Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


921. 

Cisco LAN Switching Configuration Handbook Second Edition A concise reference for implementing the most frequently used features of the Cisco Catalyst family of switches Steve McQuerry, CCIE® No. 6108 David Jansen, CCIE No. 5952 David Hucaby, CCIE No. 4594 Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series of chapters that provide...

922. 

Computer Networking: Internet Protocols in Action

Computer Networking: Internet Protocols in Action

By: 

Publisher: John Wiley & Sons

Publication Date: 03-JAN-2005

Insert Date: 04-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Hands-on networking experience, without the lab! The best way to learn about network protocols is to see them in action. But that doesn't mean that you need a lab full of networking equipment. This revolutionary text and its accompanying CD give readers realistic hands-on experience working with network protocols, without requiring all the routers, switches, hubs, and PCs of an actual network. Computer Networking: Internet Protocols in Action provides packet traces of real network activity on CD. Readers open the trace files using Ethereal, an open source network protocol analyzer, and...

923. 

Netzwerksicherheit für Dummies

Netzwerksicherheit für Dummies

By: Chey Cobb

Publisher: für Dummies

Publication Date: 01-APR-2003

Insert Date: 04-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Alles spricht von Sicherheit, doch was muss man vor wem schützen? Welches Wissen sollte man als Administrator haben, um wirklich sicher zu gehen, dass das System nicht geknackt werden kann? Der Sicherheitsexperte Chey Cobb liefert Ihnen nicht nur das nötige Hintergrundwissen, um über Ihr Netzwerk und mögliche Lücken den Überblick zu behalten, sondern zeigt Ihnen in diesem ... für Dummies-Buch auch die nötigen Kniffe, wie Sie Hackattacken mit konkreten Werkzeugen abwehren. ...

924. 

Microsoft Forefront Security Administration Guide

Microsoft Forefront Security Administration Guide

By: Jesse Varsalone

Publisher: Syngress

Publication Date: 07-FEB-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides...

925. 

The Best Damn IT Security Management Book Period

The Best Damn IT Security Management Book Period

By: Bryan Cunningham; Ted Dykstra; Ed Fuller; Chris Gatford; André Gold; Matthew Paul Hoagberg; Amanda Hubbard; Chuck Little; Steve Manzuik; Greg Miles; C. Forrest Morgan; Ken Pfeil; Russ Rogers; Travis Schack; Susan Snedaker

Publisher: Syngress

Publication Date: 19-OCT-2007

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The Best Damn Security Manager's Handbook Periodhas comprehensive coverage of all management isuses facing IT and security professionals. Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedakers, this volume is an indispensable addition to a serious security professional's toolkit. Coverage includes Business Continuity, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration. * An all encompassing book, covering general security...

926. 

Security Guide for IBM i V6.1

Security Guide for IBM i V6.1

By: Jim Cook; Juan Carlos Cantalupo; MinHoon Lee

Publisher: IBM Redbooks

Publication Date: 29-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a rich set of security features and services that pertain to the goals of authentication, authorization, integrity, confidentiality, and auditing. However, if an IBM Client does not know that a service, such as a virtual private network (VPN) or hardware cryptographic support, exists on the system, it will not use it. In addition, there are more and more security...

927. 

Server Time Protocol Implementation Guide

Server Time Protocol Implementation Guide

By: Noshir Dhondy; Marcel Jaeckel; Hans-Peter Eckam; George Ng; Frank Packheiser; Bernard Tanguy

Publisher: IBM Redbooks

Publication Date: 28-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of the IBM® System z10™ , IBM System z9® , and IBM eServer™ zSeries® z990 and z890 servers. It provides improved time synchronization in a sysplex or non-sysplex configuration. This IBM Redbooks® publication will help you configure a Mixed or STP-only Coordinated Timing Network. It is intended for technical support personnel requiring information about: - Installing and configuring a Coordinated Timing Network - Using STP functions and operations - Recovering from a failed component in...

928. 

