-
Author Samir Palnitkar
Design Verification with eSamir PalnitkarWritten for both experienced and new users, DesignVerification with e gives you a broadcoverage of e. It stresses the practical verification perspective of e rather than emphasizing only itslanguage aspects.This book—Introduc....
Release Date 2003/09 -
Effective Incident Response Team, The
Author Brian Moeller , Julie Lucas
When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing com....
Release Date 2003/09 -
Author Valeria Sokal , Alvaro Sala , Rama Ayyar , Dave Lovelace
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many of us have used VSAM and work with VSAM data sets daily, but exactly how it works and why we use it instead of another access method is a mystery. This book helps to demy....
Release Date 2003/09 -
The Architectural Expression of Environmental Control Systems
Author George Baird
The Architectural Expression of Environmental Control Systems examines the way project teams can approach the design and expression of both active and passive environmental control systems in a more creative way. Using seminal case studies from around the world and ....
Release Date 2003/09 -
Official Samba-3 HOWTO and Reference Guide, The
Author Jelmer R. Vernooij , John H. Terpstra
"The breadth of technical information provided in this book ensures that even the most demanding of administrators will find something they need." --Andrew Tridgell, President of the Samba Team and the original author of SambaThe practical, authoritative, step-by-st....
Release Date 2003/10 -
Designing Network Security Second Edition
Author Merike Kaeo
A practical guide to creating a secure network infrastructureUnderstand basic cryptography and security technologiesIdentify the threats and common attacks to a network infrastructureLearn how to create a security policyFind out how to recover from a security breach....
Release Date 2003/10 -
Malware: Fighting Malicious Code
Author Lenny Zeltser , Ed Skoudis
Reveals how attackers install malicious code and how they evade detectionShows how you can defeat their schemes and keep your computers and network safe!Details viruses, worms, backdoors, Trojan horses, RootKits, and other threatsExplains how to handle today's thre....
Release Date 2003/11 -
CSI Exam Cram™ 2 (Exam 642-541)
Author Annlee Hines
Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic!Industry experts expect the CCSP to be one of the most popular certifications in 2003.The CSI exam is the fifth and final exam required to obtain a CCS....
Release Date 2003/11 -
Biometrics for Network Security
Author Paul Reid
The complete guide to implementing biometric security solutions for your networkNetwork security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers t....
Release Date 2003/12 -
Essential Check Point™ FireWall-1® NG: An Installation, Configuration, and Troubleshooting Guide
Author Dameon D. Welch-Abernathy
"When it comes to security products and technologies, experience is far and away the best teacher. PhoneBoy has been installing, running, and supporting Check Point FireWall-1 for years, and his experience shows in this book. Save yourself the pain of learning from ....
Release Date 2004/01 -
Hardware Hacking Projects for Geeks
Author Scott Fullam
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and....
Release Date 2004/01 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01 -
CCSP Self-Study: Cisco Secure PIX Firewall Advanced (CSPFA), Second Edition
Author Behzad Behtash
Cisco authorized self-study book for CCSP 642-521 foundation learningGain proficiency with new features of PIX Firewall version 6.3, including OSPF, 802.1Q VLANs, NAT-T, and moreLearn the ins and outs of the PIX product family and its complete feature setUse the PIX....
Release Date 2004/01 -
The Manager's Pocket Guide to Diversity Management
Author Dr. Edward E. Hubbard
This pocket guide will teach you the skills required to effectively manage a diverse workplace—not because it's the "right thing to do" or your organization requires it, but because it is good for business. Gain diversity awareness, tools, knowledge and techniques ....
Release Date 2004/01 -
CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS)
Author Earl Carter
Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policiesReview techniques applicable to both network- and host-based platformsReview the security wheel concepts and apply security to AVVID using the SAFE BlueprintInstall and c....
Release Date 2004/02 -
Malicious Cryptography: Exposing Cryptovirology
Author Moti Yung , Adam Young
Hackers have uncovered the dark side of cryptography—that device developed to defeat Trojan horses, viruses, password theft, and other cyber-crime. It's called cryptovirology, the art of turning the very methods designed to protect your data into a means of subver....
Release Date 2004/02 -
Author Chris McNab
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of sy....
Release Date 2004/03 -
Security+ Practice Questions Exam Cram 2 (Exam SYO-101)
Author Hans B. Sparbel
The Security+ exam certifies that candidates have demonstrated the aptitude and ability to master general security concepts, communications security, infrastructure security, basics of cryptography, and operation/organizational security. Security+ is taught at Excel....
Release Date 2004/03 -
CCSP Self-Study: Securing Cisco IOS Networks (SECUR)
Author John F. Roland
Cisco authorized self-study book for CCSP 642-501 foundation learningIdentify the lineup of Cisco Systems network security products and enumerate the components of a complete security policyUse Cisco Secure ACS for Windows and Cisco Secure ACS for UNIX to implement ....
Release Date 2004/04 -
Author Tom Thomas
Your first step into the world of network securityNo security experience requiredIncludes clear and easily understood explanationsMakes learning easyYour first step to network security begins here!Learn about hackers and their attacksUnderstand security tools and te....
Release Date 2004/05 -
Author Mark Burnett
Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code d....
Release Date 2004/05 -
Author Michael J. Panzner
To survive in the jungle, you must recognize thesubtle nuances that signal danger and opportunity. That's how it is inthe stock market, too. But the market's radically changed: followyesterday's signals and you'll get eaten alive. The New Laws of theStock Market....
Release Date 2004/06 -
Author Peter Senge , Don Frick
Meet the man whose work influenced some of the world's most prominent business leaders and spawned a worldwide movement that is still gaining strength today. Robert Greenleaf's landmark 1970 essay, The Servant as Leader, introduced the now common term “servan....
Release Date 2004/06 -
Weirdos in the Workplace: The New Normal… Thriving in the Age of the Individual
Author John Putzier - M.S. , SPHR
“The author has hit on something here; particularly the fact that it is high time we quit thinking that treating everyone the same is somehow fair. Like it or not, the realities uncovered in this book are just that...real! And if you plan to be a significant player....
Release Date 2004/07 -
Windows Forensics and Incident Recovery
Author Harlan Carvey
Praise for Windows Forensics and Incident Recovery"Windows Forensics and Incident Recovery doesn't just discuss forensics, it also includes tools for analysis and shows readers how to use them. I look forward to putting these tools through their paces, and I recomm....
Release Date 2004/07 -
The Tao of Network Security Monitoring Beyond Intrusion Detection
Author Richard Bejtlich
"The book you are about to read will arm you with the knowledge you need to defend your network from attackers—both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners ....
Release Date 2004/07 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
Cisco Network Design Solutions for Small-Medium Businesses
Author Peter Rybaczyk
Maximize the potential of your small-medium business network with effective design solutions that cover network security, IP telephony, unified communications, wireless networks, and CRM.Design and implement effective network solutions by mastering the design proces....
Release Date 2004/08 -
Cisco Router Firewall Security
Author Richard A. Deal
Harden perimeter routers with Cisco firewall functionality and features to ensure network securityDetect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniquesUse Network-Based Application Re....
Release Date 2004/08 -
Author James S. Tiller
This book explains the methodologies, framework, and "unwritten conventions" that ethical hacks should employ to provide the maximum value to organizations that want to harden their security. It goes beyond the technical aspects of penetration testing to address th....
Release Date 2004/09