Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


901. 

Network Security First-Step

Network Security First-Step

By: 

Publisher: Cisco Press

Publication Date: 21-MAY-2004

Insert Date: 28-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Your first step into the world of network security No security experience required Includes clear and easily understood explanations Makes learning easy Your first step to network security begins here! Learn about hackers and their attacks Understand security tools and technologies Defend your network with firewalls, routers, and other devices Explore security for wireless networks Learn how to prepare for security incidents Welcome to the world of network security! Computer networks are indispensable-but they're also not secure. With the...

902. 

OSPF Network Design Solutions, Second Edition

OSPF Network Design Solutions, Second Edition

By: 

Publisher: Cisco Press

Publication Date: 10-APR-2003

Insert Date: 17-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

The comprehensive reference for OSPF network design and deployment Understand the full dynamics of OSPF network components, how they interact with one another, and how to configure them Increase the efficiency of your OSPF network through a variety of performance tuning techniques Apply load balancing to enhance OSPF's capability to adapt to network topology changes Ensure seamless communication between OSPF and other Interior Gateway Protocols (IGPs) and OSPF and BGP through redistribution Optimize network stability and efficiency with OSPF summarization Maximize your...

903. 

Server Time Protocol Planning Guide

Server Time Protocol Planning Guide

By: Noshir Dhondy; Hans-Peter Eckam; Marcel Jaeckel; Jeff McDonough; George Ng; Frank Packheiser; Bernard Tanguy; Octavian Lascu

Publisher: IBM Redbooks

Publication Date: 01-JUL-2009

Insert Date: 15-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of the System z10 Enterprise Class (z10 EC), System z10 Business Class (z10 BC), IBM System z9 Enterprise Class (z9 EC), System z9 Business Class (z9 BC), zSeries z990 and z890 servers. It provides improved time synchronization in a sysplex or non-sysplex configuration. This IBM® Redbooks® document is intended for infrastructure architects and system programmers who need to understand the IBM STP functions. Readers are expected to be generally familiar with System z technology...

904. 

JUNOS Enterprise Switching

JUNOS Enterprise Switching

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 21-JUL-2009

Insert Date: 14-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

JUNOS Enterprise Switching is the only detailed technical book on Juniper Networks' new Ethernet-switching EX product platform. With this book, you'll learn all about the hardware and ASIC design prowess of the EX platform, as well as the JUNOS Software that powers it. Not only is this extremely practical book a useful, hands-on manual to the EX platform, it also makes an excellent study guide for certification exams in the JNTCP enterprise tracks. The authors have based JUNOS Enterprise Switching on their own Juniper training practices and programs, as well as the configuration, maintenance,...

905. 

Linksys® WRT54G Ultimate Hacking

Linksys® WRT54G Ultimate Hacking

By: Paul Asadoorian; Larry Pesce

Publisher: Syngress

Publication Date: 19-JUN-2007

Insert Date: 09-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G's hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models...

906. 

Pro DNS and BIND

Pro DNS and BIND

By: Ron Aitchison

Publisher: Apress

Publication Date: 01-AUG-2005

Insert Date: 03-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Pro DNS and BIND guides you through the challenging array of features surrounding DNS, with a special focus on BIND, the worlds most popular DNS implementation. This book unravels the mysteries of DNS, offering insight into origins, evolution, and key concepts like domain names and zone files. This book focuses on running DNS systems based on BIND 9.3.0the first stable release that includes support for the latest DNSSEC (DNSSEC.bis) standards and a major functional upgrade from previous BIND 9 releases. If you administer a DNS system or are thinking about running one, or if you need to...

907. 

PCI Compliance: Implementing Effective PCI Data Security Standards

PCI Compliance: Implementing Effective PCI Data Security Standards

By: Anthony Bradley; Tony Bradley CISSP, MCSE

Publisher: Syngress

Publication Date: 22-JUN-2007

Insert Date: 02-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Identity theft has been steadily rising in recent years, and credit card data is one of the number one targets for identity theft. With a few pieces of key information. Organized crime has made malware development and computer networking attacks more professional and better defenses are necessary to protect against attack. The credit card industry established the PCI Data Security standards to provide a baseline expectancy for how vendors, or any entity that handles credit card transactions or data, should protect data to ensure it is not stolen or compromised. This book will provide the...

908. 