OSA-Express Implementation Guide

OSA-Express Implementation Guide

By: Bill White; Joerg Haertel; Thomas Wienert

Publisher: IBM Redbooks

Publication Date: 09-APR-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

This IBM® Redbooks® publication will help you to install, tailor, and configure the Open Systems Adapter (OSA) features that are available on IBM System z10™ and IBM System z9® servers. It focuses on the hardware installation and the software definitions that are needed to provide connectivity to LAN environments. It provides information to help you with planning and system setup. It also includes helpful utilities and commands for monitoring and managing the OSA features. The target audience for this document is system engineers, network administrators, and system programmers who...

929. 

Security on IBM z/VSE

Security on IBM z/VSE

By: Helmut Hellner; Ingo Franzki; Antoinette Kaschner; Joerg Schmidbauer; Heiko Schnell

Publisher: IBM Redbooks

Publication Date: 29-MAY-2009

Insert Date: 03-JUN-2009

Slots: 1.0

Table of Contents • Start Reading

One of a firm's most valuable resources is its data: customer lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™ system has extensive capabilities to simultaneously share the firm's data among multiple users and protect them. Threats to this data come from a variety of sources. Insider threats, as well as malicious hackers are not only difficult to detect and prevent, they could have been using resources without the business even being...

930. 

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control

By: 

Publisher: John Wiley & Sons

Publication Date: 21-APR-2008

Insert Date: 29-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This guide presents real-world hacking scenarios along with complete implementation guidance for the right NAP/NAC solution, so you can understand which solution makes the most sense based upon the most prevalent risks in your environment. Follow the actual steps hackers take to perform specific exploits, determine which security solutions will stop the exploits from happening, and learn all about the standard components of any NAP/NAC solution. By learning to analyze a security posture, set policies for device analysis, and communicate with the device, you'll be able to take action. ...

931. 

Here's the guide you need for a smooth transition to IPv6. While every enterprise will have some individual issues to manage, this guide will help you decide on a transition strategy, develop a plan, execute it, and verify progress. You'll understand the common tasks and recognize the risks and limitations of IPv6. Follow the guidelines, use the checklists, and you will find that making the transition is no longer intimidating; in fact, it may even require fewer resources than you anticipate. ...

932. 

Head First Networking

Head First Networking

By: ;

Publisher: O'Reilly Media, Inc.

Publication Date: 27-MAY-2009

Insert Date: 28-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory in a way that only Head First can. With this book, you'll learn skills through a variety of genuine scenarios, from fixing a malfunctioning office network to planning a network for a high-technology haunted house. You'll learn exactly what you need to know,...

933. 

JUNOS® FOR DUMMIES®

JUNOS® FOR DUMMIES®

By: 

Publisher: For Dummies

Publication Date: 29-SEP-2008

Insert Date: 06-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you need for switching, routing, security, interface configuration, and more. Now, you can go inside JUNOS software and understand everything you need to know about operating a network with JUNOS. You’ll learn how the control plane handles packet delivery and establishes...

934. 

VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment

VMware vSphere™ and Virtual Infrastructure Security: Securing the Virtual Environment

By: 

Publisher: Prentice Hall

Publication Date: 22-JUN-2009

Insert Date: 05-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Complete Hands-On Help for Securing VMware vSphere and Virtual Infrastructure by Edward Haletky, Author of the Best Selling Book on VMware, VMware ESX Server in the Enterprise As VMware has become increasingly ubiquitous in the enterprise, IT professionals have become increasingly concerned about securing it. Now, for the first time, leading VMware expert Edward Haletky brings together comprehensive guidance for identifying and mitigating virtualization-related security threats on all VMware platforms, including the new cloud computing platform, vSphere. This book reflects the same...

935. 

