Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


1. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 16-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...

2. 

Security Policies and Implementation Issues

Security Policies and Implementation Issues

By: Robert Johnson; Mark Merkow

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 10-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! The study of information system security concepts and domains is an essential part of the education of computer science students and professionals alike. Security Policies and Implementation Issues offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. It presents an effective balance between technical knowledge and soft skills, and introduces many different concepts of information...

3. 

Network Security: Private Communication in a Public World, Second Edition

Network Security: Private Communication in a Public World, Second Edition

By: Charlie Kaufman; Radia Perlman; Mike Speciner

Publisher: Prentice Hall

Publication Date: 22-APR-2002

Insert Date: 04-MAY-2008

Slots: 1.0

Table of Contents • Start Reading

The classic guide to network security—now fully updated!"Bob and Alice are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security, the first edition of Network Security received critical acclaim for its lucid and witty explanations of the inner workings of network security protocols. In the second edition, this most distinguished of author teams draws on hard-won experience to explain the latest developments in this field that has become so critical to our global network-dependent society. Network Security, Second Edition brings together...

4. 

Legal Issues in Information Security

Legal Issues in Information Security

By: Joanna Lyn Grama

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 18-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Legal Issues in Information Security addresses the area where law and information security concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous information security and privacy responses into their daily operations...

5. 

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

The CERT® Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud)

By: Dawn M. Cappelli; Andrew P. Moore; Randall F. Trzeciak

Publisher: Addison-Wesley Professional

Publication Date: 24-JAN-2012

Insert Date: 25-JAN-2012

Slots: 1.0

Table of Contents • Start Reading

Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider Threats describes CERT’s findings in practical terms, offering specific guidance and countermeasures that can be immediately applied by executives, managers, security officers, and operational staff within any private, government, or military organization. The authors systematically address...

6. 

Managing Risk in Information Systems

Managing Risk in Information Systems

By: Darril Gibson

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 12-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP� Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management,...

7. 

Security in Computing, Fourth Edition

Security in Computing, Fourth Edition

By: Charles P.Pfleeger Consulting Group Pfleeger; Shari LawrenceRAND Corporation Pfleeger

Publisher: Prentice Hall

Publication Date: 13-OCT-2006

Insert Date: 04-NOV-2006

Slots: 1.0

Table of Contents • Start Reading

The New State-of-the-Art in Information Security: Now Covers the Economics of Cyber Security and the Intersection of Privacy and Information Security For years, IT and security professionals and students have turned to Security in Computing as the definitive guide to information about computer security attacks and countermeasures. In their new fourth edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer...

8. 

Cisco ISE for BYOD and Secure Unified Access

Cisco ISE for BYOD and Secure Unified Access

By: Jamey Heary; Aaron Woland

Publisher: Cisco Press

Publication Date: 10-JUN-2013

Insert Date: 12-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through...

9. 

Cassandra: The Definitive Guide

Cassandra: The Definitive Guide

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 22-NOV-2010

Insert Date: 28-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

The rising popularity of Apache Cassandra rests on its ability to handle very large data sets that include hundreds of terabytes -- and that's why this distributed database has been chosen by organizations such as Facebook, Twitter, Digg, and Rackspace. With this hands-on guide, you'll get all the details and practical examples you need to understand Cassandra's non-relational database design and put it to work in a production environment.Author Eben Hewitt (Java SOA Cookbook) pays special attention to data modeling, and demonstrates Cassandra's many advantages, including its high...

10. 

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition

By: Catherine Paquet

Publisher: Cisco Press

Publication Date: 30-NOV-2012

Insert Date: 24-FEB-2012

Slots: 1.0

Table of Contents • Start Reading

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA® Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco® networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security...

11. 

Network Security, Firewalls, and VPNs

Network Security, Firewalls, and VPNs

By: J. Michael Stewart

Publisher: Jones & Bartlett Learning

Publication Date: 15-SEP-2010

Insert Date: 07-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Network Security, Firewalls, and VPNs provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to...

12. 

Kali Linux Cookbook

Kali Linux Cookbook

By: Willie L. Pritchett; David De Smet

Publisher: Packt Publishing

Publication Date: 15-OCT-2013

Insert Date: 18-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Over 70 recipes to help you master Kali Linux for effective penetration security testing Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike In Detail In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to...

13. 

Computer and Information Security Handbook, 2nd Edition

Computer and Information Security Handbook, 2nd Edition

By: John R. Vacca; John R. Vacca

Publisher: Morgan Kaufmann

Publication Date: 05-NOV-2012

Insert Date: 25-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors’ respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed...

14. 

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems...

15. 

The Modern Introduction to Computer Security: Understand Threats, Identify Their Causes, and Implement Effective Countermeasures Analyzing Computer Security is a fresh, modern, and relevant introduction to computer security. Organized around today’s key attacks, vulnerabilities, and countermeasures, it helps you think critically and creatively about computer security–so you can prevent serious problems and mitigate those that still occur. In this new book, renowned security and software engineering experts Charles Pfleeger and Shari Lawrence Pfleeger—authors of the classic Security in...

16. 

Hacking Exposed ™ 7: Network Security Secrets & Solutions

Hacking Exposed ™ 7: Network Security Secrets & Solutions

By: Stuart McClure; Joel Scambray; George Kurtz

Publisher: McGraw-Hill

Publication Date: 03-AUG-2012

Insert Date: 20-JUL-2012

Slots: 1.0

Table of Contents • Start Reading

A fully updated edition of the world’s bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key...

17. 

Pro ASP.NET Web API Security: Securing ASP.NET Web API

Pro ASP.NET Web API Security: Securing ASP.NET Web API

By: Badrinarayanan Lakshmiraghavan

Publisher: Apress

Publication Date: 27-MAR-2013

Insert Date: 10-APR-2013

Slots: 1.0

Table of Contents • Start Reading

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP. With such wide accessibility, securingyour code effectively needs to be a top priority. You will quickly find that the WCF security protocols you're familiar with from .NET (WS-* and similar)are less suitable than they once were in this new environment; proving themselves cumbersome and limited in...

18. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

19. 

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their...

20. 

Information Security The Complete Reference, Second Edition

Information Security The Complete Reference, Second Edition

By: Mark Rhodes-Ousley

Publisher: McGraw-Hill

Publication Date: 03-APR-2013

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Develop and implement an effective end-to-end security programToday’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. ...