🚀 We’re in Beta!

Meet our new design. Everything works as usual, but if anything feels off, give us a ping.

Timeless Syngress Publishing Classics Reimagined

Indulge in iconic and innovative Syngress Publishing items curated just for you.

How to Cheat at Managing Windows Server Update Services

How to Cheat at Managing Windows Server Update Services

$18
The Real Citrix Cca Exam Preparation Kit: Prepare for Xenapp 5.0

The Real Citrix Cca Exam Preparation Kit: Prepare for Xenapp 5.0

$122
Journey to the Center of the Internet: Now Showing in 3D

Journey to the Center of the Internet: Now Showing in 3D

4.7
$27
Cisco Security Specialists Guide to PIX Firewall

Cisco Security Specialists Guide to PIX Firewall

$51
Designing and Building Security Operations Center

Designing and Building Security Operations Center

$82
Firewall Administration Professional CD: ISA Server, Check Point, PIX, Ethereal

Firewall Administration Professional CD: ISA Server, Check Point, PIX, Ethereal

BSD160
Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

Hiding Behind the Keyboard: Uncovering Covert Communication Methods with Forensic Analysis

$144
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy (Syngress Basics Series)

4.3
$84
Syngress Publishing Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

Syngress Publishing Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

4.5
$122
The Best Damn Windows Server 2003 Book Period

The Best Damn Windows Server 2003 Book Period

$52
The Best Damn Firewall Book Period

The Best Damn Firewall Book Period

$110
Professional Penetration Testing: Creating and Learning in a Hacking Lab

Professional Penetration Testing: Creating and Learning in a Hacking Lab

$247
Scene of the Cybercrime

Scene of the Cybercrime

$186
Configuring Windows 2000 without Active Directory

Configuring Windows 2000 without Active Directory

$22
Operating System Forensics

Operating System Forensics

4.7
$242
E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

4.5
$34
Automating Open Source Intelligence: Algorithms for OSINT

Automating Open Source Intelligence: Algorithms for OSINT

4.7
$57
Troubleshooting Windows 2000 TCP/IP

Troubleshooting Windows 2000 TCP/IP

$108
CISSP (R) Study Guide (Syngress) Paperback – Import, 1 December 2022

CISSP (R) Study Guide (Syngress) Paperback – Import, 1 December 2022

4.8
$84
Consumers Guide to Cell Phones and Wireless Service Plans

Consumers Guide to Cell Phones and Wireless Service Plans

$28
Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security)

Nessus Network Auditing: Jay Beale Open Source Security Series (Jay Beale's Open Source Security)

$22
Ruby Developers Guide

Ruby Developers Guide

$89
Cisco Security Specialists Guide to PIX Firewall

Cisco Security Specialists Guide to PIX Firewall

$94
Check Point Next Generation with Application Intelligence Security Administration

Check Point Next Generation with Application Intelligence Security Administration

$6
E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

E-Mail Virus Protection Handbook: Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks

$148
Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

Cyber Spying Tracking Your Family's (Sometimes) Secret Online Lives

$52
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry

4.4
$211
Practical Lock Picking: A Physical Penetration Tester's Training Guide

Practical Lock Picking: A Physical Penetration Tester's Training Guide

4.7
$61
Seven Deadliest Web Application Attacks

Seven Deadliest Web Application Attacks

$79
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools

$133
Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

Network Intrusion Analysis: Methodologies, Tools, and Techniques for Incident Analysis and Response

$66
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking: Tools and Techniques to Attack the Web

$118
Syngress Publishing Hacking and Penetration Testing with Low Power Devices

Syngress Publishing Hacking and Penetration Testing with Low Power Devices

$218
Network Security Assessment: from Vulnerability to Patch

Network Security Assessment: from Vulnerability to Patch

$195
A Guide to Kernel Exploitation: Attacking the Core

A Guide to Kernel Exploitation: Attacking the Core

4.5
$130
Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

Rick Gallahers MPLS Training Guide: Building Multi Protocol Label Switching Networks