Netzwerke für Dummies®

Netzwerke für Dummies®

By: Doug Lowe

Publisher: für Dummies

Publication Date: 25-NOV-2005

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Bis ein Netzwerk richtig läuft, gibt es viel zu tun: Der Netzwerkexperte Doug Lowe zeigt Ihnen in "Netzwerke für Dummies", was Sie bei der Einführung und Administration eines Netzwerks beachten müssen. Er gibt Ihnen das Grundlagenwissen zu Netzwerken an die Hand und erklärt, wie Sie ein Netzwerk einrichten, LAN und WLAN nutzen. Sie erfahren, wie Sie Ihr eigenes Netzwerk aufbauen - von der Auswahl des Betriebssystems über die Auswahl der richtigen Kabel bis hin zur Herstellung einer Internetverbindung. Dabei zeigt er Ihnen, wie Sie die verschiedenen Dienste mit Windows Server 2003/2008...

936. 

The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition

The All-New Switch Book: The Complete Guide to LAN Switching Technology, Second Edition

By: 

Publisher: John Wiley & Sons

Publication Date: 18-AUG-2008

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

This much-needed update to the bestselling guide on the extensive changes to the local area networks (LAN) switching technologies explains why LAN switching technologies are critical to network design. This in-depth guide covers the capabilities, application, and design of LAN switches and switched internetworks and examines the significant changes that have taken place since the publication of the first edition seven years ago. You’re sure to appreciate the witty writing style and easy-to-follow format on such an often-complicated subject matter. ...

937. 

SSH: kurz & gut

SSH: kurz & gut

By: Sven Riedel

Publisher: O'Reilly Verlag

Publication Date: 15-OCT-2006

Insert Date: 01-MAY-2009

Slots: 1.0

Table of Contents • Start Reading

Wenn Daten Ihren Rechner verlassen und sich ungeschützt auf den Weg durchs Internet machen, sind sie permanent in Gefahr, von unbefugten Dritten abgefangen und gelesen zu werden. SSH, die Secure Shell, bietet eine zuverlässige Lösung für zahlreiche Probleme der Netzwerksicherheit: SSH sichert den Anmeldevorgang auf entfernten Systemen und den Dateitransfer zwischen verschiedenen Rechnern, ermöglicht die Erzeugung geschützter "Tunnel" sowie die gesicherte Ausführung von Prozessen auf anderen Computern. Die zweite Auflage von SSH - kurz & gut behandelt die Protokollversion 2, ihre freie...

938. 

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

How to Break Web Software: Functional and Security Testing of Web Applications and Web Services

By: James A. Whittaker; Mike Andrews

Publisher: Addison-Wesley Professional

Publication Date: 02-FEB-2006

Insert Date: 30-APR-2009

Slots: 1.0

Table of Contents • Start Reading

"The techniques in this book are not an option for testers–they are mandatory and these are the guys to tell you how to apply them!" –HarryRobinson, Google. Rigorously test and improve the security of all your Web software! It’s as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, and services. If you’re vulnerable, you’d better discover these attacks yourself, before the black hats do. Now, there’s a definitive, hands-on guide to security-testing any Web-based software: How to Break Web Software. In this book, two renowned experts address every...

939. 

WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks

WINDOWS VISTA™ SECURITY: Securing Vista Against Malicious Attacks

By: 

Publisher: John Wiley & Sons

Publication Date: 02-JUL-2007

Insert Date: 21-APR-2009

Slots: 1.0

Table of Contents • Start Reading

Written by two veteran Windows security experts—one a Microsoft Security MVP and Foundstone Security Consultant, and the other a former senior member of Microsoft's Security Engineering Team—this essential resource prepares end users and technical administrators to handle various security problems that exist in Windows Vista as well as possible future threats. Offering in-depth coverage of all significant new security technologies in Windows Vista, this book addresses User Account Control, the new Firewall, Internet Explorer 7.0, Windows Defender, Service Hardening, and BitLocker. ...

940. 

TCP/IP Guide

TCP/IP Guide

By: 

Publisher: No Starch Press

Publication Date: 04-OCT-2005

Insert Date: 16-APR-2009

Slots: 1.0

Table of Contents • Start Reading

The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a...