Skip to main content
Perlego
Browse
Institutions
Pricing
Login
Sign up to read
Deutsch
English
Español
Français
Italiano
globe icon
close
Deutsch
English
Español
Français
Italiano
globe icon
English
close
Browse by topic
Architecture
Art
Biological Sciences
Business
Computer Science
Design
Economics
Education
History
Languages & Linguistics
Law
Literature
Mathematics
Media & Performing Arts
Medicine
Personal Development
Philosophy
Physical Sciences
Politics & International Relations
Psychology
Social Sciences
Study Aids
Technology & Engineering
Theology & Religion
Or browse by
Subtopics
Publishers
Index
Browse study resources
Knowledge Base
Study Guides
Essay Writing Guides
Home
Browse
Syngress
Syngress
English
close
Showing 1 - 60 out of 294 books
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Sign up to read
Research Methods for Cyber Security
Thomas W. Edgar, David O. Manz
2017
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
Sign up to read
Digital Forensics with Open Source Tools
Harlan Carvey, Cory Altheide
2011
Operating System Forensics
Ric Messier
2015
Sign up to read
Operating System Forensics
Ric Messier
2015
Logging and Log Management
Kevin Schmidt, Chris Phillips, Anton Chuvakin
2012
Sign up to read
Logging and Log Management
Kevin Schmidt, Chris Phillips, Anton Chuvakin
2012
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
Sign up to read
Digital Forensics for Legal Professionals
Larry Daniel, Lars Daniel
2011
CISSP Study Guide
Eric Conrad, Seth Misenar, Joshua Feldman
2012
Sign up to read
CISSP Study Guide
Eric Conrad, Seth Misenar, Joshua Feldman
2012
Federal Cloud Computing
Matthew Metheny
2017
Sign up to read
Federal Cloud Computing
Matthew Metheny
2017
Cisco Router and Switch Forensics
Dale Liu
2009
Sign up to read
Cisco Router and Switch Forensics
Dale Liu
2009
The Basics of Digital Forensics
John Sammons
2014
Sign up to read
The Basics of Digital Forensics
John Sammons
2014
Applied Network Security Monitoring
Chris Sanders, Jason Smith
2013
Sign up to read
Applied Network Security Monitoring
Chris Sanders, Jason Smith
2013
Securing the Cloud
Vic (J.R.) Winkler
2011
Sign up to read
Securing the Cloud
Vic (J.R.) Winkler
2011
Cyber Reconnaissance, Surveillance and Defense
Robert Shimonski
2014
Sign up to read
Cyber Reconnaissance, Surveillance and Defense
Robert Shimonski
2014
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
Sign up to read
Business Continuity and Disaster Recovery Planning for IT Professionals
Susan Snedaker
2013
CISSP® Study Guide
Joshua Feldman, Seth Misenar, Eric Conrad
2023
Sign up to read
CISSP® Study Guide
Joshua Feldman, Seth Misenar, Eric Conrad
2023
Industrial Network Security
Eric D. Knapp, Joel Thomas Langill
2014
Sign up to read
Industrial Network Security
Eric D. Knapp, Joel Thomas Langill
2014
Security Risk Management
Evan Wheeler
2011
Sign up to read
Security Risk Management
Evan Wheeler
2011
Handbook of System Safety and Security
2016
Sign up to read
Handbook of System Safety and Security
2016
Eleventh Hour CISSP®
Joshua Feldman, Seth Misenar, Eric Conrad
2016
Sign up to read
Eleventh Hour CISSP®
Joshua Feldman, Seth Misenar, Eric Conrad
2016
Data Breach Preparation and Response
Kevvie Fowler
2016
Sign up to read
Data Breach Preparation and Response
Kevvie Fowler
2016
Windows Forensic Analysis Toolkit
Harlan Carvey
2014
Sign up to read
Windows Forensic Analysis Toolkit
Harlan Carvey
2014
Cyber Warfare
Jason Andress, Steve Winterfeld
2013
Sign up to read
Cyber Warfare
Jason Andress, Steve Winterfeld
2013
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2013
Sign up to read
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2013
Introduction to Cyber-Warfare
Paulo Shakarian, Jana Shakarian, Andrew Ruef
2013
Sign up to read
Introduction to Cyber-Warfare
Paulo Shakarian, Jana Shakarian, Andrew Ruef
2013
The Basics of Cyber Warfare
Jason Andress, Steve Winterfeld
2012
Sign up to read
The Basics of Cyber Warfare
Jason Andress, Steve Winterfeld
2012
Information Security Risk Assessment Toolkit
Mark Talabis, Jason Martin
2012
Sign up to read
Information Security Risk Assessment Toolkit
Mark Talabis, Jason Martin
2012
The Basics of Digital Forensics
John Sammons
2012
Sign up to read
The Basics of Digital Forensics
John Sammons
2012
Cyber Warfare
Jason Andress, Steve Winterfeld
2011
Sign up to read
Cyber Warfare
Jason Andress, Steve Winterfeld
2011
The IT / Digital Legal Companion
