Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


41. 

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

By: David Maynor

Publisher: Syngress

Publication Date: 18-APR-2011

Insert Date: 18-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

This is the first book available for the Metasploit Framework (MSF), which is the attack platform of choice for one of the fastest growing careers in IT security: Penetration Testing. The book and companion Web site will provide professional penetration testers and security researchers with a fully integrated suite of tools for discovering, running, and testing exploit code. This book discusses how to use the Metasploit Framework (MSF) as an exploitation platform. The book begins with a detailed discussion of the three MSF interfaces: msfweb, msfconsole, and msfcli .This chapter...

42. 

Network Security Through Data Analysis

Network Security Through Data Analysis

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 21-FEB-2014

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques....

43. 

Network Technology for Digital Audio

Network Technology for Digital Audio

By: Andy Bailey

Publisher: Focal Press

Publication Date: 19-DEC-2000

Insert Date: 14-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Network Technology for Digital Audio examines the transfer of audio and other related data over digital communication networks. Encompassing both the data communication and audio industries, it unravels the intricacies of computer networking technique and theory, viewed from an audio perspective. Looking at commercial and ratified standards both current and developing, this book covers digital architectural solutions such as IEEE 1394 (Firewire), USB, Fibre Channel and ATM alongside their counterparts within the audio industry: *S/P DIF, ADAT, AES/EBU and MADI are discussed from the...

44. 

The Art of Network Architecture: Business-Driven Design

The Art of Network Architecture: Business-Driven Design

By: Russ White; Denise Donohue

Publisher: Cisco Press

Publication Date: 04-APR-2014

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Art of Network Architecture Business-Driven Design The business-centered, business-driven guide to architecting and evolving networks The Art of Network Architecture is the first book that places business needs and capabilities at the center of the process of architecting and evolving networks. Two leading enterprise network architects help you craft solutions that are fully aligned with business strategy, smoothly accommodate change, and maximize future flexibility. Russ White and Denise Donohue guide network designers in asking and answering the crucial questions that lead to...

45. 

Applied Network Security Monitoring

Applied Network Security Monitoring

By: Chris Sanders; Jason Smith

Publisher: Syngress

Publication Date: 26-NOV-2013

Insert Date: 13-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a...

46. 

Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

By: Cameron H. Malin; Eoghan Casey; James M. Aquilina

Publisher: Syngress

Publication Date: 07-DEC-2013

Insert Date: 12-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a...

47. 

Routing and Switching Essentials Companion Guide

Routing and Switching Essentials Companion Guide

By: Cisco Networking Academy

Publisher: Cisco Press

Publication Date: 18-FEB-2014

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

Routing and Switching Essentials Companion Guide is the official supplemental textbook for the Routing and Switching Essentials course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. This course describes the architecture, components, and operations of routers and switches in a small network. You learn how to configure a router and a switch for basic functionality. By the end of this course, you will be able to configure and troubleshoot routers and switches and resolve common issues with RIPv1, RIPv2, single-area and multi-area OSPF, virtual LANs, and inter-VLAN...

48. 

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

By: Michael Howard; David LeBlanc; John Viega

Publisher: McGraw-Hill Osborne Media

Publication Date: 03-SEP-2009

Insert Date: 05-FEB-2014

Slots: 1.0

Table of Contents • Start Reading

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems." --From the Foreword by Dan Kaminsky, Director of Penetration Testing, IOActive Eradicate the Most Notorious Insecure Designs and Coding Vulnerabilities Fully updated to cover...

49. 

Architectures and Protocols for Secure Information Technology Infrastructures

Architectures and Protocols for Secure Information Technology Infrastructures

By: Antonio Ruiz-Martinez; Rafael Marin-Lopez; Fernando Pereniguez-Garcia

Publisher: IGI Global

Publication Date: 30-SEP-2013

Insert Date: 30-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

With the constant stream of emails, social networks, and online bank accounts, technology has become a pervasive part of our everyday lives, making the security of these information systems an essential requirement for both users and service providers. Architectures and Protocols for Secure Information Technology Infrastructures investigates different protocols and architectures that can be used to design, create, and develop security infrastructures by highlighting recent advances, trends, and contributions to the building blocks for solving security issues. This book is essential for...

50. 

Learning Nessus for Penetration Testing

Learning Nessus for Penetration Testing

By: Himanshu Kumar

Publisher: Packt Publishing

Publication Date: 24-JAN-2014

Insert Date: 29-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessment Understand the basics of vulnerability assessment and penetration testing as well as the different types of testing Successfully install Nessus and configure scanning options Learn useful tips based on real-world issues faced during scanning Use Nessus for compliance checks In Detail IT security is a vast and exciting domain, with vulnerability assessment and penetration testing being the most...

51. 

Implementing and Managing InfiniBand Coupling Links on IBM System z

Implementing and Managing InfiniBand Coupling Links on IBM System z

By: Frank Kyne; Hua Bin Chu; George Handera; Marek Liedel; Masaya Nakagawa; Iain Neville; Christian Zass; Frank Kyne; Hua Bin Chu; George Handera; Marek Liedel; Masaya Nakagawa; Iain Neville; Christian Zass

Publisher: IBM Redbooks

Publication Date: 27-JAN-2014

Insert Date: 29-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication provides introductory, planning, migration, and management information about InfiniBand coupling links on IBM System z® servers. The book will help you plan and implement the migration from earlier coupling links (ISC3 and ICB4) to InfiniBand coupling links. It provides step-by-step information about configuring InfiniBand connections. Information is also provided about the performance of InfiniBand links compared to other link types. This book is intended for systems programmers, data center planners, and systems engineers. It introduces and...

52. 

