Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


21. 

Mobile Device Security For Dummies

Mobile Device Security For Dummies

By: 

Publisher: For Dummies

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate...

22. 

Information Security: Principles and Practice, 2nd Edition

Information Security: Principles and Practice, 2nd Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAY-2011

Insert Date: 07-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a...

23. 

Penetration Testing with BackBox

Penetration Testing with BackBox

By: Stefan Umit Uygur

Publisher: Packt Publishing

Publication Date: 20-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

An introductory guide to performing crucial penetration testing operations using Backbox Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies In Detail BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and...

24. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

25. 

Network Security Through Data Analysis

Network Security Through Data Analysis

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 21-FEB-2014

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques....

26. 

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

By: Michael Howard; David LeBlanc; John Viega

Publisher: McGraw-Hill Osborne Media

Publication Date: 03-SEP-2009

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover...

27. 

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

By: Antonio Ruiz-Martinez; Rafael Marin-Lopez; Fernando Pereniguez-Garcia

Publisher: IGI Global

Publication Date: 30-SEP-2013

Insert Date: 30-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...

28. 

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

By: Himanshu Kumar

Publisher: Packt Publishing

Publication Date: 24-JAN-2014

Insert Date: 29-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing Successfully install Nessus and configure scanning options Learn useful tips based on real-world issues faced during scanning Use Nessus for compliance checks In Detail IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most...

29. 

Advances in Secure Computing, Internet Services, and Applications

Advances in Secure Computing, Internet Services, and Applications

By: B.K. Tripathy; D.P. Acharjya

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems. Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and developers, who...

30. 

Security Program and Policies: Principles and Practices, Second Edition

Security Program and Policies: Principles and Practices, Second Edition

By: Sari Greene

Publisher: Pearson Certification

Publication Date: 19-MAR-2014

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you...

31. 

Security and Trust in Online Social Networks

Security and Trust in Online Social Networks

By: Barbara Carminati; Elena Ferrari; Marco Viviani

Publisher: Morgan & Claypool Publishers

Publication Date: 01-DEC-2013

Insert Date: 18-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

The enormous success and diffusion that online social networks (OSNs) are encountering nowadays is vastly apparent. Users' social interactions now occur using online social media as communication channels; personal information and activities are easily exchanged both for recreational and business purposes in order to obtain social or economic advantages. In this scenario, OSNs are considered critical applications with respect to the security of users and their resources, for their characteristics alone: the large amount of personal information they manage, big economic upturn connected to...

32. 

Mobile Platform Security

Mobile Platform Security

By: N. Asokan; Lucas Davi; Alexandra Dmitrienko; Stephan Heuser

Publisher: Morgan & Claypool Publishers

Publication Date: 01-DEC-2013

Insert Date: 18-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Recently, mobile security has garnered considerable interest in both the research community and industry due to the popularity of smartphones. The current smartphone platforms are open systems that allow application development, also for malicious parties. To protect the mobile device, its user, and other mobile ecosystem stakeholders such as network operators, application execution is controlled by a platform security architecture. This book explores how such mobile platform security architectures work. We present a generic model for mobile platform security architectures: the model...

33. 

Kali Linux Social Engineering

Kali Linux Social Engineering

By: Rahul Singh Patel

Publisher: Packt Publishing

Publication Date: 24-DEC-2013

Insert Date: 27-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Effectively perform efficient and organized social engineering tests and penetration testing using Kali Learn about various attacks and tips and tricks to avoid them Get a grip on efficient ways to perform penetration testing. Use advanced techniques to bypass security controls and remain hidden while performing social engineering testing In Detail Kali Linux has a specific toolkit that incorporates numerous social-engineering attacks all into one simplified interface. The main purpose of SET (social engineering toolkit) is to automate and improve on many of the social...

34. 

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E, 2nd Edition

Hacking Exposed Unified Communications & VoIP Security Secrets & Solutions 2/E, 2nd Edition

By: Mark Collier; David Endler

Publisher: McGraw-Hill Osborne Media

Publication Date: 25-NOV-2013

Insert Date: 27-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

The latest techniques for averting UC disaster “This book is a must-read for any security professional responsible for VoIP or UC infrastructure. This new edition is a powerful resource that will help you keep your communications systems secure.” —Dan York, Producer and Co-Host, Blue Box: The VoIP Security Podcast “The original edition, Hacking Exposed: Voice over IP Secrets & Solutions , provided a valuable resource for security professionals. But since then, criminals abusing VoIP and UC have become more sophisticated and prolific, with some high-profile cases ringing up huge...

35. 

Android Security Cookbook

Android Security Cookbook

By: Keith Makan; Scott Alexander-Bown

Publisher: Packt Publishing

Publication Date: 23-DEC-2013

Insert Date: 24-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Practical recipes to delve into Android’s security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems Develop custom vulnerability assessment tools using the Drozer Android Security Assessment Framework Reverse-engineer Android applications for security vulnerabilities Protect your Android application with up to date hardening techniques In Detail The Android operating system is built...

36. 

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

Enterprise Single Sign-On Design Guide Using IBM Security Access Manager for Enterprise Single Sign-On 8.2

By: Axel Buecker; Nilesh Patel; Dirk Rahnenfuehrer; Joris Van Herzele

Publisher: IBM Redbooks

Publication Date: 11-SEP-2012

Insert Date: 17-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Everyone feels the pain of too many passwords to remember. Everyone can relate to the security exposure of weak passwords, chosen for convenience. And, everyone can relate to passwords placed in proximity to the workstation for a quick reminder. Unfortunately, that note can allow more than the intended user into the system and network. The average user today often has four or more passwords. And, security policies that focus on password complexity and password-change frequency can cause even more difficulty for users. This IBM® Redbooks® publication introduces IBM Security Access...

37. 

Monitoring with Opsview

Monitoring with Opsview

By: Alan Wijntje

Publisher: Packt Publishing

Publication Date: 13-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Leverage the power of Opsview to effectively monitor your physical, virtual, and private cloud infrastructure Add plugins to Windows and Linux agents Set up vSphere monitoring successfully Easy to follow, step-by-step guide on how to get your Opsview system up and running In Detail Monitoring increasingly complex IT environments can pose quite a challenge. Virtualization and cloud-based applications are finding their way into many IT estates over the world. Keeping a watchful eye out for your infrastructure is now more important than ever, and Opsview allows you to do...

38. 

Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3

Handbook of Information Security: Threats, Vulnerabilities, Prevention, Detection, and Management, Volume 3

By: 

Publisher: John Wiley & Sons

Publication Date: 03-JAN-2006

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare. ...

39. 

Identity and Access Management

Identity and Access Management

By: Ertem Osmanoglu

Publisher: Syngress

Publication Date: 19-NOV-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Identity and Access Management: Controlling Your Network provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a proven step-by-step method for deploying IAM that has been used successfully in over 200 deployments. The book also provides reusable templates and source code examples in Java, XML, and SPML. Focuses on real-word implementations Provides end-to-end coverage of IAM from business drivers,...

40. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 16-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...