-
Managing Cisco Network Security, 2nd Edition
Author Syngress
An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world"There's no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Sy....
Release Date 2002/05 -
Author Pravir Chandra , Matt Messier , John Viega
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol fo....
Release Date 2002/06 -
Author Henry S. Warren
"This is the first book that promises to tell the deep, dark secrets of computer arithmetic, and it delivers in spades. It contains every trick I knew plus many, many more. A godsend for library developers, compiler writers, and lovers of elegant hacks, it deserves ....
Release Date 2002/07 -
Web Hacking: Attacks and Defense
Author Shreeraj Shah , Saumil Shah , Stuart McClure
"Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, paymen....
Release Date 2002/08 -
Sniffer Pro Network Optimization & Troubleshooting Handbook
Author Syngress
Sniffer Network Optimization and Troubleshooting Handbook introduces the reader to the vast functionality of the suite of Sniffer Solutions from Network Associates but ultimately focuses on the affordable and most widely used Sniffer Product - Sniffer Pro LAN Networ....
Release Date 2002/08 -
SyncML®: Synchronizing and Managing Your Mobile Data
Author Phillipe Kahn , Peter Thompson , Apratim Purakayastha , Riku Mettälä , Uwe Hansmann
Discover SyncML, the new global standard for synchronizing virtually any mobile deviceCovers both the technical and business issuesCovers personal and enterprise applications, new mobile services, security, device management, and moreIncludes practical guidance for ....
Release Date 2002/09 -
Fire Your Stock Analyst! Analyzing Stocks on Your Own
Author Harry Domash
In Fire Your Stock Analyst!, San Francisco Chronicle investment columnist Harry Domash presents a start-to-finish approach to stock selection that draws on winning techniques from the world's top money managers, uses readily available information, and is easy to im....
Release Date 2002/09 -
Maximum Accessibility: Making Your Web Site More Usable for Everyone
Author Ph.D. John M. Slatin , Sharron Rush
Accessibility is now a legal requirement for all national government Web sites in the U.S., Canada, Australia, and the European Union. Throughout the world, many other organizations--universities, schools, and private companies--are recognizing that accessibility is....
Release Date 2002/09 -
Author Lance Spitzner
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute"One of the great byproducts of Lance's work with honeypots and honeynets is that he....
Release Date 2002/09 -
Pause & Effect: The Art of Interactive Narrative
Author Mark Stephen Meadows
Interactive narrative is the cornerstone for many forms of digital media: web sites, interface design, gaming environments, and even artificial intelligence. In Pause & Effect, Mark Stephen Meadows examines the intersection of storytelling, visual art, and inter....
Release Date 2002/09 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
From Idiocy to Mental Deficiency
Author David Wright , Anne Dig
From Idiocy to Mental Deficiency is the first book devoted to the social history of people with learning disabilities in Britain. Approaches to learning disabilities have changed dramatically in recent years. The implementation of 'Care in the Community', the camp....
Release Date 2002/09 -
Author Chris P. Underwood
This important new book bridges the gap between works on classical control and process control, and those dealing with HVAC control at a more elementary level, which generally adopt a qualitative and descriptive control. Both advanced level students and specialist p....
Release Date 2002/09 -
Author Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protoc....
Release Date 2002/10 -
Advanced CISSP Prep Guide: Exam Q&A
Author Russell Dean Vines , Ronald L. Krutz
Get ready to pass the CISSP exam and earn your certification with this advanced test guideUsed alone or as an in-depth supplement to the bestselling The CISSP Prep Guide, this book provides you with an even more intensive preparation for the CISSP exam. With the hel....
Release Date 2002/10 -
Newnes Guide to Digital TV, 2nd Edition
Author Richard Brice
The second edition has been updated with all the key developments of the past three years, and includes new and expanded sections on digital video interfaces, DSP, DVD, video servers, automation systems, HDTV, 8-VSB modulation and the ATSC system. Richard Bric....
Release Date 2002/10 -
Author Roberta Bragg - CISSP
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multip....
Release Date 2002/11 -
Mobile Location Services: The Definitive Guide
Author Andrew Jagoe
The first comprehensive guide to building and deploying mobile location-based servicesDetailed coverage of mobile location servers, client platforms, protocols, and standardsMapping, geocoding, mobile positioning, security, personalization, privacy, and moreForeword....
Release Date 2002/12 -
The Practice of Network Security: Deployment Strategies for Production Environments
Author Allan CISSP Liska
Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and fo....
Release Date 2002/12 -
Firewalls and Internet Security: Repelling the Wily Hacker, Second Edition
Author Aviel D. Rubin , Steven M. Bellovin , William R. Cheswick
The best-selling first edition of Firewalls and Internet Security became the bible of Internet security by showing a generation of Internet security experts how to think about threats and solutions. This completely updated and expanded second edition defines the sec....
Release Date 2003/02 -
Auditing Information Systems, Second Edition
Author Jack J. Champlain
Have you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing compu....
Release Date 2003/02 -
Author Tom Clark
Designing Storage Area Networks, Second Edition, succinctly captures the key technologies that are driving the storage networking industry. Tom Clark's works are helping to educate the IT community to the benefits and challenges of shared storage and are recommende....
Release Date 2003/03 -
Read Me First!: A Style Guide for the Computer Industry, Second Edition
Author Sun Technical Publications
The must-have reference for every technical writer, editor, and documentation manager—now fully updated!Read Me First! is the definitive guide to creating technical documentation that is clear, consistent, and easy to understand. Sun Microsystems' award-winning tec....
Release Date 2003/05 -
Maximizing The Enterprise Information Assets
Author Christine Sevilla , Timothy Wells
The ramifications of this new Information Age are still not well understood. Most businesses do not know how to turn their information into a beneficial capital asset. Unfortunately, their focus has been almost exclusively on technology, while human and manag....
Release Date 2003/05 -
The CISM™ Prep Guide: Mastering the Five Domains of Information Security Management
Author Russell Dean Vines , Ronald L. Krutz
Prepares readers for the Certified Information Security Manager (CISM) exam, ISACA's new certification that launches in June 2003CISM is business-oriented and intended for the individual who must manage, design, oversee, and assess an enterprise's information secu....
Release Date 2003/05 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Modern Cryptography: Theory and Practice
Author Wenbo Mao
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for applicat....
Release Date 2003/07 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
Incident Response & Computer Forensics, 2nd Ed.
Author Chris Prosise , Kevin Mandia
Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book s....
Release Date 2003/07 -
Digital Logic Testing and Simulation, 2nd Edition
Author Alexander Miczo
Your road map for meeting today's digital testing challengesToday, digital logic devices are common in products that impact public safety, including applications in transportation and human implants. Accurate testing has become more critical to reliability, safety,....
Release Date 2003/07