Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

Information Security Breaches: Avoidance and Treatment Based on ISO27001, 2nd Edition

By: Michael Krausz

Publisher: IT Governance Ltd

Publication Date: 27-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

What if you suffer an information security breach? Many titles explain how to reduce the risk of information security breaches. Nevertheless breaches do occur, even to organisations that have taken all reasonable precautions.  Information Security Breaches - Avoidance and treatment based on ISO27001:2013  helps you to manage this threat by detailing what to do as soon as you discover a breach. Be prepared, be prompt, be decisive When your organisation’s security is compromised, you cannot afford to waste time deciding how to resolve the issue. You must be ready to take prompt and...

2. 

Penetration Testing Services Procurement Guide

Penetration Testing Services Procurement Guide

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Helping you to conduct effective, value-for-money penetration testing, this guide is designed to enable your organisation to plan for a penetration test, select an appropriate third party provider and manage all important related activities.It presents a useful overview of the key concepts you will need to understand to conduct a well-managed penetration test, explaining what a penetration test is (and is not), outlining its strengths and limitations, and describing why an organisation would typically choose to employ an external provider of penetration testing services. ...

3. 

Procuring Penetration Testing Services

Procuring Penetration Testing Services

By: CREST

Publisher: IT Governance Ltd

Publication Date: 15-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Organisations like yours have the evolving task of securing complex IT environments whilst delivering their business and brand objectives. The threat to key systems is ever increasing and the probability of a security weakness being accidentally exposed or maliciously exploited needs to be continually assessed – such as via a penetration test – to ensure that the level of risk is at an acceptable level to the business. A penetration test involves the use of a variety of manual and automated techniques to simulate an attack on an organisation’s information security arrangements –...

4. 

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

CyberWar, CyberTerror, CyberCrime and CyberActivism, 2nd Edition

By: Julie Mehan

Publisher: IT Governance Ltd

Publication Date: 08-MAY-2014

Insert Date: 19-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

Successful cyberattacks can damage your organisation, no matter who is behind them The goals of the cyberterrorist, the cybercriminal, the cyberactivist and the state-sponsored hacker may not be the same – but the outcomes can be equally devastating. Each can cause serious challenges for your organisation, ranging from information theft and disruption of normal operations to loss of reputation or credibility. Cyber security is much more than technology Many books on cybersecurity focus on technical responses to these threats. As important as this is, human fallibility and other...

5. 

IBM Distributed Virtual Switch 5000V Quickstart Guide

IBM Distributed Virtual Switch 5000V Quickstart Guide

By: David Cain; Per Ljungstrøm; Jason G. Neatherway; Sangam Racherla; Lutfi Rachman

Publisher: IBM Redbooks

Publication Date: 02-JUL-2014

Insert Date: 09-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

The IBM® Distributed Virtual Switch 5000V (DVS 5000V) is a software-based network switching solution that is designed for use with the virtualized network resources in a VMware enhanced data center. It works with VMware vSphere and ESXi 5.0 and beyond to provide an IBM Networking OS management plane and advanced Layer 2 features in the control and data planes. It provides a large-scale, secure, and dynamic integrated virtual and physical environment for efficient virtual machine (VM) networking that is aware of server virtualization events, such as VMotion and Distributed Resource Scheduler...

6. 

IBM HiperSockets Implementation Guide

IBM HiperSockets Implementation Guide

By: Mike Ebbers; Micky Reichenberg; Alexandra Winter

Publisher: IBM Redbooks

Publication Date: 10-JUN-2014

Insert Date: 02-JUL-2014

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication provides information about the IBM System z® HiperSockets™ function. It offers a broad description of the architecture, functions, and operating systems support. This publication will help you plan and implement HiperSockets. It provides information about the definitions needed to configure HiperSockets for the supported operating systems. This book is intended for system programmers, network planners, and systems engineers who want to plan and install HiperSockets. A solid background in network and Transmission Control Protocol/Internet Protocol (TCP/IP) is...

7. 

