Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Network Administration


1. 

Network Management: Principles and Practice

Network Management: Principles and Practice

By: Mani Subramanian; Timothy A. Gonsalves; N. Usha Rani

Publisher: Pearson Education India

Publication Date: 01-JAN-2010

Insert Date: 21-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

This book covers broadband network management and the latest trends in the network management technology and standards. ...

2. 

CWNA®: Certified Wireless Network Administrator Official Study Guide

CWNA®: Certified Wireless Network Administrator Official Study Guide

By: 

Publisher: Sybex

Publication Date: 06-APR-2009

Insert Date: 21-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802.11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over...

3. 

Security Log Management

Security Log Management

By: 

Publisher: Syngress

Publication Date: 01-JAN-2006

Insert Date: 01-JUN-2006

Slots: 1.0

Table of Contents • Start Reading

As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that...

4. 

Building a Logging Infrastructure

Building a Logging Infrastructure

By: 

Publisher: The USENIX Association

Publication Date: 14-NOV-2004

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This booklet describes how to build an infrastructure to collect, preserve, and extract useful information from your computer operating system and application logs. We will focus primarily on UNIX syslog, with some discussion of Windows logging and other sources of log data. Logfiles hold a wealth of information, from resource utilization diagnostics to problems with hardware and software, security problems, and forensic traces of intrusions. Unfortunately, there's an awful lot of information in log files, and it's not well organized or codified. Formats of messages, even timestamps, vary...

5. 

Blackjacking

Blackjacking

By: 

Publisher: John Wiley & Sons

Publication Date: 30-APR-2007

Insert Date: 07-MAR-2008

Slots: 1.0

Table of Contents • Start Reading

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has held a low priority. Now, a certified ethical hacker explains in this book why this must change and how to change it. Packed with sobering examples of actual attacks, this unique resource shows you how to mount your counterattack....

6. 

Implementing Kerberos in a WebSphere Application Server Environment

Implementing Kerberos in a WebSphere Application Server Environment

By: Fabio Albertoni; Henry Cui; Elisa Ferracane; James Kochuba; Ut Le; Bill O'Donnell; Gustavo Cezar de Medeiros Paiva; Vipin Rathor; Grzegorz Smolko; Rengan Sundararaman; Tam Tran

Publisher: IBM Redbooks

Publication Date: 22-OCT-2009

Insert Date: 26-FEB-2010

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication discusses Kerberos technology with IBM WebSphere® Application Server V7.0.0.5 on distributed platforms. IBM WebSphere Application Server V7.0.0.5 Kerberos Authentication and single sign-on (SSO) features enable interoperability and identity propagation with other applications (such as .NET, DB2®, and others) that support the Kerberos authentication mechanism. With this feature, a user can log in once and then can access other applications that support Kerberos Authentication without having to log in a second time. It provides an SSO, end-to-end interoperability...

7. 

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

By: 

Publisher: The USENIX Association

Publication Date: 09-APR-2007

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Cfengine is a free software package for automating the configuration and maintenance of networked computers. Its purpose is to implement policy-based configuration management. A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine describes all aspects of using Cfengine 2. Beginning with the fundamentals of Cfengine itself, the booklet takes you though the policies, shows you how to build an infrastructure. It then covers host monitoring and anomaly detection, as well as the management process. Finally, the booklet provides case studies and sample policies and a...

8. 

Configuration Management with Bcfg2

Configuration Management with Bcfg2

By: 

Publisher: The USENIX Association

Publication Date: 10-NOV-2008

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Configuration is the medium in which system administrators work. Ranging from the most sweeping decisions to minor troubleshooting of software problems, the act of helping people use computers necessitates a stream of decisions that result in the configuration and software infrastructures that each of us uses on a daily basis. Configuration management is a process whereby administrator interactions with configuration are streamlined and simplified. As the scale of infrastructures grows and the complexity of software systems increases, the cost of system administration rises rapidly....

9. 

Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law

By: Chuck Easttom; Jeffrey Taylor Det.

Publisher: Course Technology PTR

Publication Date: 01-APR-2010

Insert Date: 16-APR-2010

Slots: 1.0

Table of Contents • Start Reading

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a...

10. 

CompTIA Security+ Certification

CompTIA Security+ Certification

By: Axzo Press

Publisher: ILT

Publication Date: 14-OCT-2008

Insert Date: 29-APR-2009

Slots: 1.0

Table of Contents • Start Reading

This ILT Series course, rated 4.9/5.0 in overall quality by ProCert Labs, will prepare students to pass the CompTIA Security+ 2008 certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field. Comes with CertBlaster exam prep software (download). ...

11. 

Ethereal Packet Sniffing

Ethereal Packet Sniffing

By: ;

Publisher: Syngress

Publication Date: 01-FEB-2004

Insert Date: 24-APR-2004

Slots: 1.0

Table of Contents • Start Reading

Ethereal is the premier Open Source protocol analyzer for Windows and Unix, and was recently voted the #2 most popular open source security tool of any kind. This is the first book available on Ethereal, which like most open source tools is extremely popular yet almost completely undocumented. 100,000 new copies of Ethereal are downloaded and installed every month....

12. 

