Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


901. 

Security Convergence: Managing Enterprise Security Risk

Security Convergence: Managing Enterprise Security Risk

By: Dave Tyson

Publisher: Butterworth-Heinemann

Publication Date: 07-JUN-2007

Insert Date: 02-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Security Convergence describes the movement in business to combine the roles of physical security and security management with network computer security measures within an organization. This is the first book to discuss the subject of security convergence, providing real-world illustrations of implementation and the cost-saving benefits that result. Security Convergence discusses security management, electronic security solutions, and network security and the manner in which all of these interact. Combining security procedures and arriving at complete security solutions improves efficiency,...

902. 

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

The Art of War for Security Managers: 10 Steps to Enhancing Organizational Effectiveness

By: Scott Watson

Publisher: Butterworth-Heinemann

Publication Date: 29-MAY-2007

Insert Date: 02-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

The classic book The Art of War (or as it is sometimes translated, The Art of Strategy) by Sun Tzu is often used to illustrate principles that can apply to the management of business environments. The Art of War for Security Managers is the first book to apply the time-honored principles of Sun Tzu's theories of conflict to contemporary organizational security. Corporate leaders have a responsibility to make rational choices that maximize return on investment. The author posits that while conflict is inevitable, it need not be costly. The result is an efficient framework for understanding and...

903. 

Stealing the Network: The Complete Series Collector’s Edition

Stealing the Network: The Complete Series Collector’s Edition

By: Johnny Long; Ryan Russell; Timothy Mullen

Publisher: Syngress

Publication Date: 15-APR-2009

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional with technology that is real." --Jeff Moss, Founder and CEO of Black Hat The "Stealing the Network Series" has developed a passionate, cult following which includes more than 30,000 readers. Over 3,000 readers have registered their copies of Stealing on the Syngress Web site. The Stealing book signings at the Black Hat Briefings in Las Vegas have become an annual event, attracting hundreds of readers, who want to meet the authors who serve as the heroes and villains of...

904. 

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

Building a Digital Forensic Laboratory: Establishing and Managing a Successful Facility

By: Andrew Jones; Craig Valli

Publisher: Butterworth-Heinemann

Publication Date: 02-OCT-2008

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the investigations themselves. This includes a great need for information on how to cost-effectively establish and manage a computer forensics laboratory. This book meets that need: a clearly written, non-technical book on the topic of computer forensics with emphasis on the establishment and management of a computer forensics...

905. 

Network Analysis, Architecture, and Design, Third Edition

Network Analysis, Architecture, and Design, Third Edition

By: James McCabe

Publisher: Morgan Kaufmann

Publication Date: 13-JUN-2007

Insert Date: 01-JUL-2009

Slots: 1.0

Table of Contents • Start Reading

Traditionally, networking has had little or no basis in analysis or architectural development, with designers relying on technologies they are most familiar with or being influenced by vendors or consultants. However, the landscape of networking has changed so that network services have now become one of the most important factors to the success of many third generation networks. It has become an important feature of the designer?s job to define the problems that exist in his network, choose and analyze several optimization parameters during the analysis process, and then prioritize and...

906. 

Foundations of Mac OS X Leopard Security

Foundations of Mac OS X Leopard Security

By: Charles S. Edge, Jr.; William Barker; Zack Smith

Publisher: Apress

Publication Date: 30-APR-2008

Insert Date: 28-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Foundations of Mac OS X Leopard Security is written in part as a companion to the SANS Institute course for Mac OS X. It contains detailed Mac OS X security information, but also walkthroughs on securing systems. By using the SANS Institute course as a sister to the book, the focus includes both the beginning home user and the seasoned security professional not accustomed to the Mac, and allows this title to establish the "best practices" for Mac OS X for a wide audience. Additionally, the authors of the book are seasoned Mac and security professionals, having built many of the largest...

907. 

TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition

TCP/IP Sockets in C: Practical Guide for Programmers, Second Edition

By: Michael Donahoo; Kenneth Calvert

Publisher: Morgan Kaufmann

Publication Date: 17-MAR-2009

Insert Date: 27-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The Internet allows computers thousands of miles apart to exchange information through programs such as Web browsers, and nearly all of these programs gain access to network communication services through the sockets programming interface. TCP/IP Sockets in C: Practical Guide for Programmers is a quick and affordable way to gain the knowledge and skills needed to quickly develop sophisticated and powerful web-based applications. Written by two experienced networking instructors, the book's focused, tutorial-based approach enables the reader to master the tasks and techniques essential to...

908. 

Building Service-Aware Networks: The Next-Generation WAN/MAN

Building Service-Aware Networks: The Next-Generation WAN/MAN

By: 

Publisher: Cisco Press

Publication Date: 16-SEP-2009

Insert Date: 20-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Building Service-Aware Networks The Next-Generation WAN/MAN Muhammad Afaq Khan, CCIE® No. 9070 A thorough introduction to the ASR 1000 series router Building Service-Aware Networks is the insider’s guide to the next-generation Aggregation Services Router (ASR) 1000. Authored by a leading Cisco® expert, this book offers practical, hands-on coverage for the entire system lifecycle, including planning, setup and configuration, migration, and day-to-day management. Muhammad Afaq Khan systematically introduces the ASR 1000’s evolved architecture, showing how the ASR 1000 can deliver...

