Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


41. 

Quality-of-Experience for Multimedia

Quality-of-Experience for Multimedia

By: 

Publisher: John Wiley & Sons

Publication Date: 25-NOV-2013

Insert Date: 29-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Based on a convergence of network technologies, the Next Generation Network (NGN) is being deployed to carry high quality video and voice data. In fact, the convergence of network technologies has been driven by the converging needs of end-users. The perceived end-to-end quality is one of the main goals required by users that must be guaranteed by the network operators and the Internet Service Providers, through manufacturer equipment. This is referred to as the notion of Quality of Experience (QoE) and is becoming commonly used to represent user perception. The QoE is not a technical...

42. 

ZigBee Wireless Networks and Transceivers

ZigBee Wireless Networks and Transceivers

By: Shahin Farahani

Publisher: Newnes

Publication Date: 08-APR-2011

Insert Date: 29-APR-2014

Slots: 1.0

Table of Contents • Start Reading

ZigBee is a short-range wireless networking standard backed by such industry leaders as Motorola, Texas Instruments, Philips, Samsung, Siemens, Freescale, etc. It supports mesh networking, each node can transmit and receive data, offers high security and robustness, and is being rapidly adopted in industrial, control/monitoring, and medical applications. This book will explain the ZigBee protocol, discuss the design of ZigBee hardware, and describe how to design and implement ZigBee networks. The book has a dedicated website for the latest technical updates, ZigBee networking calculators,...

43. 

Social Engineering Penetration Testing

Social Engineering Penetration Testing

By: Gavin Watson; Andrew Mason; Richard Ackroyd

Publisher: Syngress

Publication Date: 11-APR-2014

Insert Date: 29-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Social engineering attacks target the weakest link in an organization's security—human beings. Everyone knows these attacks are effective, and everyone knows they are on the rise. Now, Social Engineering Penetration Testing gives you the practical methodology and everything you need to plan and execute a social engineering penetration test and assessment. You will gain fascinating insights into how social engineering techniques—including email phishing, telephone pretexting, and physical vectors— can be used to elicit information or manipulate individuals into performing actions that...

44. 

Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

Security without Obscurity: A Guide to Confidentiality, Authentication, and Integrity

By: J.J. Stapleton

Publisher: Auerbach Publications

Publication Date: 15-MAY-2014

Insert Date: 28-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The traditional view of information security includes three cornerstones: confidentiality, integrity, and availability; however the author asserts authentication is the third keystone. As the field has become more complex, novices and professionals need a reliable reference that outlines the basics. Rather than focusing on compliance or policies and procedures, this book takes a top-down approach. Providing insight from the author's experience developing dozens of standards, it provides an understanding of how to approach information security from the bedrock principles of confidentiality,...

45. 

The State of the Art in Intrusion Prevention and Detection

The State of the Art in Intrusion Prevention and Detection

By: Al-Sakib Pathan

Publisher: Auerbach Publications

Publication Date: 29-JAN-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book analyzes the latest trends and issues surrounding intrusion detection systems in computer networks, especially in communications networks. Its broad scope of coverage includes wired, wireless, and mobile networks; next-generation converged networks; and intrusion in social networks. Presenting cutting-edge research, the book presents novel schemes for intrusion detection and prevention. It discusses tracing back mobile attackers, secure routing with intrusion prevention, anomaly detection, and AI-based techniques. It also includes information on physical intrusion in wired and...

46. 

Security for Multihop Wireless Networks

Security for Multihop Wireless Networks

By: Shafiullah Khan; Mauri, Lloret

Publisher: CRC Press

Publication Date: 15-APR-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book provides broad coverage of the security issues facing multihop wireless networks, including mobile ad hoc networks, wireless sensor networks, wireless mesh networks, and personal area networks. Detailing technologies and processes for securing today’s networks, it includes coverage of cryptographic coprocessors, encryption, authentication, key management, attacks and countermeasures, secure routing, secure medium access control, intrusion detection, epidemics, security performance analysis, and security issues in applications. It identifies vulnerabilities in the physical layer,...

47. 

