Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

Advanced Windows RT Memory Dump Analysis: ARM Version

Advanced Windows RT Memory Dump Analysis: ARM Version

By: 

Publisher: OpenTask

Publication Date: 18-MAR-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The full transcript of Software Diagnostics Services training with 9 step-by-step exercises. Learn how to navigate through memory dump space and Windows data structures to perform memory forensics, troubleshoot and debug complex software incidents. The training uses a unique and innovative pattern-driven analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioural patterns in Windows RT kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation,...

2. 

Managing Trust in Cyberspace

Managing Trust in Cyberspace

By: Sabu Thampi; Bharat Bhargava; Pradeep Atrey

Publisher: Chapman and Hall/CRC

Publication Date: 14-DEC-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Bringing together cross-disciplinary expertise, this illustrated, tutorial-style text addresses fundamentals underpinning computational trust models and covers trust management processes for dynamic open systems and applications. Topics include trust in autonomic and self-organized networks, cloud computing, embedded computing, multi-agent systems, digital rights management, security and quality issues in trusting e-government service delivery, and context-aware e-commerce applications. The book walks through online identity management, examines using trust and argumentation in recommender...

3. 

Physical Layer Security in Wireless Communications

Physical Layer Security in Wireless Communications

By: Xiangyun Zhou; Lingyang Song; Yan Zhang

Publisher: CRC Press

Publication Date: 15-NOV-2013

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Physical Layer Security in Wireless Communications supplies a systematic overview of the basic concepts, recent advancements, and open issues in providing communication security at the physical layer. It introduces the key concepts, design issues, and solutions to physical layer security in single-user and multi-user communication systems, as well as large-scale wireless networks. Presenting high-level discussions along with specific examples, and illustrations, this is an ideal reference for anyone that needs to obtain a macro-level understanding of physical layer security and its role in...

4. 

Improving the Performance of Wireless LANs: A Practical Guide

Improving the Performance of Wireless LANs: A Practical Guide

By: Nurul Sarkar

Publisher: Chapman and Hall/CRC

Publication Date: 08-JAN-2014

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book quantifies the key factors of WLAN performance and describes methods for improvement. It provides theoretical background and empirical results for the optimum planning and deployment of indoor WLAN systems, explaining the fundamentals while supplying guidelines for design, modeling, and performance evaluation. It discusses environmental effects on WLAN systems, protocol redesign for routing and MAC, and traffic distribution; examines emerging and future network technologies; and includes radio propagation and site measurements, simulations for various network design scenarios,...

5. 

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

The Security Risk Assessment Handbook: A Complete Guide for Performing Security Risk Assessments, Second Edition

By: Douglas Landoll

Publisher: CRC Press

Publication Date: 20-MAY-2011

Insert Date: 18-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Picking up where the bestselling first edition left off, this second edition explains how to conduct an effective risk assessment. Supplying wide-ranging coverage that includes security risk analysis, mitigation, and risk assessment reporting, it provides the tools needed to solicit and review the scope and rigor of risk assessment proposals with competence and confidence. Trusted to assess security for leading organizations and government agencies, including the CIA, NSA, and NATO, Douglas Landoll unveils the little-known tips, tricks, and techniques used by savvy security professionals...

6. 

Near Field Communication

Near Field Communication

By: Sheli McHugh; Kristen Yarmey

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 11-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Near Field Communication is a radio frequency technology that allows objects, such as mobile phones, computers, tags, or posters, to exchange information wirelessly across a small distance. This report on the progress of Near Field Communication reviews the features and functionality of the technology and summarizes the broad spectrum of its current and anticipated applications. We explore the development of NFC technology in recent years, introduce the major stakeholders in the NFC ecosystem, and project its movement toward mainstream adoption. Several examples of early implementation of NFC...

7. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

8. 

Telecommunication Network Economics

Telecommunication Network Economics

By: Patrick Maillé; Bruno Tuffin

Publisher: Cambridge University Press

Publication Date: 28-FEB-2014

Insert Date: 05-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well as the mathematical models behind the solutions. These mathematical foundations enable the reader to understand the economic issues arising at this pivotal time in network economics, from business, research and political perspectives. This is followed by a unique practical guide to current topics, including app stores, volume-based pricing, auctions for advertisements, search engine business models, the network neutrality...

9. 

