Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


921. 

OSA-Express Implementation Guide

OSA-Express Implementation Guide

By: Bill White; Joerg Haertel; Thomas Wienert

Publisher: IBM Redbooks

Publication Date: 09-APR-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication will help you to install, tailor, and configure the Open Systems Adapter (OSA) features that are available on IBM System z10™ and IBM System z9® servers. It focuses on the hardware installation and the software definitions that are needed to provide connectivity to LAN environments. It provides information to help you with planning and system setup. It also includes helpful utilities and commands for monitoring and managing the OSA features. The target audience for this document is system engineers, network administrators, and system programmers who...

922. 

Security on IBM z/VSE

Security on IBM z/VSE

By: Helmut Hellner; Ingo Franzki; Antoinette Kaschner; Joerg Schmidbauer; Heiko Schnell

Publisher: IBM Redbooks

Publication Date: 29-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

One of a firm's most valuable resources is its data: customer lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers are not only difficult to detect and prevent, they could have been using resources without the business even being...

923. 

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

By: 

Publisher: John Wiley & Sons

Publication Date: 21-APR-2008

Insert Date: 29-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you'll be able to take action. ...

924. 

Here's the guide you need for a smooth transition to IPv6. While every enterprise will have some individual issues to manage, this guide will help you decide on a transition strategy, develop a plan, execute it, and verify progress. You'll understand the common tasks and recognize the risks and limitations of IPv6. Follow the guidelines, use the checklists, and you will find that making the transition is no longer intimidating; in fact, it may even require fewer resources than you anticipate. ...

925. 

Head First Networking

Head First Networking

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 27-MAY-2009

Insert Date: 28-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can. With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know,...

926. 

JUNOS® FOR DUMMIES®

JUNOS® FOR DUMMIES®

By: 

Publisher: For Dummies

Publication Date: 29-SEP-2008

Insert Date: 06-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you need for switching, routing, security, interface configuration, and more. Now, you can go inside JUNOS software and understand everything you need to know about operating a network with JUNOS. You’ll learn how the control plane handles packet delivery and establishes...

927. 

VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment

VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment

By: 

Publisher: Prentice Hall

Publication Date: 22-JUN-2009

Insert Date: 05-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere. This book reflects the same...

928. 

Netzwerke für Dummies®

Netzwerke für Dummies®

By: Doug Lowe

Publisher: für Dummies

Publication Date: 25-NOV-2005

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Bis ein Netzwerk richtig läuft, gibt es viel zu tun: Der Netzwerkexperte Doug Lowe zeigt Ihnen in "Netzwerke für Dummies", was Sie bei der Einführung und Administration eines Netzwerks beachten müssen. Er gibt Ihnen das Grundlagenwissen zu Netzwerken an die Hand und erklärt, wie Sie ein Netzwerk einrichten, LAN und WLAN nutzen. Sie erfahren, wie Sie Ihr eigenes Netzwerk aufbauen - von der Auswahl des Betriebssystems über die Auswahl der richtigen Kabel bis hin zur Herstellung einer Internetverbindung. Dabei zeigt er Ihnen, wie Sie die verschiedenen Dienste mit Windows Server 2003/2008...

929. 

The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition

The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 18-AUG-2008

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the capabilities, application, and design of LAN switches and switched internetworks and examines the significant changes that have taken place since the publication of the first edition seven years ago. You’re sure to appreciate the witty writing style and easy-to-follow format on such an often-complicated subject matter. ...

930. 

SSH: kurz & gut

SSH: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-OCT-2006

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Wenn Daten Ihren Rechner verlassen und sich ungeschützt auf den Weg durchs Internet machen, sind sie permanent in Gefahr, von unbefugten Dritten abgefangen und gelesen zu werden. SSH, die Secure Shell, bietet eine zuverlässige Lösung für zahlreiche Probleme der Netzwerksicherheit: SSH sichert den Anmeldevorgang auf entfernten Systemen und den Dateitransfer zwischen verschiedenen Rechnern, ermöglicht die Erzeugung geschützter "Tunnel" sowie die gesicherte Ausführung von Prozessen auf anderen Computern. Die zweite Auflage von SSH - kurz & gut behandelt die Protokollversion 2, ihre freie...

931. 

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

By: James A. Whittaker; Mike Andrews

Publisher: Addison-Wesley Professional

Publication Date: 02-FEB-2006

Insert Date: 30-APR-2009

Slots: 1.0

Table of Contents • Start Reading

"The techniques in this book are not an option for testers–they are mandatory and these are the guys to tell you how to apply them!" –HarryRobinson, Google. Rigorously test and improve the security of all your Web software! It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software. In this book, two renowned experts address every...

932. 

WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks

WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks

By: 

Publisher: John Wiley & Sons

Publication Date: 02-JUL-2007

Insert Date: 21-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Written by two veteran Windows security experts—one a Microsoft Security MVP and Foundstone Security Consultant, and the other a former senior member of Microsoft's Security Engineering Team—this essential resource prepares end users and technical administrators to handle various security problems that exist in Windows Vista as well as possible future threats. Offering in-depth coverage of all significant new security technologies in Windows Vista, this book addresses User Account Control, the new Firewall, Internet Explorer 7.0, Windows Defender, Service Hardening, and BitLocker. ...

933. 

TCP/IP Guide

TCP/IP Guide

By: 

Publisher: No Starch Press

Publication Date: 04-OCT-2005

Insert Date: 16-APR-2009

Slots: 1.0

Table of Contents • Start Reading

The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a...

934. 

Beautiful Security

Beautiful Security

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 28-APR-2009

Insert Date: 15-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic. Criminals succeed by exercising enormous creativity, and those defending against them must do the same. Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include: The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce...

935. 

OpenVPN: kurz & gut

OpenVPN: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-JUL-2007

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Virtuelle Private Netzwerke bauen einen Tunnel zwischen zwei Rechnern auf, durch den jeglicher Datenverkehr verschlüsselt fließt. Sie sind aus dem modernen Arbeitsleben nicht mehr wegzudenken und bieten beispielsweise externen Mitarbeitern die Möglichkeit, von außen über einen sicheren VPN-Zugang auf das Firmennetzwerk zuzugreifen. OpenVPN ist ein freies Client/Server-VPN-Programm, das die Daten mit SSL verschlüsselt und das für alle gängigen Plattformen verfügbar ist.M Sven Riedel erklärt, wie man OpenVPN auf den verschiedenen Betriebssystemen installiert, und stellt die grundlegenden...

936. 

Windows Vista Security: Praxisorientierte Sicherheit für Profis

Windows Vista Security: Praxisorientierte Sicherheit für Profis

By: Marcus Nasarek

Publisher: O'Reilly Verlag

Publication Date: 15-JAN-2007

Insert Date: 14-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Wann immer über das neue Betriebssystem von Microsoft berichtet wird - Windows Vista und Sicherheit werden grundsätzlich in einem Atemzug genannt. Die wichtigsten Neuerungen in Vista betreffen den Bereich Sicherheit, gegenüber XP wurden die Sicherheitsfeatures deutlich erweitert. Als Systemadministrator oder IT-Architekt ist Ihre Zeit knapp bemessen: Dieses Buch bietet Ihnen einen schnellen Überblick und konkrete Anleitungen, um allen Sicherheitsanforderungen mit Vista gerecht zu werden. Leitfaden für die sichere Konfiguration des Vista-Clients: Vorgestellt werden alle neuen...

937. 

As data centers grow in size and complexity, enterprises are adopting server virtualization technologies such as VMware, VMotion, NIC teaming, and server clustering to achieve increased efficiency of resources and to ensure business resilience. However, these technologies often involve significant expense and challenges to deal with complex multisite interconnections and to maintain the high availability of network resources and applications. Interconnecting Data Centers Using VPLS presents Virtual Private LAN Service (VPLS) based solutions that provide high-speed, low-latency network and...

938. 

OS X Exploits and Defense

OS X Exploits and Defense

By: David Harley

Publisher: Syngress

Publication Date: 25-APR-2008

Insert Date: 08-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post compromise concealment or distributed denial of service, knowing how the system is vulnerable and how to defend it is critical to computer security. This book brings all this information together, providing a solid basis to help you succeed in protecting your organization from risk. * Cuts through the hype with a serious discussion of the security vulnerabilities of the Mac OS X operating system * Reveals...

939. 

Configuring Check Point NGX VPN-1/FireWall-1

Configuring Check Point NGX VPN-1/FireWall-1

By: Robert Stephens; Barry Stiefel; Stephen Watkins; Simon Desmeules; Eli Faskha

Publisher: Syngress

Publication Date: 01-OCT-2005

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

Configuring Check Point NGX VPN-1/FireWall-1 is the perfect reference for anyone migrating from earlier versions of Check Point's flagship firewall/VPN product as well as those deploying VPN-1/FireWall-1 for the first time. This book covers all of NGX's dramatic changes and new, enhanced features. You'll learn how to secure the integrity of your network's data, communications, and applications from a multitude of blended threats. Protect your network against breaches of its perimeter and Internet access points. Also, learn to recognize and prevent internal threats. Written by an all-star team...

940. 

Scene of the Cybercrime

Scene of the Cybercrime

By: Debra Littlejohn Shinder; Michael Cross

Publisher: Syngress

Publication Date: 16-JUN-2008

Insert Date: 26-MAR-2009

Slots: 1.0

Table of Contents • Start Reading

When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of "Scene of the Cybercrime" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement...