Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Network Administration


1. 

Network Security: Private Communication in a Public World, Second Edition

Network Security: Private Communication in a Public World, Second Edition

By: Charlie Kaufman; Radia Perlman; Mike Speciner

Publisher: Prentice Hall

Publication Date: 22-APR-2002

Insert Date: 04-MAY-2008

Slots: 1.0

Table of Contents • Start Reading

The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together...

2. 

Network Management: Principles and Practice

Network Management: Principles and Practice

By: Mani Subramanian; Timothy A. Gonsalves; N. Usha Rani

Publisher: Pearson Education India

Publication Date: 01-JAN-2010

Insert Date: 21-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

This book covers broadband network management and the latest trends in the network management technology and standards. ...

3. 

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

By: 

Publisher: Addison-Wesley Professional

Publication Date: 24-JUN-2009

Insert Date: 30-JAN-2009

Slots: 1.0

Table of Contents • Start Reading

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”    –Nate Miller, Cofounder, Stratum Security The Only Definitive Guide to New State-of-the-Art Techniques in Intrusion Detection and Prevention Recently, powerful innovations in intrusion detection and prevention have evolved in response to emerging threats and changing business environments. However, security practitioners have found little reliable, usable information about these new IDS/IPS technologies. In Practical Intrusion Analysis, one of the field’s leading experts...

4. 

CCIE Professional Development Series Network Security Technologies and Solutions

CCIE Professional Development Series Network Security Technologies and Solutions

By: Yusuf CCIE No. 9305 Bhaiji

Publisher: Cisco Press

Publication Date: 20-MAR-2008

Insert Date: 25-JAN-2008

Slots: 1.0

Table of Contents • Start Reading

CCIE Professional DevelopmentNetwork Security Technologies and SolutionsA comprehensive, all-in-one reference for Cisco network securityYusuf Bhaiji, CCIE No. 9305Network Security Technologies and Solutions is a comprehensive reference to the most cutting-edge security products and methodologies available to networking professionals today. This book helps you understand and implement current, state-of-the-art network security technologies to ensure secure communications throughout the network infrastructure.With an easy-to-follow approach, this book serves as a central repository of security...

5. 

Implementing Kerberos in a WebSphere Application Server Environment

Implementing Kerberos in a WebSphere Application Server Environment

By: Fabio Albertoni; Henry Cui; Elisa Ferracane; James Kochuba; Ut Le; Bill O'Donnell; Gustavo Cezar de Medeiros Paiva; Vipin Rathor; Grzegorz Smolko; Rengan Sundararaman; Tam Tran

Publisher: IBM Redbooks

Publication Date: 22-OCT-2009

Insert Date: 26-FEB-2010

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication discusses Kerberos technology with IBM WebSphere® Application Server V7.0.0.5 on distributed platforms. IBM WebSphere Application Server V7.0.0.5 Kerberos Authentication and single sign-on (SSO) features enable interoperability and identity propagation with other applications (such as .NET, DB2®, and others) that support the Kerberos authentication mechanism. With this feature, a user can log in once and then can access other applications that support Kerberos Authentication without having to log in a second time. It provides an SSO, end-to-end interoperability...

6. 

CWNA®: Certified Wireless Network Administrator Official Study Guide

CWNA®: Certified Wireless Network Administrator Official Study Guide

By: 

Publisher: Sybex

Publication Date: 06-APR-2009

Insert Date: 21-MAR-2010

Slots: 1.0

Table of Contents • Start Reading

Sybex is now the official publisher for CWNP, the certifying vendor for the CWNA program. This valuable guide covers all objectives for the newest version of the PW0-104 exam, including radio technologies; antenna concepts; wireless LAN hardware and software; network design, installation and management; wireless standards and organizations; 802.11 network architecture; wireless LAN security; performing site surveys; and troubleshooting. Also included are hands-on exercises, chapter review questions, a detailed glossary, and a pre-assessment test. The CD-ROM features two bonus exams, over...

7. 

A Practical Guide to Trusted Computing

A Practical Guide to Trusted Computing

By: 

Publisher: IBM Press

Publication Date: 27-DEC-2007

Insert Date: 09-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes that possible by providing a complete, open industry standard for implementing trusted computing hardware subsystems in PCs. Already available from virtually every leading PC manufacturer, TPM gives software professionals powerful new ways to protect their customers. Now, there’s a start-to-finish guide for every software...

8. 

Jay Beale’s Open Source Security Series: Wireshark & Ethereal Network Protocol Analyzer Toolkit

Jay Beale’s Open Source Security Series: Wireshark & Ethereal Network Protocol Analyzer Toolkit

By: Angela Orebaugh; Gilbert Ramirez; Jay Beale

Publisher: Syngress

Publication Date: 01-SEP-2006

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Ethereal Network Protocol Analyzer Toolkit provides the reader with a completely integrated book and companion Web site to analyze network traffic using Ethereal, the world's most popular network protocol analyzer on Windows, Unix, and Apple OS X. This book covers everything from the fundamentals of protocol analysis, to analyzing real world malicious code to programming advanced protocol dissectors. The companion Web site for the book offers dozens of working tools and scripts created for this book. This book provides complete information and step-by-step Instructions for analyzing protocols...

9. 

Computer Crime, Investigation, and the Law

Computer Crime, Investigation, and the Law

By: Chuck Easttom; Jeffrey Taylor Det.

Publisher: Course Technology PTR

Publication Date: 01-APR-2010

Insert Date: 16-APR-2010

Slots: 1.0

Table of Contents • Start Reading

One can hardly open a newspaper or read news online without seeing another story about a computer-related crime. We are awash in identity theft, online child predators, and even cyber espionage. It seems overwhelming. And people in many different professions find themselves involved with computer-crime investigations. Obviously, law-enforcement officers are involved, but so are network administrators, technical-support personnel, and attorneys. If any aspect of your work brings you into contact with computer crime, Computer Crime, Investigation, and the Law is for you. It begins with a...

10. 

Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

By: Chris Hurley

Publisher: Syngress

Publication Date: 12-OCT-2007

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. . Perform Network Reconnaissance Master the...

11. 

Network Security: Know It All

Network Security: Know It All

By: James Joshi

Publisher: Morgan Kaufmann

Publication Date: 16-MAY-2008

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Network Security: Know It All explains the basics, describes the protocols, and discusses advanced topics, by the best and brightest experts in the field of network security. Assembled from the works of leading researchers and practitioners, this best-of-the-best collection of chapters on network security and survivability is a valuable and handy resource. It consolidates content from the fields leading experts while creating a one-stop-shopping opportunity for readers to access the information only otherwise available from disparate sources. * Chapters contributed by recognized...

12. 

Cisco Secure Firewall Services Module (FWSM)

Cisco Secure Firewall Services Module (FWSM)

By: Ray CCIE No. 7050 Blair; Arvind CCIE No. 7016 Durai

Publisher: Cisco Press

Publication Date: 29-AUG-2008

Insert Date: 19-JUN-2008

Slots: 1.0

Table of Contents • Start Reading

Cisco Secure Firewall Services Module (FWSM) Best practices for securing networks with FWSM Ray Blair, CCIE® No. 7050 Arvind Durai, CCIE No. 7016 The Firewall Services Module (FWSM) is a high-performance stateful-inspection firewall that integrates into the Cisco® 6500 switch and 7600 router chassis. The FWSM monitors traffic flows using application inspection engines to provide a strong level of network security. The FWSM defines the security parameter and enables the enforcement of security policies through authentication, access control lists, and protocol inspection. The FWSM is a...

13. 

Security Log Management

Security Log Management

By: 

Publisher: Syngress

Publication Date: 01-JAN-2006

Insert Date: 01-JUN-2006

Slots: 1.0

Table of Contents • Start Reading

As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that...

14. 

