''978-1-59749-538-7Terrence V. LillardDigital Forensics For Network, Internet, and Cloud Computing: A Forensic Evidence Guide For Moving Targets and Data
  ''978-1-59749-541-7Brad HainesSeven Deadliest Wireless Technologies Attacks (Seven Deadliest Attacks)
2010978-1-59749-543-1Mike ShemaSeven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
  ''978-1-59749-545-5Carl Timm · Richard PerezSeven Deadliest Social Network Attacks (Syngress Seven Deadliest Attacks)
  ''978-1-59749-547-9Dan YorkSeven Deadliest Unified Communications Attacks (The Seven Deadliest Attacks)
  ''978-1-59749-549-3Stacy Prowell · Rob Kraus · Mike BorkinSeven Deadliest Network Attacks (Syngress Seven Deadliest Attacks)
  ''978-1-59749-551-6Rob Kraus · Brian Barber · Mike Borkin · Naomi AlpernSeven Deadliest Microsoft Attacks (Syngress Seven Deadliest Attacks Series)
2010978-1-59749-553-0Brian Anderson · Barbara AndersonSeven Deadliest USB Attacks (Syngress Seven Deadliest Attacks Series)
  ''978-1-59749-554-7AndersonSeven Deadliest USB Attacks
  ''978-1-59749-557-8Diane Barrett · Greg KipperVirtualization and Forensics: A Digital Forensic Investigator's Guide to Virtual Environments
  ''978-1-59749-562-2OrchillesMicrosoft Windows 7 Administrator's Reference: Upgrading, Deploying, Managing, and Securing Windows 7
  ''978-1-59749-563-9Eric Conrad · Seth Misenar · Joshua FeldmanCISSP Study Guide
2010978-1-59749-566-0Eric Conrad · Seth Misenar · Joshua FeldmanEleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
  ''978-1-59749-568-4Jayson E. Street · Kent Nabors · Brian BaskinDissecting the Hack: The F0rb1dd3n Network, Revised Edition
  ''978-1-59749-570-7Tony Flick · Justin MorehouseSecuring the Smart Grid: Next Generation Power Grid Security
2011978-1-59749-572-1Timothy "Thor" MullenThor's Microsoft Security Bible: A Collection of Practical Security Techniques
2010978-1-59749-574-5Erez MetulaManaged Code Rootkits: Hooking into Runtime Environments
2011978-1-59749-576-9Mike MurrHuman Compromise: The Art of Social Engineering
2010978-1-59749-579-0Dustin HannifinMicrosoft Windows Server 2008 R2 Administrator's Reference: The Administrator's Essential Reference
2011978-1-59749-580-6Harlan CarveyWindows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry
2010978-1-59749-582-0Gareth R. JamesCitrix XenDesktop Implementation: A Practical Guide for IT Professionals
2011978-1-59749-586-8Cory Altheide · Harlan CarveyDigital Forensics with Open Source Tools
  ''978-1-59749-587-5Cory AltheideDigital Forensics with Open Source Tools: Using Open Source Platform Tools for Performing Computer Forensics on Target S
2010978-1-59749-588-2Thomas Wilhelm · Jason AndressNinja Hacking: Unconventional Penetration Testing Tactics and Techniques
2011978-1-59749-592-9Vic (J.R.) WinklerSecuring the Cloud: Cloud Computer Security Techniques and Tactics
2010978-1-59749-596-7Stephen Pearson · Richard WatsonDigital Triage Forensics: Processing the Digital Crime Scene
  ''978-1-59749-604-9Mario Heiderich · Eduardo Alberto Vela Nava · Gareth Heyes · David LindsayWeb Application Obfuscation: '-/WAFs..Evasion..Filters//alert(/Obfuscation/)-'
2010978-1-59749-611-7Deviant OllamPractical Lock Picking: A Physical Penetration Tester's Training Guide
  ''978-1-59749-612-4   ''Practical Lock Picking: A Physical Penetration Tester's Training Guide
2011978-1-59749-613-1Will Gragido · John PircCybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats
  ''978-1-59749-615-5Evan WheelerSecurity Risk Management: Building an Information Security Risk Management Program from the Ground Up
  ''978-1-59749-625-4Denny CherrySecuring SQL Server: Protecting Your Database from Attackers
  ''978-1-59749-627-8Jeremy FairclothPenetration Tester's Open Source Toolkit
2011978-1-59749-637-7Jason Andress · Steve WinterfeldCyber Warfare: Techniques, Tactics and Tools for Security Practitioners
  ''978-1-59749-638-4Jason AndressCyber Warfare: Techniques, Tactics and Tools for Security Practitioners
2012978-1-59749-639-1Josh ZachryWhen Botnets Attack
2011978-1-59749-643-8Larry Daniel · Lars DanielDigital Forensics for Legal Professionals: Understanding Digital Evidence from the Warrant to the Courtroom
  ''978-1-59749-645-2Eric D. Knapp · Joel Thomas LangillIndustrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
  ''978-1-59749-647-6Tom Laszewski · Prakash NauduriMigrating to the Cloud: Oracle Client/Server Modernization
  ''978-1-59749-651-3Andrew HoogAndroid Forensics: Investigation, Analysis and Mobile Security for Google Android
2011978-1-59749-653-7Jason AndressThe Basics of Information Security: Understanding the Fundamentals of Infosec in Theory and Practice
  ''978-1-59749-654-4   ''The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
  ''978-1-59749-655-1Patrick EngebretsonThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)
  ''978-1-59749-656-8Patrick EngebretsonThe Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
  ''978-1-59749-659-9Andrew Hoog · Katie StrzempkaiPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
2011978-1-59749-660-5Andrew HoogiPhone and iOS Forensics: Investigation, Analysis and Mobile Security for Apple iPhone, iPad and iOS Devices
2012978-1-59749-661-2John SammonsThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
  ''978-1-59749-662-9John SammonsThe Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
2011978-1-59749-725-1Dinkar SitaramMoving To The Cloud: Developing Apps in the New World of Cloud Computing
2012978-1-59749-727-5Harlan CarveyWindows Forensic Analysis Toolkit: Advanced Analysis Techniques for Windows 7
2011978-1-59749-729-9Jason Andress · Ryan LinnCoding for Penetration Testers: Building Better Tools
  ''978-1-59749-730-5Jason AndressCoding for Penetration Testers: Building Better Tools
2012978-1-59749-948-4Branden R. Williams · Anton ChuvakinPCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
  ''978-1-59749-954-5Alijohn BathurstThe Hacker's Guide to OS X: Exploiting OS X from the Root Up
  ''978-1-59749-955-2Eric ColeAdvanced Persistent Threat: Understanding the Danger and How to Protect Your Organization
2012978-1-59749-957-6TJ O'ConnorViolent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
  ''978-1-59749-961-3Eric Conrad · Seth Misenar · Joshua FeldmanCISSP Study Guide
  ''978-1-59749-963-7Justin ClarkeSQL Injection Attacks and Defense
  ''978-1-59749-983-5Deviant OllamKeys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks
2013978-1-59749-985-9Brett ShaversPlacing the Suspect Behind the Keyboard: Using Digital Forensics and Investigative Techniques to Identify Cybercrime Suspects
2012978-1-59749-989-7Deviant OllamPractical Lock Picking: A Physical Penetration Tester's Training Guide
2006978-1-59749-997-2James C. Foster · Vincent T. LiuWriting Security Tools and Exploits