Syngress

Displaying 1-5 of 5 results

  • Book chapters // Jul 2008

    Arm yourself with the knowledge to fight cybercrime

    Criminal activity involving computers continues to grow, making it critical for law enforcement personnel, legislators, and IT pros to develop the knowledge to prevent, detect, report, and prosecute cybercrime. In this chapter from Scene of the Cybercrime, Second Edition, Deb Shinder and coauthor Michael Cross discuss cybercrime definitions and categories,...

    Provided By Syngress

  • Book chapters // May 2007

    Successfully deploy Windows Server Update Services (WSUS) in the enterprise

    Deploying Windows Server Update Services (WSUS) on anything but a one-server network introduces a layer of complexity that requires further research and reading. In this chapter from How to Cheat at Managing Windows Server Update Services, take a guided tour through the many features, enhancements, and "gotchas" that you...

    Provided By Syngress

  • Book chapters // Apr 2007

    Investigate Mac OS X as a platform for penetration testing

    With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X operating system provides a great platform for penetration testing. In this sample chapter from OS X for Hackers at Heart, investigate ways that OS X can be used as a platform for penetration testing, focusing...

    Provided By Syngress

  • Book chapters // Apr 2007

    Develop a comprehensive network security plan

    In an age where society relies so heavily on electronic communication, the need for information security is constantly increasing. In this sample chapter from The Best Damn Firewall Book Period, take an overview of network security in general and Internet security in particular. Learn why it's necessary and how...

    Provided By Syngress

  • Book chapters // Sep 2006

    Recover data across a network, recover files, and restore lost Active Directory data with these Winternals tools

    There is never a good time to lose information, and although ideally you should have a proper backup plan in place, that is not always the case. Fortunately for Windows admins everywhere, the Winternals team has got your back. Examine the data recovery tools included in your Winternals Administrator's Pak...

    Provided By Syngress

  • Book chapters // Sep 2006

    Recover data across a network, recover files, and restore lost Active Directory data with these Winternals tools

    There is never a good time to lose information, and although ideally you should have a proper backup plan in place, that is not always the case. Fortunately for Windows admins everywhere, the Winternals team has got your back. Examine the data recovery tools included in your Winternals Administrator's Pak...

    Provided By Syngress

  • Book chapters // Apr 2007

    Develop a comprehensive network security plan

    In an age where society relies so heavily on electronic communication, the need for information security is constantly increasing. In this sample chapter from The Best Damn Firewall Book Period, take an overview of network security in general and Internet security in particular. Learn why it's necessary and how...

    Provided By Syngress

  • Book chapters // Apr 2007

    Investigate Mac OS X as a platform for penetration testing

    With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X operating system provides a great platform for penetration testing. In this sample chapter from OS X for Hackers at Heart, investigate ways that OS X can be used as a platform for penetration testing, focusing...

    Provided By Syngress

  • Book chapters // May 2007

    Successfully deploy Windows Server Update Services (WSUS) in the enterprise

    Deploying Windows Server Update Services (WSUS) on anything but a one-server network introduces a layer of complexity that requires further research and reading. In this chapter from How to Cheat at Managing Windows Server Update Services, take a guided tour through the many features, enhancements, and "gotchas" that you...

    Provided By Syngress

  • Book chapters // Jul 2008

    Arm yourself with the knowledge to fight cybercrime

    Criminal activity involving computers continues to grow, making it critical for law enforcement personnel, legislators, and IT pros to develop the knowledge to prevent, detect, report, and prosecute cybercrime. In this chapter from Scene of the Cybercrime, Second Edition, Deb Shinder and coauthor Michael Cross discuss cybercrime definitions and categories,...

    Provided By Syngress