Ethernet, 3rd Edition

Ethernet, 3rd Edition

By: Jörg Rech

Publisher: dpunkt

Publication Date: 30-JUN-2014

Insert Date: 29-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Standardwerk- praktisch verwertbare Infos – von der Verkabelung bis zur Konfiguration- vollständige Beschreibung der Ethernet-Technik- berücksichtigt neueste Entwicklungen der Ethernet-Technologie ...

8. 

Programming MapReduce with Scalding

Programming MapReduce with Scalding

By: Antonios Chalkiopoulos

Publisher: Packt Publishing

Publication Date: 25-JUN-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to designing, testing, and implementing complex MapReduce applications in Scala Develop MapReduce applications using a functional development language in a lightweight, high-performance, and testable way Recognize the Scalding capabilities to communicate with external data stores and perform machine learning operations Full of illustrations and diagrams, practical examples, and tips for deeper understanding of MapReduce application development In Detail Programming MapReduce with Scalding is a practical guide to setting up a development environment and...

9. 

Take Control of Your Apple Wi-Fi Network

Take Control of Your Apple Wi-Fi Network

By: 

Publisher: TidBITS Publishing, Inc.

Publication Date: 21-JUN-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Take Control of Your Apple Wi-Fi Network: Get help with Apple 802.11ac and 802.11n networking!Although setting up a simple Wi-Fi network with Apple gear is no longer an especially geeky endeavor, making an existing network work optimally still takes effort, given the numerous possible options and places where problems can crop up.Wi-Fi wizard Glenn Fleishman helps you create a fast, reliable, and secure Apple Wi-Fi network using 802.11ac or 802.11n AirPort Extreme, AirPort Express, and Time Capsule base stations. You'll find plenty of practical directions for working with Apple's AirPort...

10. 

Game Theory Applications in Network Design

Game Theory Applications in Network Design

By: Sungwook Kim

Publisher: IGI Global

Publication Date: 31-MAY-2014

Insert Date: 27-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

The use of game theoretic techniques is playing an increasingly important role in the network design domain. Understanding the background, concepts, and principles in using game theory approaches is necessary for engineers in network design. Game Theory Applications in Network Design provides the basic idea of game theory and the fundamental understanding of game theoretic interactions among network entities. The material in this book also covers recent advances and open issues, offering game theoretic solutions for specific network design issues. This publication will benefit students,...

11. 

Extending Puppet

Extending Puppet

By: Alessandro Franceschi

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Design, manage, and deploy your Puppet architecture with the help of real-world scenarios Plan, test, and execute your Puppet deployments Write reusable and maintainable Puppet code Handle challenges that might arise in upcoming versions of Puppet Explore the Puppet ecosystem in-depth, through a hands-on, example driven approach In Detail Puppet has changed the way we manage our systems, but Puppet itself is changing and evolving, as are the ways in which we use it. A clear, updated, practical, and focused view of the current state of the technology and the...

12. 

Mastering Kali Linux for Advanced Penetration Testing

Mastering Kali Linux for Advanced Penetration Testing

By: Robert W. Beggs

Publisher: Packt Publishing

Publication Date: 24-JUN-2014

Insert Date: 26-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers Conduct realistic and effective security tests on your network Demonstrate how key data systems are stealthily exploited, and learn how to identify attacks against your own systems Use hands-on techniques to take advantage of Kali Linux, the open source framework of security tools In Detail Mastering Kali Linux for Advanced Penetration Testing will teach you the kill chain perspective in assessing network security—from selecting the most effective...

13. 

Building Virtual Pentesting Labs for Advanced Penetration Testing

Building Virtual Pentesting Labs for Advanced Penetration Testing

By: Kevin Cardwell

Publisher: Packt Publishing

Publication Date: 20-JUN-2014

Insert Date: 24-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Build intricate virtual architecture to practice any penetration testing technique virtually Build and enhance your existing pentesting methods and skills Get a solid methodology and approach to testing Step-by-step tutorial helping you build complex virtual architecture In Detail A penetration test, also known as pentest, is a method of assessing computer and network security by replicating an attack on a computer system or network from the outside world and internal threats. With the increase of advanced hackers and threats to our virtual world, pentesting is an...

