-
Author Tom Thomas
Your first step into the world of network securityNo security experience requiredIncludes clear and easily understood explanationsMakes learning easyYour first step to network security begins here!Learn about hackers and their attacksUnderstand security tools and te....
Release Date 2004/05 -
Author Mark Burnett
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code d....
Release Date 2004/05 -
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)
Author John F. Roland
Cisco authorized self-study book for CCSP 642-501 foundation learningIdentify the lineup of Cisco Systems network security products and enumerate the components of a complete security policyUse Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement ....
Release Date 2004/04 -
Author Chris McNab
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of sy....
Release Date 2004/03 -
Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
Author Hans B. Sparbel
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security concepts, communications security, infrastructure security, basics of cryptography, and operation/organizational security. Security+ is taught at Excel....
Release Date 2004/03 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
Malicious Cryptography: Exposing Cryptovirology
Author Moti Yung , Adam Young
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subver....
Release Date 2004/02 -
Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide
Author Dameon D. Welch-Abernathy
"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from ....
Release Date 2004/01 -
Hardware Hacking Projects for Geeks
Author Scott Fullam
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and....
Release Date 2004/01 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01 -
CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition
Author Behzad Behtash
Cisco authorized self-study book for CCSP 642-521 foundation learningGain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and moreLearn the ins and outs of the PIX product family and its complete feature setUse the PIX....
Release Date 2004/01 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
Biometrics for Network Security
Author Paul Reid
The complete guide to implementing biometric security solutions for your networkNetwork security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers t....
Release Date 2003/12 -
Malware: Fighting Malicious Code
Author Lenny Zeltser , Ed Skoudis
Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's thre....
Release Date 2003/11 -
CSI Exam Cram™ 2 (Exam 642-541)
Author Annlee Hines
Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic!Industry experts expect the CCSP to be one of the most popular certifications in 2003.The CSI exam is the fifth and final exam required to obtain a CCS....
Release Date 2003/11 -
Official Samba-3 HOWTO and Reference Guide, The
Author Jelmer R. Vernooij , John H. Terpstra
"The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of SambaThe practical, authoritative, step-by-st....
Release Date 2003/10 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Author Samir Palnitkar
Design Verification with eSamir PalnitkarWritten for both experienced and new users, DesignVerification with e gives you a broadcoverage of e. It stresses the practical verification perspective of e rather than emphasizing only itslanguage aspects.This book—Introduc....
Release Date 2003/09 -
Effective Incident Response Team, The
Author Brian Moeller , Julie Lucas
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing com....
Release Date 2003/09 -
Author Valeria Sokal , Alvaro Sala , Rama Ayyar , Dave Lovelace
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many of us have used VSAM and work with VSAM data sets daily, but exactly how it works and why we use it instead of another access method is a mystery. This book helps to demy....
Release Date 2003/09 -
The Architectural Expression of Environmental Control Systems
Author George Baird
The Architectural Expression of Environmental Control Systems examines the way project teams can approach the design and expression of both active and passive environmental control systems in a more creative way. Using seminal case studies from around the world and ....
Release Date 2003/09 -
Modern Cryptography: Theory and Practice
Author Wenbo Mao
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for applicat....
Release Date 2003/07 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Digital Logic Testing and Simulation, 2nd Edition
Author Alexander Miczo
Your road map for meeting today's digital testing challengesToday, digital logic devices are common in products that impact public safety, including applications in transportation and human implants. Accurate testing has become more critical to reliability, safety,....
Release Date 2003/07 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Read Me First!: A Style Guide for the Computer Industry, Second Edition
Author Sun Technical Publications
The must-have reference for every technical writer, editor, and documentation manager—now fully updated!Read Me First! is the definitive guide to creating technical documentation that is clear, consistent, and easy to understand. Sun Microsystems' award-winning tec....
Release Date 2003/05 -
Maximizing The Enterprise Information Assets
Author Christine Sevilla , Timothy Wells
The ramifications of this new Information Age are still not well understood. Most businesses do not know how to turn their information into a beneficial capital asset. Unfortunately, their focus has been almost exclusively on technology, while human and manag....
Release Date 2003/05 -
The CISM™ Prep Guide: Mastering the Five Domains of Information Security Management
Author Russell Dean Vines , Ronald L. Krutz
Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information secu....
Release Date 2003/05 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03