Intrusion Detection in Wireless Ad-Hoc Networks

Intrusion Detection in Wireless Ad-Hoc Networks

By: Nabendu Chaki; Rituparna Chaki

Publisher: CRC Press

Publication Date: 06-FEB-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting cutting-edge research, this book explores the security aspects of the basic categories of wireless ad-hoc networks and related application areas. Focusing on intrusion detection systems (IDSs), it provides readers with the understanding required to establish security solutions for the range of wireless networks, including mobile ad-hoc networks, hybrid wireless networks, and sensor networks. This edited volume includes case studies on honesty-based intrusion detection systems, cluster oriented-based intrusion detection systems, and trust-based intrusion detection systems. ...

48. 

ZigBee® Network Protocols and Applications

ZigBee® Network Protocols and Applications

By: Chonggang Wang; Tao Jiang; Qian Zhang

Publisher: Auerbach Publications

Publication Date: 12-MAR-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This book provides detailed descriptions of ZigBee<SUP>®</SUP> network protocols and supplies step-by-step instructions on how to set up and develop ZigBee-based customized applications. Starting with a brief introduction to near-field communications, low-power communications, and related protocols, it discusses ZigBee architectures, standards, and protocols. It also addresses potential issues such as power management, security, reliability, quality of service, topology control, MAC routing, and transport protocols. Emphasizing development tools based on readily available commercial kits,...

49. 

Windows Forensic Analysis Toolkit, 4th Edition

Windows Forensic Analysis Toolkit, 4th Edition

By: Harlan Carvey

Publisher: Syngress

Publication Date: 11-MAR-2014

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Harlan Carvey has updated Windows Forensic Analysis Toolkit , now in its fourth edition, to cover Windows 8 systems. The primary focus of this edition is on analyzing Windows 8 systems and processes using free and open-source tools. The book covers live response, file analysis, malware detection, timeline, and much more. Harlan Carvey presents real-life experiences from the trenches, making the material realistic and showing the why behind the how. The companion and toolkit materials are hosted online. This material consists of electronic printable checklists, cheat sheets, free...

50. 

Emerging Trends in ICT Security

Emerging Trends in ICT Security

By: Babak Akhgar; Hamid R. Arabnia

Publisher: Morgan Kaufmann

Publication Date: 06-NOV-2013

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing. Provides a...

51. 

Investigating Internet Crimes

Investigating Internet Crimes

By: Todd G. Shipley; Art Bowker

Publisher: Syngress

Publication Date: 12-NOV-2013

Insert Date: 27-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for investigating Internet crimes, including locating, interpreting, understanding, collecting, and documenting online electronic evidence to benefit investigations. Cybercrime is the fastest growing area of crime as more criminals seek to exploit the speed, convenience and anonymity that the Internet provides to commit a diverse...

52. 

Computer Incident Response and Forensics Team Management

Computer Incident Response and Forensics Team Management

By: Leighton Johnson

Publisher: Syngress

Publication Date: 08-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Computer Incident Response and Forensics Team Management provides security professionals with a complete handbook of computer incident response from the perspective of forensics team management. This unique approach teaches readers the concepts and principles they need to conduct a successful incident response investigation, ensuring that proven policies and procedures are established and followed by all team members. Leighton R. Johnson III describes the processes within an incident response event and shows the crucial importance of skillful forensics team management, including when...

53. 

Cloud Storage Forensics

Cloud Storage Forensics

By: Darren Quick; Ben Martini; Raymond Choo

Publisher: Syngress

Publication Date: 16-NOV-2013

Insert Date: 26-APR-2014

Slots: 1.0

Table of Contents • Start Reading

To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation in the cloud computing environment, however, is in infancy due to the comparatively recent prevalence of cloud computing. Cloud Storage Forensics presents the first evidence-based cloud forensic framework. Using three popular cloud storage services and one private cloud storage service as case studies, the authors show you...

54. 