Security Convergence: Managing Enterprise Security Risk

Security Convergence: Managing Enterprise Security Risk

By: Dave Tyson

Publisher: Butterworth-Heinemann

Publication Date: 07-JUN-2007

Insert Date: 02-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency,...

909. 

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

By: Scott Watson

Publisher: Butterworth-Heinemann

Publication Date: 29-MAY-2007

Insert Date: 02-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security. Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and...

910. 

Stealing the Network: The Complete Series Collector’s Edition

Stealing the Network: The Complete Series Collector’s Edition

By: Johnny Long; Ryan Russell; Timothy Mullen

Publisher: Syngress

Publication Date: 15-APR-2009

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real." --Jeff Moss, Founder and CEO of Black Hat The "Stealing the Network Series" has developed a passionate, cult following which includes more than 30,000 readers. Over 3,000 readers have registered their copies of Stealing on the Syngress Web site. The Stealing book signings at the Black Hat Briefings in Las Vegas have become an annual event, attracting hundreds of readers, who want to meet the authors who serve as the heroes and villains of...

911. 

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

By: Andrew Jones; Craig Valli

Publisher: Butterworth-Heinemann

Publication Date: 02-OCT-2008

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics...

912. 

Network Analysis, Architecture, and Design, Third Edition

Network Analysis, Architecture, and Design, Third Edition

By: James McCabe

Publisher: Morgan Kaufmann

Publication Date: 13-JUN-2007

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer?s job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and...

913. 

Foundations of Mac OS X Leopard Security

Foundations of Mac OS X Leopard Security

By: Charles S. Edge, Jr.; William Barker; Zack Smith

Publisher: Apress

Publication Date: 30-APR-2008

Insert Date: 28-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest...

914. 

TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition

TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition

By: Michael Donahoo; Kenneth Calvert

Publisher: Morgan Kaufmann

Publication Date: 17-MAR-2009

Insert Date: 27-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to network communication services through the sockets programming interface. TCP/IP Sockets in C: Practical Guide for Programmers is a quick and affordable way to gain the knowledge and skills needed to quickly develop sophisticated and powerful web-based applications. Written by two experienced networking instructors, the book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to...

915. 

Building Service-Aware Networks: The Next-Generation WAN/MAN

Building Service-Aware Networks: The Next-Generation WAN/MAN

By: 

Publisher: Cisco Press

Publication Date: 16-SEP-2009

Insert Date: 20-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Building Service-Aware Networks The Next-Generation WAN/MAN Muhammad Afaq Khan, CCIE® No. 9070 A thorough introduction to the ASR 1000 series router Building Service-Aware Networks is the insider’s guide to the next-generation Aggregation Services Router (ASR) 1000. Authored by a leading Cisco® expert, this book offers practical, hands-on coverage for the entire system lifecycle, including planning, setup and configuration, migration, and day-to-day management. Muhammad Afaq Khan systematically introduces the ASR 1000’s evolved architecture, showing how the ASR 1000 can deliver...

916. 

The Myths of Security

The Myths of Security

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 19-JUN-2009

Insert Date: 18-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time...

917. 

IBM/Cisco Multiprotocol Routing: An Introduction and Implementation

IBM/Cisco Multiprotocol Routing: An Introduction and Implementation

By: Jon Tate; Michael Engelbrecht; Jacek Koman

Publisher: IBM Redbooks

Publication Date: 09-MAR-2009

Insert Date: 15-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication introduces the products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Cisco products and technology. It also discusses the features of each product, and offers examples of how you can deploy and use them. The book targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability,...

918. 

Real-Time Collision Detection

Real-Time Collision Detection

By: Christer Ericson

Publisher: CRC Press

Publication Date: 22-DEC-2004

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Written by an expert in the game industry, Christer Ericson's new book is a comprehensive guide to the components of efficient real-time collision detection systems. The book provides the tools and know-how needed to implement industrial-strength collision detection for the highly detailed dynamic environments of applications such as 3D games, virtual reality applications, and physical simulators. Of the many topics covered, a key focus is on spatial and object partitioning through a wide variety of grids, trees, and sorting methods. The author also presents a large collection of...

919. 

Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

By: Chris Hurley

Publisher: Syngress

Publication Date: 12-OCT-2007

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. . Perform Network Reconnaissance Master the...

920. 

The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-OCT-2003

Insert Date: 11-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a...