Illustration

Biographie et livres de Russ Rogers

Découvrez tout l'univers de l'auteur en livre numérique
Russ Rogers (CISSP, CISM, IAM, IEM, Hon. Sc.D.), author of the popular "Hacking a Terror Network: The Silent Threat of Covert Channels" (Syngress, ISBN: 978-1-928994-98-5), co-author of multiple books, including the best-selling "Stealing the Network: How to Own a Continent" (Syngress, ISBN: 978-1-931836-05-0) and "Network Security Evaluation Using the NSA IEM" (Syngress, ISBN: 978-1-59749-035-1), and former editor-in-chief of The Security Journal, is currently a penetration tester for a federal
Découvrez tous ses livres

Dernière parution

Téléchargez le livre :  The Hacker's Guide to OS X
The Hacker's Guide to OS X

Alijohn Ghassemlouei , Robert Bathurst , Russ Rogers


Syngress

2012-12-31

epub sans DRM

Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel,...

41,09

En savoir plus
Télécharger le livre :  Nessus Network Auditing
The Updated Version of the Bestselling Nessus Book. This is the ONLY Book to Read if You Run Nessus Across the Enterprise. Ever since its beginnings in early 1998, the Nessus Project has attracted security researchers from all walks of life. It continues this growth...

Editeur : Syngress
Parution : 2011-10-13
PDF, epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  WarDriving and Wireless Penetration Testing
Wireless networking has become standard in many business and government networks. This book is the first book that focuses on the methods used by professionals to perform WarDriving and wireless pentration testing.Unlike other wireless networking and security books that...

Editeur : Syngress
Parution : 2006-11-08
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Network Security Evaluation Using the NSA IEM
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the...

Editeur : Syngress
Parution : 2005-08-26
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Hacking a Terror Network: The Silent Threat of Covert Channels
Written by a certified Arabic linguist from the Defense Language Institute with extensive background in decoding encrypted communications, this cyber-thriller uses a fictional narrative to provide a fascinating and realistic "insider's look" into technically...

Editeur : Syngress
Parution : 2005-01-27
PDF sans DRM

34,76

Téléchargement immédiat
Dès validation de votre commande