How to Cheat at IT Project Management

How to Cheat at IT Project Management

By: 

Publisher: Syngress

Publication Date: 01-SEP-2005

Insert Date: 09-FEB-2006

Slots: 1.0

Table of Contents • Start Reading

Project Management Made Fast and Easy for IT Professionals Unlike any other book you'll find, this IT project management book synthesizes project management fundamentals, IT processes and procedures, and business fundamentals. Learn how to align your IT projects to the company's strategic objectives. Also learn how to determine which project will solve the right problem at the right time while still delivering high-quality results. You'll become an expert in fine-tuning the work process to ensure projects are completed on time, under budget, and with the required functionality and...

13. 

Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants

Innovative Automatic Identification and Location-Based Services: From Bar Codes to Chip Implants

By: Katina Michael; M.G. Michael

Publisher: IGI Global

Publication Date: 31-MAR-2009

Insert Date: 30-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

Innovative Automatic Identification & Location-Based Services: From Bar Codes to Chip Implants emphasizes the convergence and trajectory of automatic identification and location-based services toward chip implants and real-time positioning capabilities. This book also discusses the social, cultural, and ethical implications of the technological possibilities with respect to national security initiatives. ...

14. 

SSH: kurz & gut

SSH: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-OCT-2006

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Wenn Daten Ihren Rechner verlassen und sich ungeschützt auf den Weg durchs Internet machen, sind sie permanent in Gefahr, von unbefugten Dritten abgefangen und gelesen zu werden. SSH, die Secure Shell, bietet eine zuverlässige Lösung für zahlreiche Probleme der Netzwerksicherheit: SSH sichert den Anmeldevorgang auf entfernten Systemen und den Dateitransfer zwischen verschiedenen Rechnern, ermöglicht die Erzeugung geschützter "Tunnel" sowie die gesicherte Ausführung von Prozessen auf anderen Computern. Die zweite Auflage von SSH - kurz & gut behandelt die Protokollversion 2, ihre freie...

15. 

Network Security Hacks

Network Security Hacks

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 26-APR-2004

Insert Date: 21-APR-2004

Slots: 1.0

Table of Contents • Start Reading

To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks...

16. 

IBM Content Analytics Version 2.1: Discovering Actionable Insight from Your Content

IBM Content Analytics Version 2.1: Discovering Actionable Insight from Your Content

By: Wei-Dong (Jackie) Zhu; Asako Iwai; Todd Leyba; Josemina Magdalen; Tetsuya Nasukawa; Nitaben (Nita) Patel; Kei Sugano

Publisher: IBM Redbooks

Publication Date: 25-AUG-2010

Insert Date: 02-OCT-2010

Slots: 1.0

Table of Contents • Start Reading

With IBM® Content Analytics Version 2.1, you can unlock the value of unstructured content and gain new business insight. IBM Content Analytics Version 2.1 provides a robust interface for exploratory analytics of unstructured content. It empowers a new class of analytical applications that use this content. Plus it provides enterprises with tools to better identify new revenue opportunities, improve customer satisfaction, and provide early problem detection. To help you achieve the most from your unstructured content (also referred as textual content), this IBM Redbooks® publication provides...

17. 

IMS Version 11 Technical Overview

IMS Version 11 Technical Overview

By: Paolo Bruni; Angelique Greenhaw; Juan Jesus Iniesta Martinez; Egide Van Aerschot; Andrew Wilkinson

Publisher: IBM Redbooks

Publication Date: 27-OCT-2009

Insert Date: 26-FEB-2010

Slots: 1.0

Table of Contents • Start Reading

IMS™ provides leadership in performance, reliability and security to help you implement the most strategic and critical enterprise applications. IMS also keeps pace with the evolving IT industry. Information Management System Version 11 (IMS 11) provides an open, integrated, and distributed data access solution; improves connectivity and ease of use; increases system availability; and offers an architectural road map that supports future growth. With IMS 11, a suite of Universal drivers supports IMS database programmatic access with Type-4 and Type-2 connectivity. You can now access IMS...

18. 

System Configuration

System Configuration

By: 

Publisher: The USENIX Association

Publication Date: 30-JUN-2006

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This booklet is aimed squarely at the working system administrator; it aims to explain clearly the various facets of the system configuration problem and to describe how these relate to current tools and future research. Understanding underlying configuration principles will help system administrators use "best practice" in applying current configuration tools and procedures; these are often very flexible, and it is all too easy to negate the advantages presented by a perfectly good tool. Descriptions of the various facets of the configuration problem should also help provide system...

19. 

OpenVPN: kurz & gut

OpenVPN: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-JUL-2007

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Virtuelle Private Netzwerke bauen einen Tunnel zwischen zwei Rechnern auf, durch den jeglicher Datenverkehr verschlüsselt fließt. Sie sind aus dem modernen Arbeitsleben nicht mehr wegzudenken und bieten beispielsweise externen Mitarbeitern die Möglichkeit, von außen über einen sicheren VPN-Zugang auf das Firmennetzwerk zuzugreifen. OpenVPN ist ein freies Client/Server-VPN-Programm, das die Daten mit SSL verschlüsselt und das für alle gängigen Plattformen verfügbar ist.M Sven Riedel erklärt, wie man OpenVPN auf den verschiedenen Betriebssystemen installiert, und stellt die grundlegenden...

20. 

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

By: 

Publisher: John Wiley & Sons

Publication Date: 21-APR-2008

Insert Date: 29-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you'll be able to take action. ...