انتشارات Syngress Pub

The Basics of IT Audit: Purposes, Processes, and Practical Information
Stephen D. Gantz, 2013
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
Henry Dalziel, Ajin Abraham, 2015
Cloud Storage Forensics
Darren Quick, 2013
Seven Deadliest Microsoft Attacks
Rob Kraus, Brian Barber, Mike Borkin, Naomi Alpern, 2010
Digital Forensics Processing and Procedures: Meeting the Requirements of ISO 17020, ISO 17025, ISO 27001 and Best Practice Requirements
David Lilburn Watson, Andrew Jones, 2013
The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice
Steve Winterfeld, Jason Andress, 2012
Federated Identity Primer
Derrick Rountree, 2012
Managing Information Security
John R. Vacca (editor), 2013
Windows Performance Analysis Field Guide
Clint Huffman, 2014
The Basics of IT Audit: Purposes, Processes, and Practical Information (Basics (Syngress))
Stephen D. Gantz, 2013
Cloud Storage Forensics
Darren Quick, Ben Martini, Raymond Choo, 2013
Information Security Analytics: Finding Security Insights, Patterns, and Anomalies in Big Data
Mark Talabis, Robert McPherson, Inez Miyamoto, Jason Martin, 2014
Cyber Crime and Cyber Terrorism Investigator's Handbook
Babak Akhgar (editor), Andrew Staniforth (editor), Francesca Bosco (editor), 2014
The Cloud Security Ecosystem: Technical, Legal, Business and Management Issues
Ryan Ko, Raymond Choo, 2015
How to Define and Build an Effective Cyber Threat Intelligence Capability
Henry Dalziel, Eric Olson (editor), James Carnall (editor), 2014
Mobile Data Loss: Threats and Countermeasures
Michael T. Raggo, 2015
A Machine-Learning Approach to Phishing Detection and Defense
O.A. Akanbi, Iraj Sadegh Amiri, E. Fazeldehkordi, 2014
Next Generation Red Teaming
Henry Dalziel, 2015
Infosec Management Fundamentals
Henry Dalziel, 2015
Securing Social Media in the Enterprise
Henry Dalziel, 2015
Deploying Secure Containers for Training and Development
Jon Schipp, Henry Dalziel, 2015
Automated Security Analysis of Android and iOS Applications with Mobile Security Framework
Henry Dalziel, Ajin Abraham, 2015