IT-eBooks.directory Facebook Icon Image IT-eBooks.directory Google Plus Icon Image IT-eBooks.directory Twitter Icon Image
IT-eBooks.directory Logo Image

Download Free Syngress eBooks


Windows Performance Analysis Field Guide Image

Windows Performance Analysis Field Guide

Aug 12 2016  Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to What would Microsoft support do? when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate p...

Information Hiding in Speech Signals for Secure Communication Image

Information Hiding in Speech Signals for Secure Communication

Aug 12 2016  In the digital world, the need to protect communications increases every day. While traditional digital encryption methods are useful, there are many other options for hiding your information. Information Hiding in Speech Signals for Secure Communication provides a number of methods to hide secret speech information using a variety of digital speech coding standards. Professor Zhijun Wu has conducted years of research in the field of speech information hiding, and brings his state-of-the-art techniques to readers of this book, including a mathematical model for information hiding, the core con...

Cyber Reconnaissance, Surveillance and Defense Image

Cyber Reconnaissance, Surveillance and Defense

Aug 12 2016  At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describes ...

Cyber Crime and Cyber Terrorism Investigator's Handbook Image

Cyber Crime and Cyber Terrorism Investigator's Handbook

Aug 12 2016  Cyber Crime and Cyber Terrorism Investigator's Handbook is a vital tool in the arsenal of today's computer programmers, students, and investigators. As computer networks become ubiquitous throughout the world, cyber crime, cyber terrorism, and cyber war have become some of the most concerning topics in today's security landscape. News stories about Stuxnet and PRISM have brought these activities into the public eye, and serve to show just how effective, controversial, and worrying these tactics can become. Cyber Crime and Cyber Terrorism Investigator's Handbook describes and analyzes many of t...

How to Attack and Defend Your Website Image

How to Attack and Defend Your Website

Jun 30 2016  How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools - most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the ...

IT-eBooks.directory