Advanced Communication Protocol Technologies

Advanced Communication Protocol Technologies

By: Katalin Tarnay; Gusztáv Adamis; Tibor Dulai

Publisher: IGI Global

Publication Date: 30-JUN-2011

Insert Date: 03-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The rapid improvements brought about by modern telecommunications are made possible by unfettered transmission of information, which relies on the ability to send, receive and properly utilize communication. Advanced Communication Protocol Technologies: Solutions, Methods, and Applications explores the complications and solutions created by communication required between ever-expanding technologies. The research in this book encompasses the fundamentals of protocol functions and protocol operations, the controlling protocols of ISDN and mobile networks, the evolution of IP-based protocols,...

10. 

Server Time Protocol Implementation Guide

Server Time Protocol Implementation Guide

By: Octavian Lascu; Hans-Peter Eckam; George Kozakos; Paulo Vitor Pereira

Publisher: IBM Redbooks

Publication Date: 28-JUN-2013

Insert Date: 01-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of IBM® zEnterprise EC12 (zEC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10®, and IBM System z9®. It provides improved time synchronization in both a sysplex or non-sysplex configuration. This IBM Redbooks® publication will help you configure a Mixed Coordinated Timing Network (CTN) or an STP-only CTN. It is intended for technical support personnel requiring information about: -Installing and configuring a Coordinated Timing Network -Using STP functions...

11. 

Deploying IP and MPLS QoS for Multiservice Networks

Deploying IP and MPLS QoS for Multiservice Networks

By: John William Evans; Clarence Filsfils

Publisher: Morgan Kaufmann

Publication Date: 26-JUL-2010

Insert Date: 29-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

QoS, short for “quality of service,? is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional. The authors have provided a comprehensive treatise on this...

12. 

Cyberwar and Information Warfare

Cyberwar and Information Warfare

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 15-AUG-2011

Insert Date: 28-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations,...

13. 

Rough Cuts
Information Security: Principles and Practices, Second Edition

Information Security: Principles and Practices, Second Edition

By: Mark S. Merkow; Jim Breithaupt

Publisher: Pearson Certification

Publication Date: 05-JUN-2014

Insert Date: 28-MAR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Authored by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends,...

14. 

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 26-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein....

15. 

Learning Nagios 4

Learning Nagios 4

By: Wojciech Kocjan

Publisher: Packt Publishing

Publication Date: 21-MAR-2014

Insert Date: 25-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to set up Nagios 4 in order to monitor your systems efficiently Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a simplified manner In Detail One of the most important challenges in system monitoring is to detect and report any malfunctioning system or device as soon as possible, so that you as an administrator are aware of the problem before a user runs into...

16. 

Computer Forensics with FTK

Computer Forensics with FTK

By: Fernando Carbone

Publisher: Packt Publishing

Publication Date: 20-MAR-2014

Insert Date: 22-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios Receive step-by-step guidance on conducting computer investigations Explore the functionality of FTK Imager and learn to use its features effectively Conduct increasingly challenging and more applicable digital investigations for generating effective evidence using the FTK platform In Detail With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry...

17. 

Large Scale Network-Centric Distributed Systems

Large Scale Network-Centric Distributed Systems

By: 

Publisher: Wiley-IEEE Press

Publication Date: 28-OCT-2013

Insert Date: 22-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level...

18. 

Cyber Conflict: Competing National Perspectives

Cyber Conflict: Competing National Perspectives

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 14-MAY-2012

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational...

19. 

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems...

20. 

Computer-Forensik, 6th Edition

Computer-Forensik, 6th Edition

By: Alexander Geschonneck

Publisher: dpunkt

Publication Date: 18-MAR-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Dieses Buch zeigt, wie sich Unternehmen auf die Analyse von Computerstraftaten vorbereiten können, welche Maßnahmen »im Fall der Fälle« (und danach) zu ergreifen sind und wie man bei Bedarf Behörden einbezieht. Beschrieben werden u.a. Post-mortem-Analyse, geeignete Toolkits, forensische Analyse unter Unix und Windows sowie bei PDAs und Routern.In der 6. Auflage wurden Statistiken und Toolbeschreibungen aktualisiert sowie neueste rechtliche Entwicklungen aufgenommen. Hinzugekommen sind neue Ansätze der strukturierten Untersuchung von Hauptspeicherinhalten und die Analyse von Malware....