Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Security


1. 

Hacking with Kali

Hacking with Kali

By: James Broad; Andrew Bindner

Publisher: Syngress

Publication Date: 05-DEC-2013

Insert Date: 14-DEC-2013

Slots: 1.0

Table of Contents • Start Reading

Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you through creating a custom version of the Kali live distribution. You’ll learn how to configure networking components, storage devices and system services such as DHCP and web services. Once you're familiar with the basic components of the software, you'll learn how to use Kali through the phases of the penetration testing...

2. 

Managing Risk in Information Systems

Managing Risk in Information Systems

By: Darril Gibson

Publisher: Jones & Bartlett Learning

Publication Date: 25-OCT-2010

Insert Date: 12-NOV-2010

Slots: 1.0

Table of Contents • Start Reading

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Managing Risk in Information Systems provides a unique, in-depth look at how to manage and reduce IT associated risks. Written by an industry expert, this book provides a comprehensive explanation of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Using examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management,...

3. 

Cisco ISE for BYOD and Secure Unified Access, Video Enhanced Edition

Cisco ISE for BYOD and Secure Unified Access, Video Enhanced Edition

By: Jamey Heary; Aaron Woland

Publisher: Cisco Press

Publication Date: 10-JUN-2013

Insert Date: 12-APR-2013

Slots: 1.0

Table of Contents • Start Reading

Plan and deploy identity-based secure access for BYOD and borderless networks Using Cisco Secure Unified Access Architecture and Cisco Identity Services Engine, you can secure and regain control of borderless networks in a Bring Your Own Device (BYOD) world. This book covers the complete lifecycle of protecting a modern borderless network using these advanced solutions, from planning an architecture through deployment, management, and troubleshooting. Cisco ISE for BYOD and Secure Unified Access begins by reviewing the business case for an identity solution. Next, you’ll walk through...

4. 

Introduction to Computer and Network Security: Navigating Shades of Gray

Introduction to Computer and Network Security: Navigating Shades of Gray

By: Richard Brooks

Publisher: Chapman and Hall/CRC

Publication Date: 19-AUG-2013

Insert Date: 29-AUG-2013

Slots: 1.0

Table of Contents • Start Reading

Combining hands-on work with technical overviews, this text integrates security analysis into a technical computing curriculum. It educates students on security issues, such as side-channel attacks, and deepens their understanding of how computers and networks work. The book presents basic principles and concepts, along with examples of current threats to illustrate how the principles can either enable or neutralize exploits. Classroom-tested projects prompt students to stage exploits and choose countermeasures to neutralize the attacks. Many ancillaries are available upon qualifying...

5. 

Cassandra: The Definitive Guide

Cassandra: The Definitive Guide

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 22-NOV-2010

Insert Date: 28-AUG-2010

Slots: 1.0

Table of Contents • Start Reading

The rising popularity of Apache Cassandra rests on its ability to handle very large data sets that include hundreds of terabytes -- and that's why this distributed database has been chosen by organizations such as Facebook, Twitter, Digg, and Rackspace. With this hands-on guide, you'll get all the details and practical examples you need to understand Cassandra's non-relational database design and put it to work in a production environment.Author Eben Hewitt (Java SOA Cookbook) pays special attention to data modeling, and demonstrates Cassandra's many advantages, including its high...

6. 

Pro ASP.NET Web API Security: Securing ASP.NET Web API

Pro ASP.NET Web API Security: Securing ASP.NET Web API

By: Badrinarayanan Lakshmiraghavan

Publisher: Apress

Publication Date: 27-MAR-2013

Insert Date: 10-APR-2013

Slots: 1.0

Table of Contents • Start Reading

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP. With such wide accessibility, securingyour code effectively needs to be a top priority. You will quickly find that the WCF security protocols you're familiar with from .NET (WS-* and similar)are less suitable than they once were in this new environment; proving themselves cumbersome and limited in...

7. 

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition

Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide, Second Edition

By: Catherine Paquet

Publisher: Cisco Press

Publication Date: 30-NOV-2012

Insert Date: 24-FEB-2012

Slots: 1.0

Table of Contents • Start Reading

Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA® Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco® networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security...

8. 

Information Security The Complete Reference, Second Edition

Information Security The Complete Reference, Second Edition

By: Mark Rhodes-Ousley

Publisher: McGraw-Hill

Publication Date: 03-APR-2013

Insert Date: 04-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Develop and implement an effective end-to-end security programToday’s complex world of mobile platforms, cloud computing, and ubiquitous data access puts new security demands on every IT professional. Information Security: The Complete Reference, Second Edition (previously titled Network Security: The Complete Reference) is the only comprehensive book that offers vendor-neutral details on all aspects of information protection, with an eye toward the evolving threat landscape. ...

