Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


41. 

Mobile Device Security For Dummies

Mobile Device Security For Dummies

By: 

Publisher: For Dummies

Publication Date: 09-AUG-2011

Insert Date: 11-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

The information you need to avoid security threats on corporate mobile devices Mobile devices have essentially replaced computers for corporate users who are on the go and there are millions of networks that have little to no security. This essential guide walks you through the steps for securing a network and building a bulletproof framework that will protect and support mobile devices in the enterprise. Featuring real-world case scenarios, this straightforward guide shares invaluable advice for protecting mobile devices from the loss of sensitive and confidential corporate...

42. 

Information Security: Principles and Practice, 2nd Edition

Information Security: Principles and Practice, 2nd Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 03-MAY-2011

Insert Date: 07-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this fully updated and revised edition of Information Security: Principles and Practice provides the skills and knowledge readers need to tackle any information security challenge. Taking a...

43. 

Mobile Networks Architecture

Mobile Networks Architecture

By: Andre Perez

Publisher: John Wiley & Sons

Publication Date: 13-FEB-2012

Insert Date: 28-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This book explains the evolutions of architecture for mobiles and summarizes the different technologies: - 2G: the GSM (Global System for Mobile) network, the GPRS (General Packet Radio Service) network and the EDGE (Enhanced Data for Global Evolution) evolution; - 3G: the UMTS (Universal Mobile Telecommunications System) network and the HSPA (High Speed Packet Access) evolutions: - HSDPA (High Speed Downlink Packet Access), - HSUPA (High Speed Uplink Packet Access), - HSPA+; - 4G: the EPS (Evolved Packet System) network. The telephone service and data transmission are the...

44. 

Penetration Testing with BackBox

Penetration Testing with BackBox

By: Stefan Umit Uygur

Publisher: Packt Publishing

Publication Date: 20-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

An introductory guide to performing crucial penetration testing operations using Backbox Experience the real world of penetration testing with Backbox Linux using live, practical examples Gain an insight into auditing and penetration testing processes by reading though live sessions Learn how to carry out your own testing using the latest techniques and methodologies In Detail BackBox is an amazing Linux security distribution designed to keep in mind the needs of security and system administration specialists. It has been developed to perform penetration tests and...

45. 

Telerik WPF Controls Tutorial

Telerik WPF Controls Tutorial

By: Daniel R. Spalding

Publisher: Packt Publishing

Publication Date: 21-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Create powerful WPF applications using Telerik controls with the help of real-world examples Display database information in the Telerik WPF controls Get useful tips on creating engaging, interactive user experiences for Windows desktop applications Build powerful, responsive, and scalable line-of-business and enterprise applications using Telerik WPF controls In Detail Telerik Reporting is a lightweight reporting solution for all .NET cloud, web, and desktop platforms (Azure, Silverlight, WPF, ASP.NET, and Windows Forms) which targets developers and end users alike....

46. 

Citrix® XenMobile™ Mobile Device Management

Citrix® XenMobile™ Mobile Device Management

By: Akash Phoenix

Publisher: Packt Publishing

Publication Date: 20-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Gain an insight into the industry's best and most secure Enterprise Mobility Management solution Deploy and manage the complete XenMobile solution Learn how to customize and troubleshoot your XenMobile apps Step-by-step instructions with relevant screenshots for better understanding In Detail XenMobile is an enterprise Mobile Development Management solution with a multitude of technologies within it. It offers security and compliance in IT while giving apps and data freedom to users with mobile devices. The rising prevalence of mobile devices into corporate environments...

47. 

Analytical Modeling of Heterogeneous Cellular Networks

Analytical Modeling of Heterogeneous Cellular Networks

By: Sayandev Mukherjee

Publisher: Cambridge University Press

Publication Date: 31-DEC-2013

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This self-contained introduction shows how stochastic geometry techniques can be used for studying the behaviour of heterogeneous cellular networks (HCNs). The unified treatment of analytic results and approaches, collected for the first time in a single volume, includes the mathematical tools and techniques used to derive them. A single canonical problem formulation encompassing the analytic derivation of Signal to Interference plus Noise Ratio (SINR) distribution in the most widely-used deployment scenarios is presented, together with applications to systems based on the 3GPP-LTE...

48. 