Multimedia Communications and Networking

Multimedia Communications and Networking

By: Silva, da

Publisher: CRC Press

Publication Date: 14-MAR-2012

Insert Date: 25-APR-2014

Slots: 1.0

Table of Contents • Start Reading

This comprehensive reference supplies authoritative insight into recent developments in multimedia, digital communications, and networking services and technologies. It provides a review of fundamental concepts, requirements, and constraints in networks and telecommunications. It describes channel disturbances that hinder system performance and provides transmission techniques for mitigating these limitations. Analyzing both cable and wireless transmission mediums, the book describes the network protocol architecture concept and includes coverage of twisted pairs, coaxial and optical fiber...

55. 

Managed Code Rootkits

Managed Code Rootkits

By: Erez Metula

Publisher: Syngress

Publication Date: 25-NOV-2010

Insert Date: 24-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Imagine being able to change the languages for the applications that a computer is running and taking control over it. That is exactly what managed code rootkits can do when they are placed within a computer. This new type of rootkit is hiding in a place that had previously been safe from this type of attack—the application level. Code reviews do not currently look for back doors in the virtual machine (VM) where this new rootkit would be injected. An invasion of this magnitude allows an attacker to steal information on the infected computer, provide false information, and disable...

56. 

Data Mining and Machine Learning in Cybersecurity

Data Mining and Machine Learning in Cybersecurity

By: Sumeet Dua; Xian Du

Publisher: Auerbach Publications

Publication Date: 25-APR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From basic concepts in machine learning and data mining to advanced problems in the machine learning domain, this book provides a unified reference for specific machine learning solutions to cybersecurity problems. It supplies a foundation in cybersecurity fundamentals, surveys contemporary challenges, and details cutting-edge machine learning and data mining techniques. This interdisciplinary resource includes technique review tables that allow for speedy access to common cybersecurity problems and associated data mining methods. Numerous illustrative figures and more than 40 case studies...

57. 

FISMA Principles and Best Practices: Beyond Compliance

FISMA Principles and Best Practices: Beyond Compliance

By: Patrick Howard

Publisher: Auerbach Publications

Publication Date: 29-MAR-2011

Insert Date: 23-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Detailing a proven approach for establishing and implementing a comprehensive information security program, this book integrates compliance review, technical monitoring, and remediation efforts to explain how to achieve and maintain compliance with Federal Information Security Management Act (FISMA) requirements. Based on the author’s experience developing, implementing, and maintaining enterprise FISMA-based information technology security programs at three major federal agencies, the book provides workable solutions for establishing and operating an effective security compliance program....

58. 

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

By: Tyson Macaulay; Bryan Singer

Publisher: Auerbach Publications

Publication Date: 13-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

As industrial control systems (ICS) become Internet-facing, they expose crucial services to attack. Explaining how to develop and implement an effective cybersecurity program for ICS, this book provides the tools to ensure network security without sacrificing efficiency and functionality. Starting with an introduction to ICS, it discusses business, cost, competitive, and regulatory drivers and the conflicting priorities of convergence. It explains why security requirements differ from IT to ICS and explains when standard IT security solutions can be used and where SCADA practices are...

59. 

Mobile Opportunistic Networks: Architectures, Protocols and Applications

Mobile Opportunistic Networks: Architectures, Protocols and Applications

By: Mieso Denko

Publisher: Auerbach Publications

Publication Date: 26-MAY-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

From fundamentals to advanced concepts, this book provides comprehensive technical coverage of this rapidly emerging communications technology. The first section focuses on modeling, networking architecture, and routing problems. The second section examines opportunistic networking technologies and applications. Supplying detailed discussions of key research challenges and open issues, this comprehensive resource provides a clear understanding of industrial and professional standards, communication architectures, network algorithms and protocols, emerging applications, and the latest...

60. 

Information Security Governance Simplified: From the Boardroom to the Keyboard

Information Security Governance Simplified: From the Boardroom to the Keyboard

By: Todd Fitzgerald

Publisher: CRC Press

Publication Date: 20-DEC-2011

Insert Date: 22-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Security practitioners must be able to build a cost-effective security program while at the same time meet the requirements of government regulations. This book lays out these regulations in simple terms and explains how to use the control frameworks to build an effective information security program and governance structure. It discusses how organizations can best ensure that the information is protected and examines all positions from the board of directors to the end user, delineating the role each plays in protecting the security of the organization. ...