909. 

The Myths of Security

The Myths of Security

By: 

Publisher: O'Reilly Media, Inc.

Publication Date: 19-JUN-2009

Insert Date: 18-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is security so bad? With many more people online than just a few years ago, there are more attackers -- and they're truly motivated. Attacks are sophisticated, subtle, and harder to detect than ever. But, as Viega notes, few people take the time...

910. 

IBM/Cisco Multiprotocol Routing: An Introduction and Implementation

IBM/Cisco Multiprotocol Routing: An Introduction and Implementation

By: Jon Tate; Michael Engelbrecht; Jacek Koman

Publisher: IBM Redbooks

Publication Date: 09-MAR-2009

Insert Date: 15-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication introduces the products, concepts, and technology in the IBM System Storage™ SAN Routing portfolio, which is based on Cisco products and technology. It also discusses the features of each product, and offers examples of how you can deploy and use them. The book targets storage network administrators, system designers, architects, and IT professionals who sell, design, or administer SANs. The rapid spread and adoption of production storage area networks (SANs) has fueled the need for multiprotocol routers. The routers provide improved scalability,...

911. 

Real-Time Collision Detection

Real-Time Collision Detection

By: Christer Ericson

Publisher: CRC Press

Publication Date: 22-DEC-2004

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Written by an expert in the game industry, Christer Ericson's new book is a comprehensive guide to the components of efficient real-time collision detection systems. The book provides the tools and know-how needed to implement industrial-strength collision detection for the highly detailed dynamic environments of applications such as 3D games, virtual reality applications, and physical simulators. Of the many topics covered, a key focus is on spatial and object partitioning through a wide variety of grids, trees, and sorting methods. The author also presents a large collection of...

912. 

Penetration Tester’s Open Source Toolkit

Penetration Tester’s Open Source Toolkit

By: Chris Hurley

Publisher: Syngress

Publication Date: 12-OCT-2007

Insert Date: 12-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pentesting applications included with BackTrack 2 to the pen tester's toolkit. It includes the latest information on Snort, Nessus, Wireshark, Metasploit, Kismet and all of the other major Open Source platforms. . Perform Network Reconnaissance Master the...

913. 

The Art of Deception: Controlling the Human Element of Security

The Art of Deception: Controlling the Human Element of Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-OCT-2003

Insert Date: 11-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a...

914. 

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE® No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide...

915. 

Computer Networking: Internet Protocols in Action

Computer Networking: Internet Protocols in Action

By: 

Publisher: John Wiley & Sons

Publication Date: 03-JAN-2005

Insert Date: 04-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Hands-on networking experience, without the lab! The best way to learn about network protocols is to see them in action. But that doesn't mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and...

916. 

Netzwerksicherheit für Dummies

Netzwerksicherheit für Dummies

By: Chey Cobb

Publisher: für Dummies

Publication Date: 01-APR-2003

Insert Date: 04-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Alles spricht von Sicherheit, doch was muss man vor wem schützen? Welches Wissen sollte man als Administrator haben, um wirklich sicher zu gehen, dass das System nicht geknackt werden kann? Der Sicherheitsexperte Chey Cobb liefert Ihnen nicht nur das nötige Hintergrundwissen, um über Ihr Netzwerk und mögliche Lücken den Überblick zu behalten, sondern zeigt Ihnen in diesem ... für Dummies-Buch auch die nötigen Kniffe, wie Sie Hackattacken mit konkreten Werkzeugen abwehren. ...

917. 

Microsoft Forefront Security Administration Guide

Microsoft Forefront Security Administration Guide

By: Jesse Varsalone

Publisher: Syngress

Publication Date: 07-FEB-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides...

918. 

The Best Damn IT Security Management Book Period

The Best Damn IT Security Management Book Period

By: Bryan Cunningham; Ted Dykstra; Ed Fuller; Chris Gatford; André Gold; Matthew Paul Hoagberg; Amanda Hubbard; Chuck Little; Steve Manzuik; Greg Miles; C. Forrest Morgan; Ken Pfeil; Russ Rogers; Travis Schack; Susan Snedaker

Publisher: Syngress

Publication Date: 19-OCT-2007

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The Best Damn Security Manager's Handbook Periodhas comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedakers, this volume is an indispensable addition to a serious security professional's toolkit. Coverage includes Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration. * An all encompassing book, covering general security...

919. 

Security Guide for IBM i V6.1

Security Guide for IBM i V6.1

By: Jim Cook; Juan Carlos Cantalupo; MinHoon Lee

Publisher: IBM Redbooks

Publication Date: 29-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security...

920. 

Server Time Protocol Implementation Guide

Server Time Protocol Implementation Guide

By: Noshir Dhondy; Marcel Jaeckel; Hans-Peter Eckam; George Ng; Frank Packheiser; Bernard Tanguy

Publisher: IBM Redbooks

Publication Date: 28-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of the IBM® System z10™ , IBM System z9® , and IBM eServer™ zSeries® z990 and z890 servers. It provides improved time synchronization in a sysplex or non-sysplex configuration. This IBM Redbooks® publication will help you configure a Mixed or STP-only Coordinated Timing Network. It is intended for technical support personnel requiring information about: - Installing and configuring a Coordinated Timing Network - Using STP functions and operations - Recovering from a failed component in...