Related Publications

Biometrics Technology Today

Biometric Technology Today is the most established source of authoritative news, analysis, features and surveys on the international biometrics market. Published ten times a year, it is committed to providing unbiased, intelligent comment as well as extensive and fully researched worldwide news coverage on all aspects of the biometrics market. For more information or to download a sample copy, go to

Card Technology Today 

Card Technology Today, published 10 times a year, provides focused coverage of the events that are shaping the international smart card industry. As well as providing news, analysis and comment, and key feature articles from around the world, it provides in-depth reports and surveys on all of the key areas of smart card technology and applications, ideal for use when making informed business decisions. For more information or to download a sample copy, go to

Computer Fraud and Security

 Computer Fraud & Security has grown with the fast-moving information technology industry and has earned a reputation for editorial excellence with IT security practitioners around the world.  Every month Computer Fraud & Security enables you to see the threats to your IT systems before they become a problem. It focuses on providing practical, usable information to effectively manage and control computer and information security within commercial organizations. For more information or to download a sample copy, go to

Network Security

Network Security is devoted to solving your network security problems in system-specific detail, now with even more news, information and solutions to your network security problems. Filtering through the hype of non-stop vulnerability alerts and new malware, Network Security gives you the real threats to your enterprise. For more information or to download a sample copy, go to

Computer Law and Security Report (CLSR)

 The Computer Law and Security Review (CLSR) is an international journal of technology law and practice providing a major platform for publication of high quality research, policy and legal analysis within the field of IT law and computer security. Published six times a year, the journal provides a robust peer reviewed platform and policy forum for dissemination of knowledge, analysis and discussion, supported by a powerful Editorial and Professional Board and, through its Editor-in-Chief, more than 25 years publishing experience in the field. For more information go to

Digital Investigation

The Journal of Digital Investigation covers cutting edge developments in digital forensics and incident response from around the globe. This widely referenced publication helps digital investigators remain current on new technologies, useful tools, relevant research, investigative techniques, and methods for handling security breaches. For more information go to

Information Security Technical Report

Information Security Technical Report is a quarterly technical report, focused on a specific topic. It is aimed at senior information security managers, who need to gain a better understanding of current information security issues and solutions, and provides 'off-the shelf' consultancy from professional researchers and practitioners. For more information go to


Computers & Security

Computers & Security is the most respected technical journal in the IT security field. Now in its 21st year, with a new editorial board and new regular features and columns, the journal is essential reading for IT security professionals around the world. It is aimed at the professional involved with computer security, audit, control and data integrity in all sectors - industry, commerce and academia.  For more information go to


IT Security books from Syngress

SQL Injection Attacks and Defense
June 09, £29.99
ISBN: 978-1-59749-424-3

Key Features:
• Only book to provide a complete understanding of SQL injection, from the basics of vulnerability to discovery, exploitation, prevention, and mitigation measures
• Covers unique, publicly unavailable SQL injection information by technical experts in such areas as Oracle and Microsoft SQL Server
• Written by an established expert, author, and speaker in the field, with contributions from a team of equally renowned creators of SQL injection tools, applications, and educational materials
Readership: Penetration testers, IT security consultants and practitioners, and web/software developers

Cisco Router and Switch Forensics
June 09, £29.99
ISBN: 978-1-59749-418-2

Key Features:
• The only book devoted to forensic analysis of routers and switches, focusing on the operating system that runs the vast majority of network devices in the enterprise and on the Internet
• Outlines the fundamental differences between router forensics and traditional forensics, a critical distinction for responders in an investigation targeting network activity
• Details where network forensics fits within the entire process of an investigation, end to end, from incident response and data collection to preparing a report and legal testimony
Readership: Digital forensic investigators and security professionals

The Real MCTS SQL Server 2008 Exam 70-432 Prep Kit
May 09, £32.99
ISBN: 978-1-59749-420-5

Key Features:
• This is the ‘Real’ Microsoft Exam Prep Kit, and provides the reader with independent and unbiased exam tips and warnings - everything they need to know to ensure certification success
• Complete study package ensures user success with Syngress proven pedagogy, test engine, and podcasts and Power Points
• SQL Server 2008 is the latest update Microsoft’s flagship database and is the largest update since SQL Server 2005
Readership: Systems or database administrators seeking to certify in or upgrade their certification to Microsoft SQL Server 2008

Windows Forensic Analysis DVD Toolkit
July 09, £34.99
ISBN: 978-1-59749-422-9

Key Features:
• The most comprehensive and thorough resource on incident response and forensic analysis of Windows systems available.
• This book covers both live and post-mortem response collection and analysis methodologies, addressing material that is applicable to law enforcement, the government, students, and consultants.
Readership: Digital forensic investigators, IT security professionals, engineers, and system administrators

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×