Mobile Wireless Communications

Mobile Wireless Communications

By: Mischa Schwartz

Publisher: Cambridge University Press

Publication Date: 16-DEC-2004

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Wireless communication has become a ubiquitous part of modern life, from global cellular telephone systems to local and even personal-area networks. This 2004 book provides a tutorial introduction to digital mobile wireless networks, illustrating theoretical underpinnings with a wide range of real-world examples. The book begins with a review of propagation phenomena, and goes on to examine channel allocation, modulation techniques, multiple access schemes, and coding techniques. GSM and IS-95 systems are reviewed and 2.5G and 3G packet-switched systems are discussed in detail. Performance...

49. 

Routing Protocols Companion Guide

Routing Protocols Companion Guide

By: Cisco Networking Academy

Publisher: Cisco Press

Publication Date: 24-FEB-2014

Insert Date: 25-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Routing Protocols Companion Guide is the official supplemental textbook for the Routing Protocols course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. This course describes the architecture, components, and operations of routers, and explains the principles of routing and routing protocols. You learn how to configure a router for basic and advanced functionality. By the end of this course, you will be able to configure and troubleshoot routers and resolve common issues with RIPv1, RIPv2, EIGRP, and OSPF in both IPv4 and IPv6 networks. The Companion Guide is...

50. 

VMware vCenter Operations Manager Essentials

VMware vCenter Operations Manager Essentials

By: Lauren Malhoit

Publisher: Packt Publishing

Publication Date: 19-FEB-2014

Insert Date: 21-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Explore virtualization fundamentals and real-world solutions for the modern network administrator Written by VMware expert Lauren Malhoit, this book takes a look at vCenter Operations Manager from a practical point of view that every administrator can appreciate Understand, troubleshoot, and design your virtual environment in a better and more efficient way than you ever have before A step-by-step and learn-by-example guide to understanding the ins and outs of vCenter Operations Manager In Detail vCenter Operations Manager offers a powerful solution to administrating a...

51. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

52. 

Network Security Through Data Analysis

Network Security Through Data Analysis

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 21-FEB-2014

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques....

53. 

Network Technology for Digital Audio

Network Technology for Digital Audio

By: Andy Bailey

Publisher: Focal Press

Publication Date: 19-DEC-2000

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Network Technology for Digital Audio examines the transfer of audio and other related data over digital communication networks. Encompassing both the data communication and audio industries, it unravels the intricacies of computer networking technique and theory, viewed from an audio perspective. Looking at commercial and ratified standards both current and developing, this book covers digital architectural solutions such as IEEE 1394 (Firewire), USB, Fibre Channel and ATM alongside their counterparts within the audio industry: *S/P DIF, ADAT, AES/EBU and MADI are discussed from the...

54. 

The Art of Network Architecture: Business-Driven Design

The Art of Network Architecture: Business-Driven Design

By: Russ White; Denise Donohue

Publisher: Cisco Press

Publication Date: 04-APR-2014

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to...

55. 

Applied Network Security Monitoring

Applied Network Security Monitoring

By: Chris Sanders; Jason Smith

Publisher: Syngress

Publication Date: 26-NOV-2013

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a...

56. 

Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

By: Cameron H. Malin; Eoghan Casey; James M. Aquilina

Publisher: Syngress

Publication Date: 07-DEC-2013

Insert Date: 12-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a...

57. 

Routing and Switching Essentials Companion Guide

Routing and Switching Essentials Companion Guide

By: Cisco Networking Academy

Publisher: Cisco Press

Publication Date: 18-FEB-2014

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Routing and Switching Essentials Companion Guide is the official supplemental textbook for the Routing and Switching Essentials course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN...

58. 

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

By: Michael Howard; David LeBlanc; John Viega

Publisher: McGraw-Hill Osborne Media

Publication Date: 03-SEP-2009

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover...

59. 

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

By: Antonio Ruiz-Martinez; Rafael Marin-Lopez; Fernando Pereniguez-Garcia

Publisher: IGI Global

Publication Date: 30-SEP-2013

Insert Date: 30-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...

60. 

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

By: Himanshu Kumar

Publisher: Packt Publishing

Publication Date: 24-JAN-2014

Insert Date: 29-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing Successfully install Nessus and configure scanning options Learn useful tips based on real-world issues faced during scanning Use Nessus for compliance checks In Detail IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most...