Syngress

Practical Lock Picking, Second Edition: A Physical Penetration Tester’s Training Guide

Practical Lock Picking, 2nd Edition is presented with rich, detailed full-color diagrams and includes easy-to-follow lessons that allow even beginners to acquire the knowledge they need quickly. Everything from straightforward lock picking to quick-entry techniques like shimming, bumping, and bypassing are explained and illustrated. Whether you’re being hired to penetrate security or simply trying to harden your own …

Learn more

Eleventh Hour CISSP, Second Edition: Study Guide

Eleventh Hour CISSP provides you with a study guide keyed directly to the most current version of the CISSP exam. This book is streamlined to include only core certification information and is presented for ease of last minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most …

Learn more

CISSP Study Guide, Second Edition

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing …

Learn more

The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law

To compete effectively in digital business markets, you need to understand how the law affects your digital technology business. The contents include detailed plain English business and legal guidance on:* Securing Intellectual Property for Digital Business* Digital Contract Fundamentals* Open Source Rules and Strategies* Development, Consulting and Outsourcing* Software as a Service* Business Software Licensing, Partnering and Distribution* …

Learn more

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate …

Learn more