Getting Started with Citrix® Provisioning Services 7.0

Getting Started with Citrix® Provisioning Services 7.0

By: Puthiyavan Udayakumar

Publisher: Packt Publishing

Publication Date: 24-JAN-2014

Insert Date: 28-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

An example-packed guide to help you successfully administer Citrix® Provisioning Services Install and configure Citrix Provisioning Services quickly and efficiently Master the architecture of Citrix Provisioning Services Successfully manage and operate Citrix Provisioning Services In Detail Disk streaming technology is advancing rapidly. Ardence (who were later acquired by Citrix) originally developed the disk streaming software now called Citrix Provisioning Services. Citrix Provisioning Services helps you stream a virtual disk across physical and virtual machines. It...

53. 

iOS and OS X Network Programming Cookbook

iOS and OS X Network Programming Cookbook

By: Jon Hoffman

Publisher: Packt Publishing

Publication Date: 22-JAN-2014

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Over 50 recipes to develop network applications in both the iOS and OS X environment Use several Apple and third-party APIs to develop both server and client networked applications Shows you how to integrate all of the third-party libraries and APIs with your applications Includes sample projects for both iOS and OS X environments In Detail Darwin, which forms the core set of components for OS X and iOS, is compatible with the Single UNIX Specification Version 3 and POSIX UNIX. Therefore OS X and iOS are UNIX operating systems. While there are numerous books and articles...

54. 

Advances in Secure Computing, Internet Services, and Applications

Advances in Secure Computing, Internet Services, and Applications

By: B.K. Tripathy; D.P. Acharjya

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Technological advancements have extracted a vast amount of useful knowledge and information for applications and services. These developments have evoked intelligent solutions that have been utilized in efforts to secure this data and avoid potential complex problems. Advances in Secure Computing, Internet Services, and Applications presents current research on the applications of computational intelligence in order to focus on the challenge humans face when securing knowledge and data. This book is a vital reference source for researchers, lecturers, professors, students, and developers, who...

55. 

Broadband Wireless Access Networks for 4G

Broadband Wireless Access Networks for 4G

By: Raul Santos; Victor Licea; Arthur Edwards-Block

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

With the increased functionality demand for mobile speed and access in our everyday lives, broadband wireless networks have emerged as the solution in providing high data rate communications systems to meet these growing needs. Broadband Wireless Access Networks for 4G: Theory, Application, and Experimentation presents the latest trends and research on mobile ad hoc networks, vehicular ad hoc networks, and routing algorithms which occur within various mobile networks. This publication smartly combines knowledge and experience from enthusiastic scholars and expert researchers in the area of...

56. 

Security Program and Policies: Principles and Practices, Second Edition

Security Program and Policies: Principles and Practices, Second Edition

By: Sari Greene

Publisher: Pearson Certification

Publication Date: 19-MAR-2014

Insert Date: 24-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

Everything you need to know about information security programs and policies, in one book Clearly explains all facets of InfoSec program and policy planning, development, deployment, and management Thoroughly updated for today’s challenges, laws, regulations, and best practices The perfect resource for anyone pursuing an information security management career In today’s dangerous world, failures in information security can be catastrophic. Organizations must protect themselves. Protection begins with comprehensive, realistic policies. This up-to-date guide will help you...

57. 

Rough Cuts
Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, Third Edition

Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services, Third Edition

By: Jazib Frahim; Omar Santos; Andrew Ossipov

Publisher: Cisco Press

Publication Date: 05-MAY-2014

Insert Date: 24-JAN-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. This is the definitive, up-to-date practitioner's guide to planning, deploying, and troubleshooting comprehensive security plans with Cisco ASA. Written by two experienced Cisco Security and VPN Solutions consultants who work closely with customers to solve security problems every day, the book brings together valuable insights and real-world deployment examples for both large and small network environments. Jazib Frahim and Omar Santos begin by introducing the newest ASA Firewall Solution and its capabilities. Next, they walk through...

58. 

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 1: Base Functions, Connectivity, and Routing

By: Rufus P. Credle Jr.; Uma Maheswari Kumaraguru; Gilson Cesar de Oliveira; Micky Reichenberg; Georg Senfleben; Rutsakon Techo; Maulide Xavier

Publisher: IBM Redbooks

Publication Date: 17-DEC-2013

Insert Date: 21-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class, state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection...

59. 

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 2: Standard Applications

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 2: Standard Applications

By: Rufus P. Credle Jr.; Uma Maheswari Kumaraguru; Gilson Cesar de Oliveira; Micky Reichenberg; Georg Senfleben; Rutsakon Techo; Maulide Xavier

Publisher: IBM Redbooks

Publication Date: 17-DEC-2013

Insert Date: 21-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the worlds computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class, state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving collection...

60. 

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance

IBM z/OS V2R1 Communications Server TCP/IP Implementation Volume 3: High Availability, Scalability, and Performance

By: Rufus P. Credle Jr.; Uma Maheswari Kumaraguru; Gilson Cesar de Oliveira; Micky Reichenberg; Georg Senfleben; Rutsakon Techo; Maulide Xavier

Publisher: IBM Redbooks

Publication Date: 17-DEC-2013

Insert Date: 21-JAN-2014

Slots: 1.0

Table of Contents • Start Reading

For more than 40 years, IBM® mainframes have supported an extraordinary portion of the world's computing work, providing centralized corporate databases and mission-critical enterprise-wide applications. IBM System z®, the latest generation of the IBM distinguished family of mainframe systems, has come a long way from its IBM System/360 heritage. Likewise, its IBM z/OS® operating system is far superior to its predecessors in providing, among many other capabilities, world-class and state-of-the-art support for the TCP/IP Internet protocol suite. TCP/IP is a large and evolving...