How to Cheat at IT Project Management

How to Cheat at IT Project Management

By: 

Publisher: Syngress

Publication Date: 01-SEP-2005

Insert Date: 09-FEB-2006

Slots: 1.0

Table of Contents • Start Reading

Project Management Made Fast and Easy for IT Professionals Unlike any other book you'll find, this IT project management book synthesizes project management fundamentals, IT processes and procedures, and business fundamentals. Learn how to align your IT projects to the company's strategic objectives. Also learn how to determine which project will solve the right problem at the right time while still delivering high-quality results. You'll become an expert in fine-tuning the work process to ensure projects are completed on time, under budget, and with the required functionality and...

15. 

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine

By: 

Publisher: The USENIX Association

Publication Date: 09-APR-2007

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Cfengine is a free software package for automating the configuration and maintenance of networked computers. Its purpose is to implement policy-based configuration management. A System Engineer's Guide to Host Configuration and Maintenance Using Cfengine describes all aspects of using Cfengine 2. Beginning with the fundamentals of Cfengine itself, the booklet takes you though the policies, shows you how to build an infrastructure. It then covers host monitoring and anomaly detection, as well as the management process. Finally, the booklet provides case studies and sample policies and a...

16. 

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

By: 

Publisher: John Wiley & Sons

Publication Date: 21-APR-2008

Insert Date: 29-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you'll be able to take action. ...

17. 

Ethereal Packet Sniffing

Ethereal Packet Sniffing

By: ;

Publisher: Syngress

Publication Date: 01-FEB-2004

Insert Date: 24-APR-2004

Slots: 1.0

Table of Contents • Start Reading

Ethereal is the premier Open Source protocol analyzer for Windows and Unix, and was recently voted the #2 most popular open source security tool of any kind. This is the first book available on Ethereal, which like most open source tools is extremely popular yet almost completely undocumented. 100,000 new copies of Ethereal are downloaded and installed every month....

18. 

Microsoft® ISA Server 2006 Unleashed

Microsoft® ISA Server 2006 Unleashed

By: 

Publisher: Sams

Publication Date: 03-DEC-2007

Insert Date: 12-DEC-2007

Slots: 1.0

Table of Contents • Start Reading

ISA Server 2006 is a robust application layer firewall that provides organizations with the ability to secure critical business infrastructure from the exploits and threats of the modern computing world. ISA’s ability to act as an edge firewall, a Virtual Private Networking solution, a reverse proxy server, or a content caching device give it unprecedented flexibility and position it as a valuable security tool for many types of organizations. ISA Server 2006 Unleashed provides insight into the inner workings of the product, as well as providing best-practice advice on design and...

19. 

CompTIA Security+ Certification

CompTIA Security+ Certification

By: Axzo Press

Publisher: ILT

Publication Date: 14-OCT-2008

Insert Date: 29-APR-2009

Slots: 1.0

Table of Contents • Start Reading

This ILT Series course, rated 4.9/5.0 in overall quality by ProCert Labs, will prepare students to pass the CompTIA Security+ 2008 certification exam. After taking this course, students will understand the field of network security and how it relates to other areas of information technology. This course also provides the broad-based knowledge necessary to prepare for further study in specialized security fields, or it can serve as a capstone course that gives a general introduction to the field. Comes with CertBlaster exam prep software (download). ...

20. 

Building a Logging Infrastructure

Building a Logging Infrastructure

By: 

Publisher: The USENIX Association

Publication Date: 14-NOV-2004

Insert Date: 20-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

This booklet describes how to build an infrastructure to collect, preserve, and extract useful information from your computer operating system and application logs. We will focus primarily on UNIX syslog, with some discussion of Windows logging and other sources of log data. Logfiles hold a wealth of information, from resource utilization diagnostics to problems with hardware and software, security problems, and forensic traces of intrusions. Unfortunately, there's an awful lot of information in log files, and it's not well organized or codified. Formats of messages, even timestamps, vary...