14. 

Network Topology in Command and Control

Network Topology in Command and Control

By: T. J. Grant; R. H. P. Janssen; H. Monsuur

Publisher: IGI Global

Publication Date: 31-MAY-2014

Insert Date: 22-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Over the past decade, the Command and Control (C2) field has been making a transformation from top-down, directive command to Network Centric Operations (NCO), peer-to-peer negation, self-synchronization, and agility. As the terms NCO and NEC suggest, C2 systems are regarded as networks, rather than a hierarchy. Accordingly, it is appropriate to view the C2 process and C2 systems through the lens of network theory. Network Topology in Command and Control: Organization, Operation, and Evolution aims to connect the fields of C2 and network science. Featuring timely research on topics pertaining...

15. 

Sharing Network Resources

Sharing Network Resources

By: Abhay Parekh; Jean Walrand

Publisher: Morgan & Claypool Publishers

Publication Date: 01-APR-2014

Insert Date: 20-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Resource Allocation lies at the heart of network control. In the early days of the Internet the scarcest resource was bandwidth, but as the network has evolved to become an essential utility in the lives of billions, the nature of the resource allocation problem has changed. This book attempts to describe the facets of resource allocation that are most relevant to modern networks. It is targeted at graduate students and researchers who have an introductory background in networking and who desire to internalize core concepts before designing new protocols and applications. We start from the...

16. 

Software Defined Networks

Software Defined Networks

By: Paul Goransson; Chuck Black

Publisher: Morgan Kaufmann

Publication Date: 05-JUN-2014

Insert Date: 18-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Software Defined Networks discusses the historical networking environment that gave rise to SDN, as well as the latest advances in SDN technology. The book gives you the state of the art knowledge needed for successful deployment of an SDN, including: How to explain to the non-technical business decision makers in your organization the potential benefits, as well as the risks, in shifting parts of a network to the SDN model How to make intelligent decisions about when to integrate SDN technologies in a network How to decide if your organization should be developing its own SDN...

17. 

Anti-Hacker Tool Kit, Fourth Edition, 4th Edition

Anti-Hacker Tool Kit, Fourth Edition

By: Mike Shema

Publisher: McGraw-Hill Osborne Media

Publication Date: 14-JAN-2014

Insert Date: 17-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Defend against today's most devious attacks Fully revised to include cutting-edge new tools for your security arsenal, Anti-Hacker Tool Kit, Fourth Edition reveals how to protect your network from a wide range of nefarious exploits. You'll get detailed explanations of each tool’s function along with best practices for configuration and implementation illustrated by code samples and up-to-date, real-world case studies. This new edition includes references to short videos that demonstrate several of the tools in action. Organized by category, this practical guide makes it easy to...

18. 

The Browser Hacker's Handbook

The Browser Hacker's Handbook

By: 

Publisher: John Wiley & Sons

Publication Date: 24-MAR-2014

Insert Date: 12-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates...

19. 

IPv6 Essentials, 3rd Edition

IPv6 Essentials, 3rd Edition

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 19-JUN-2014

Insert Date: 11-JUN-2014

Slots: 1.0

Table of Contents • Start Reading

If your organization is gearing up for IPv6, this in-depth book provides the practical information and guidance you need to plan for, design, and implement this vastly improved protocol. System and network administrators, engineers, and network designers will learn the technical details of IPv6 features and functions, and provides options for those who need to integrate IPv6 with their current IPv4 infrastructure....

20. 

The Basics of Information Security, 2nd Edition

The Basics of Information Security, 2nd Edition

By: Jason Andress

Publisher: Syngress

Publication Date: 20-MAY-2014

Insert Date: 31-MAY-2014

Slots: 1.0

Table of Contents • Start Reading

As part of the Syngress Basics series, The Basics of Information Security provides you with fundamental knowledge of information security in both theoretical and practical aspects. Author Jason Andress gives you the basic knowledge needed to understand the key concepts of confidentiality, integrity, and availability, and then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security. The Basics of Information Security gives you clear-non-technical explanations of how infosec works and how to apply...