9. 

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

By: Robert W. Beggs

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective...

10. 

The Browser Hacker's Handbook

The Browser Hacker's Handbook

By: 

Publisher: John Wiley & Sons

Publication Date: 24-MAR-2014

Insert Date: 12-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates...

11. 

Kali Linux Cookbook

Kali Linux Cookbook

By: Willie L. Pritchett; David De Smet

Publisher: Packt Publishing

Publication Date: 15-OCT-2013

Insert Date: 18-OCT-2013

Slots: 1.0

Table of Contents • Start Reading

Over 70 recipes to help you master Kali Linux for effective penetration security testing Recipes designed to educate you extensively on the penetration testing principles and Kali Linux tools Learning to use Kali Linux tools, such as Metasploit, Wire Shark, and many more through in-depth and structured instructions Teaching you in an easy-to-follow style, full of examples, illustrations, and tips that will suit experts and novices alike In Detail In this age, where online information is at its most vulnerable, knowing how to execute the same attacks that hackers use to...

12. 

Computer Security Handbook, Fifth Edition

Computer Security Handbook, Fifth Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 09-FEB-2009

Insert Date: 18-AUG-2012

Slots: 1.0

Table of Contents • Start Reading

The classic and authoritative reference in the field of computer security, now completely updated and revised. With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven...

13. 

Building Virtual Pentesting Labs for Advanced Penetration Testing

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Publisher: Packt Publishing

Publication Date: 20-JUN-2014

Insert Date: 24-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Build intricate virtual architecture to practice any penetration testing technique virtually Build and enhance your existing pentesting methods and skills Get a solid methodology and approach to testing Step-by-step tutorial helping you build complex virtual architecture In Detail A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an...

14. 

Metasploit

Metasploit

By: ; ; ;

Publisher: No Starch Press

Publication Date: 15-JUL-2011

Insert Date: 20-JUL-2011

Slots: 1.0

Table of Contents • Start Reading

"The best guide to the Metasploit Framework." ?HD Moore, Founder of the Metasploit ProjectThe Metasploit Framework is a powerful suite of tools that security researchers use to investigate and resolve potential network and system vulnerabilities. Metasploit: The Penetration Tester's Guide shows readers how to assess networks by using Metasploit to launch simulated attacks that expose weaknesses in their security....

15. 

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System, 2nd Edition

By: Bill Blunden

Publisher: Jones & Bartlett Learning

Publication Date: 15-MAR-2012

Insert Date: 04-MAY-2012

Slots: 1.0

Table of Contents • Start Reading

While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full disclosure, the updated Second Edition of The Rootkit Arsenal presents the most accessible, timely, and complete coverage of forensic countermeasures. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the...

16. 

Data-Driven Security: Analysis, Visualization and Dashboards

Data-Driven Security: Analysis, Visualization and Dashboards

By: 

Publisher: John Wiley & Sons

Publication Date: 24-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and...

17. 

Information Security: Principles and Practices, Second Edition

Information Security: Principles and Practices, Second Edition

By: Mark S. Merkow; Jim Breithaupt

Publisher: Pearson Certification

Publication Date: 04-JUN-2014

Insert Date: 28-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Information Security Common Body of Knowledge [(ISC)² CBK]. Thoroughly updated for today’s challenges, technologies, procedures, and best practices. The perfect resource for anyone pursuing an IT security career. Fully updated for the newest technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains...

18. 

Hacking Exposed ™ 7: Network Security Secrets & Solutions

Hacking Exposed ™ 7: Network Security Secrets & Solutions

By: Stuart McClure; Joel Scambray; George Kurtz

Publisher: McGraw-Hill

Publication Date: 03-AUG-2012

Insert Date: 20-JUL-2012

Slots: 1.0

Table of Contents • Start Reading

A fully updated edition of the world’s bestselling computer security book Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key...

19. 

Hacking For Dummies, 4th Edition

Hacking For Dummies, 4th Edition

By: 

Publisher: For Dummies

Publication Date: 29-JAN-2013

Insert Date: 18-JUL-2013

Slots: 1.0

Table of Contents • Start Reading

Updated for Windows 8 and the latest version of Linux The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully updated for Windows 8 and the latest version of Linux, Hacking For Dummies, 4th Edition explores the malicious hacker's mindset and helps you develop an ethical hacking plan (also known as penetration testing) using the newest tools and techniques. More timely than...

20. 

Anti-Hacker Tool Kit, Fourth Edition, 4th Edition

Anti-Hacker Tool Kit, Fourth Edition

By: Mike Shema

Publisher: McGraw-Hill Osborne Media

Publication Date: 14-JAN-2014

Insert Date: 17-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...