-
MySpace Unraveled: A Parent’s Guide to Teen Social Networking from the Directors of BlogSafety.com
Author Anne Collier , Larry Magid
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience f....
Release Date 2006/08 -
Author W. Curtis Preston
Data is the lifeblood of modern business, and modern data centers have extremely demanding requirements for size, speed, and reliability. Storage Area Networks (SANs) and Network Attached Storage (NAS) allow organizations to manage and back up huge file systems quic....
Release Date 2002/02 -
Author Thomas Akin
As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco ro....
Release Date 2002/02 -
Secure Coding: Principles and Practices
Author Kenneth R. van Wyk , Mark G. Graff
Practically every day, we read about a new type of attack on computer systems and networks. Viruses, worms, denials of service, and password sniffers are attacking all types of systems -- from banks to major e-commerce sites to seemingly impregnable government and ....
Release Date 2003/06 -
Author Pravir Chandra , Matt Messier , John Viega
Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol fo....
Release Date 2002/06 -
Hardware Hacking Projects for Geeks
Author Scott Fullam
Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and....
Release Date 2004/01 -
Author Jonathan Hassell
The subject of security never strays far from the minds of IT workers, for good reason. If there is a network with even just one connection to another network, it needs to be secured. RADIUS, or Remote Authentication Dial-In User Service, is a widely deployed protoc....
Release Date 2002/10 -
Secure Programming Cookbook for C and C++
Author Matt Messier , John Viega
Password sniffing, spoofing, buffer overflows, and denial of service: these are only a few of the attacks on today's computer systems and networks. At the root of this epidemic is poorly written, poorly tested, and insecure code that puts everyone at risk. Clearly,....
Release Date 2003/07 -
Author Anton Chuvakin , Cyrus Peikari
When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find ou....
Release Date 2004/01 -
Author Chris McNab
There are hundreds--if not thousands--of techniques used to compromise both Windows and Unix-based systems. Malicious code and new exploit scripts are released on a daily basis, and each evolution becomes more and more sophisticated. Keeping up with the myriad of sy....
Release Date 2004/03 -
Author Justin Clarke , Nitesh Dhanjani
If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. ....
Release Date 2005/04 -
SSH, The Secure Shell: The Definitive Guide, 2nd Edition
Author Robert G. Byrnes , Richard E. Silverman , Daniel J. Barrett
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implement....
Release Date 2005/05 -
Author Dave Mabe
The BlackBerry has become an invaluable tool for those of us who need to stay connected and in the loop. But most people take advantage of only a few features that this marvelous communications device offers. What if you could do much more with your BlackBerry than ....
Release Date 2005/10 -
Network Security Hacks, 2nd Edition
Author Andrew Lockhart
In the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alar....
Release Date 2006/10 -
Web 2.0: Principles and Best Practices
Author John Musser
Web 2.0 Principles and Best Practices
Release Date 2006/11 -
Author Michael Morrison
Wish your BlackBerry 7100 had come with a little more meat in the owner's manual? BlackBerry 7100 In a Snap is your wish come true. This task-oriented guide goes well beyond the BlackBerry 7100 owner's manual and guides you through its devices using practical usag....
Release Date 2005/07 -
Linux Firewalls, Third Edition
Author Robert Ziegler , Steve Suehring
An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation--from home use to enterprise level--might take to protect itself from potential remote attackers. As with the first t....
Release Date 2005/09 -
Inside Network Security Assessment: Guarding Your IT Infrastructure
Author David Kim , Michael Gregg
As an IT professional, you need to know how to perform network security assessments. Inside Network Security Assessment: Guarding Your IT Infrastructure is a collection of utilities and templates that will take you through the assessment process. Written by two high....
Release Date 2005/11 -
Author David LeBlanc , Kevin Lam , Ben Smith
Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques—straight from members of the Microsoft Security Team.
Release Date 2004/07 -
Author Lawrence Landauer , Tom Gallagher , Bryan Jeffries
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before your softwa....
Release Date 2006/06 -
Security Development Lifecycle
Author Steve Lipner , Michael Howard
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security exp....
Release Date 2006/06 -
Author Eric Cole
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are ver....
Release Date 2001/08 -
Pause & Effect: The Art of Interactive Narrative
Author Mark Stephen Meadows
Interactive narrative is the cornerstone for many forms of digital media: web sites, interface design, gaming environments, and even artificial intelligence. In Pause & Effect, Mark Stephen Meadows examines the intersection of storytelling, visual art, and inter....
Release Date 2002/09 -
Extending Your Business to Mobile Devices with IBM Worklight
Author Susan Hanson , Leonardo Olivera , Kearan McPherson , Christian Kirsch , Hossam Kator
The mobile industry is evolving rapidly. An increasing number of mobile devices, such as smartphones and tablets, are sold every year and more people are accessing services from a mobile device than ever before. For an enterprise, this can mean that a growing number....
Release Date 2013/08 -
IBM Information Governance Solutions
Author Sandeep Shah , Erik A O'neill , Marc Haber , Christopher Giardina , Gary Brunell
Managing information within the enterprise has always been a vital and important task to support the day-to-day business operations and to enable analysis of that data for decision making to better manage and grow the business for improved profitability. To do all t....
Release Date 2014/04 -
Information Governance Principles and Practices for a Big Data Landscape
Author Harald Smith , Barry Rosen , Bill Plants , Ivan Milman , Tom Jesionowski , Cindy Comp
This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape.As organizations embark on new use cases, such as Big Data Exploration....
Release Date 2014/03 -
Author Valeria Sokal , Alvaro Sala , Rama Ayyar , Dave Lovelace
Virtual Storage Access Method (VSAM) is one of the access methods used to process data. Many of us have used VSAM and work with VSAM data sets daily, but exactly how it works and why we use it instead of another access method is a mystery. This book helps to demy....
Release Date 2003/09 -
TICSA TruSecure™ ICSA Certified Security Associate Exam TU0-001
Author Shawn Porter , Debra Littlejohn Shinder , Mike Chapple
TICSA (TruSecure ICSA Computer Security Associate) is a popular new entry-level computer security certification aimed at individuals with 2 or more years of computer security experience or training equivalent to 48 hours in a 24 month period. TICSA represents base l....
Release Date 2002/09 -
Author Roberta Bragg - CISSP
The CISSP (Certified Information Systems Security Professionals) exam is a six-hour, monitored paper-based exam covering 10 domains of information system security knowledge, each representing a specific area of expertise. The CISSP examination consists of 250 multip....
Release Date 2002/11 -
CSI Exam Cram™ 2 (Exam 642-541)
Author Annlee Hines
Security is Cisco's top priority in 2003 and few other resources are available for exam preparation on this topic!Industry experts expect the CCSP to be one of the most popular certifications in 2003.The CSI exam is the fifth and final exam required to obtain a CCS....
Release Date 2003/11