Gene K. Landy, Amy J. Mastrobattista
2008
Sign up to read
The IT / Digital Legal Companion
Gene K. Landy, Amy J. Mastrobattista
2008
The Basics of Information Security
Jason Andress
2014
Sign up to read
The Basics of Information Security
Jason Andress
2014
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
Sign up to read
Investigating Internet Crimes
Todd G. Shipley, Art Bowker
2013
Placing the Suspect Behind the Keyboard
Brett Shavers
2013
Sign up to read
Placing the Suspect Behind the Keyboard
Brett Shavers
2013
Android Forensics
Andrew Hoog
2011
Sign up to read
Android Forensics
Andrew Hoog
2011
Securing the Internet of Things
Shancang Li, Li Da Xu
2017
Sign up to read
Securing the Internet of Things
Shancang Li, Li Da Xu
2017
Advanced Persistent Security
Ira Winkler, Araceli Treu Gomes
2016
Sign up to read
Advanced Persistent Security
Ira Winkler, Araceli Treu Gomes
2016
Mobile Security and Privacy
Man Ho Au, Raymond Choo
2016
Sign up to read
Mobile Security and Privacy
Man Ho Au, Raymond Choo
2016
Coding for Penetration Testers
Jason Andress, Ryan Linn
2016
Sign up to read
Coding for Penetration Testers
Jason Andress, Ryan Linn
2016
Windows Registry Forensics
Harlan Carvey
2016
Sign up to read
Windows Registry Forensics
Harlan Carvey
2016
Introduction to Social Media Investigation
Jennifer Golbeck
2015
Sign up to read
Introduction to Social Media Investigation
Jennifer Golbeck
2015
CSA Guide to Cloud Computing
Raj Samani, Brian Honan, Jim Reavis
2014
Sign up to read
CSA Guide to Cloud Computing
Raj Samani, Brian Honan, Jim Reavis
2014
Computer Incident Response and Forensics Team Management
Leighton Johnson
2013
Sign up to read
Computer Incident Response and Forensics Team Management
Leighton Johnson
2013
The Basics of Cloud Computing
Derrick Rountree, Ileana Castrillo
2013
Sign up to read
The Basics of Cloud Computing
Derrick Rountree, Ileana Castrillo
2013
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
Sign up to read
Cyber Security and IT Infrastructure Protection
John R. Vacca
2013
Professional Penetration Testing
Thomas Wilhelm
2013
Sign up to read
Professional Penetration Testing
Thomas Wilhelm
2013
Applied Cyber Security and the Smart Grid
Eric D. Knapp, Raj Samani
2013
Sign up to read
Applied Cyber Security and the Smart Grid
Eric D. Knapp, Raj Samani
2013
Cybercrime Case Presentation
Brett Shavers
2013
Sign up to read
Cybercrime Case Presentation
Brett Shavers
2013
FISMA and the Risk Management Framework
Daniel R. Philpott, Stephen D. Gantz
2012
Sign up to read
FISMA and the Risk Management Framework
Daniel R. Philpott, Stephen D. Gantz
2012
Violent Python
TJ O'Connor
2012
Sign up to read
Violent Python
TJ O'Connor
2012
Nessus Network Auditing
2011
Sign up to read
Nessus Network Auditing
2011
Metrics and Methods for Security Risk Management
Carl Young
2010
Sign up to read
Metrics and Methods for Security Risk Management
Carl Young
2010
Syngress IT Security Project Management Handbook
Susan Snedaker
2006
Sign up to read
Syngress IT Security Project Management Handbook
Susan Snedaker
2006
Software Piracy Exposed
Ron Honick
2005
Sign up to read
Software Piracy Exposed
Ron Honick
2005
Securing SQL Server
Denny Cherry
2015
Sign up to read
Securing SQL Server
Denny Cherry
2015
XSS Attacks
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov
2011
Sign up to read
XSS Attacks
Seth Fogie, Jeremiah Grossman, Robert Hansen, Anton Rager, Petko D. Petkov
2011
Professional Penetration Testing
Thomas Wilhelm
2015
Sign up to read
Professional Penetration Testing
Thomas Wilhelm
2015
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
David Maynor
2011
Sign up to read
Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research
David Maynor
2011
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2011
Sign up to read
The Basics of Hacking and Penetration Testing
Patrick Engebretson
2011
Google Hacking for Penetration Testers
Bill Gardner, Johnny Long, Justin Brown
2011
Sign up to read
Google Hacking for Penetration Testers
Bill Gardner, Johnny Long, Justin Brown
2011
Google Hacking for Penetration Testers
Johnny Long
2004
Sign up to read
Google Hacking for Penetration Testers
Johnny Long
2004
Penetration Tester's Open Source Toolkit
Jeremy Faircloth
2016
Sign up to read
Penetration Tester's Open Source Toolkit
Jeremy Faircloth
2016
DNS Security
Allan Liska, Geoffrey Stowe
2016
Sign up to read
DNS Security
Allan Liska, Geoffrey Stowe
2016
1
2
3
4
5