$83
Coding for Penetration Testers: Building Better Tools

Coding for Penetration Testers: Building Better Tools

$64
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

$45
Syngress Force Emerging Threat Analysis: From Mischief to Malicious

Syngress Force Emerging Threat Analysis: From Mischief to Malicious

$65
Securing the Internet of Things

Securing the Internet of Things

$77
The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice Paperback – Illustrated, 24 September 2013

The Basics of Cloud Computing: Understanding the Fundamentals of Cloud Computing in Theory and Practice Paperback – Illustrated, 24 September 2013

3.8
$70
Hardware Hacking: Have Fun While Voiding Your Warranty by Grand, Joe, Mitnick, Kevin D., Russell, Ryan published by Syngress Media,U.S. (2004)

Hardware Hacking: Have Fun While Voiding Your Warranty by Grand, Joe, Mitnick, Kevin D., Russell, Ryan published by Syngress Media,U.S. (2004)

BSD14
The Basics of IT Audit: Purposes, Processes, and Practical Information

The Basics of IT Audit: Purposes, Processes, and Practical Information

$97
The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments

The IT Regulatory and Standards Compliance Handbook: How to Survive Information Systems Audit and Assessments

$188
Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

Applied Cyber Security and the Smart Grid: Implementing Security Controls into the Modern Power Infrastructure

4.3
$221
Developing .Net Web Services With XML

Developing .Net Web Services With XML

$53
Managed Code Rootkits: Hooking Into Runtime Environments

Managed Code Rootkits: Hooking Into Runtime Environments

$54
Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

Advanced Persistent Security: A Cyberwarfare Approach to Implementing Adaptive Enterprise Protection, Detection, and Reaction Strategies

4.7
$234
How to Cheat at Windows System Administration Using Command Line Scripts

How to Cheat at Windows System Administration Using Command Line Scripts

$68
10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour

10 Cool Lego Mindstorm Robotics Invention System 2 Projects: Amazing Projects You Can Build in Under an Hour

10
$145
Xbox 360 Forensics: A Digital Forensics Guide to Examining Artifacts

Xbox 360 Forensics: A Digital Forensics Guide to Examining Artifacts

4.3
$69
Securing Citrix XenApp Server in the Enterprise

Securing Citrix XenApp Server in the Enterprise

$89
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

4.6
$61
Hack Proofing Sun Solaris 8

Hack Proofing Sun Solaris 8

$66
Ruby Developers Guide

Ruby Developers Guide

$67
Firewall Policies and VPN Configurations

Firewall Policies and VPN Configurations

$108
Configuring IPv6 For Cisco IOS

Configuring IPv6 For Cisco IOS

$19
Designing A Wireless Network

Designing A Wireless Network

$22
Troubleshooting Windows 2000 TCP/IP

Troubleshooting Windows 2000 TCP/IP

$75
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

Cisco Security Professional's Guide to Secure Intrusion Detection Systems

$70
Hack Proofing ColdFusion

Hack Proofing ColdFusion

$170
Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations

Google Earth Forensics: Using Google Earth Geo-Location in Digital Forensic Investigations

$110
.NET Mobile Web Developers Guide

.NET Mobile Web Developers Guide

$42
Cyber Security and IT Infrastructure Protection

Cyber Security and IT Infrastructure Protection

4.6
$219
Designing SQL Server 2000 Databases

Designing SQL Server 2000 Databases

$59
Configuring Symantec AntiVirus Enterprise Edition

Configuring Symantec AntiVirus Enterprise Edition

5
BSD26
Next Generation Red Teaming

Next Generation Red Teaming

$129
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

4.5
$95
Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

Assessing Vendors: A Hands-On Guide to Assessing Infosec and IT Vendors

$89
Job Reconnaissance: Using Hacking Skills to W

Job Reconnaissance: Using Hacking Skills to W

$110
SQL Injection Attacks and Defense

SQL Injection Attacks and Defense

$144
Applied Network Security Monitoring: Collection, Detection, and Analysis

Applied Network Security Monitoring: Collection, Detection, and Analysis

$49
Configuring Symantec AntiVirus Enterprise Edition

Configuring Symantec AntiVirus Enterprise Edition

$137
Practical Anonymity: Hiding in Plain Sight Online

Practical Anonymity: Hiding in Plain Sight Online

$79