Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Help

Networking


1. 

Near Field Communication

Near Field Communication

By: Sheli McHugh; Kristen Yarmey

Publisher: Morgan & Claypool Publishers

Publication Date: 01-MAR-2014

Insert Date: 11-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Near Field Communication is a radio frequency technology that allows objects, such as mobile phones, computers, tags, or posters, to exchange information wirelessly across a small distance. This report on the progress of Near Field Communication reviews the features and functionality of the technology and summarizes the broad spectrum of its current and anticipated applications. We explore the development of NFC technology in recent years, introduce the major stakeholders in the NFC ecosystem, and project its movement toward mainstream adoption. Several examples of early implementation of NFC...

2. 

Kali Linux – Assuring Security by Penetration Testing

Kali Linux – Assuring Security by Penetration Testing

By: Tedi Heriyanto; Lee Allen; Shakeel Ali

Publisher: Packt Publishing

Publication Date: 07-APR-2014

Insert Date: 10-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Master the art of penetration testing Learn penetration testing techniques with an in-depth coverage of Kali Linux distribution Explore the insights and importance of testing your corporate network systems before the hackers strike Understand the practical spectrum of security tools by their exemplary usage, configuration, and benefits In Detail Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing...

3. 

Telecommunication Network Economics

Telecommunication Network Economics

By: Patrick Maillé; Bruno Tuffin

Publisher: Cambridge University Press

Publication Date: 28-FEB-2014

Insert Date: 05-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Presenting a balance of theory and practice, this up-to-date guide provides a comprehensive overview of the key issues in telecommunication network economics, as well as the mathematical models behind the solutions. These mathematical foundations enable the reader to understand the economic issues arising at this pivotal time in network economics, from business, research and political perspectives. This is followed by a unique practical guide to current topics, including app stores, volume-based pricing, auctions for advertisements, search engine business models, the network neutrality...

4. 

Advanced Communication Protocol Technologies

Advanced Communication Protocol Technologies

By: Katalin Tarnay; Gusztáv Adamis; Tibor Dulai

Publisher: IGI Global

Publication Date: 30-JUN-2011

Insert Date: 03-APR-2014

Slots: 1.0

Table of Contents • Start Reading

The rapid improvements brought about by modern telecommunications are made possible by unfettered transmission of information, which relies on the ability to send, receive and properly utilize communication. Advanced Communication Protocol Technologies: Solutions, Methods, and Applications explores the complications and solutions created by communication required between ever-expanding technologies. The research in this book encompasses the fundamentals of protocol functions and protocol operations, the controlling protocols of ISDN and mobile networks, the evolution of IP-based protocols,...

5. 

Server Time Protocol Implementation Guide

Server Time Protocol Implementation Guide

By: Octavian Lascu; Hans-Peter Eckam; George Kozakos; Paulo Vitor Pereira

Publisher: IBM Redbooks

Publication Date: 28-JUN-2013

Insert Date: 01-APR-2014

Slots: 1.0

Table of Contents • Start Reading

Server Time Protocol (STP) is a server-wide facility that is implemented in the Licensed Internal Code (LIC) of IBM® zEnterprise EC12 (zEC12), IBM zEnterprise 196 (z196), IBM zEnterprise 114 (z114), IBM System z10®, and IBM System z9®. It provides improved time synchronization in both a sysplex or non-sysplex configuration. This IBM Redbooks® publication will help you configure a Mixed Coordinated Timing Network (CTN) or an STP-only CTN. It is intended for technical support personnel requiring information about: -Installing and configuring a Coordinated Timing Network -Using STP functions...

6. 

Deploying IP and MPLS QoS for Multiservice Networks

Deploying IP and MPLS QoS for Multiservice Networks

By: John William Evans; Clarence Filsfils

Publisher: Morgan Kaufmann

Publication Date: 26-JUL-2010

Insert Date: 29-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

QoS, short for “quality of service,? is one of the most important goals a network designer or administrator will have. Ensuring that the network runs at optimal precision with data remaining accurate, traveling fast, and to the correct user are the main objectives of QoS. The various media that fly across the network including voice, video, and data have different idiosyncrasies that try the dimensions of the network. This malleable network architecture poses an always moving potential problem for the network professional. The authors have provided a comprehensive treatise on this...

7. 

Cyberwar and Information Warfare

Cyberwar and Information Warfare

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 15-AUG-2011

Insert Date: 28-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Integrating empirical, conceptual, and theoretical approaches, this book presents the thinking of researchers and experts in the fields of cybersecurity, cyberdefense, and information warfare. The aim of this book is to analyze the processes of information warfare and cyberwarfare through the historical, operational and strategic perspectives of cyberattacks. Cyberwar and Information Warfare is of extreme use to experts in security studies and intelligence studies, defense universities, ministries of defense and security, and anyone studying political sciences, international relations,...

8. 

Rough Cuts
Information Security: Principles and Practices, Second Edition

Information Security: Principles and Practices, Second Edition

By: Mark S. Merkow; Jim Breithaupt

Publisher: Pearson Certification

Publication Date: 05-JUN-2014

Insert Date: 28-MAR-2014

Table of Contents • Start Reading

This is the Rough Cut version of the printed book. Fully updated for today's technologies and best practices, Information Security: Principles and Practices, Second Edition thoroughly covers all 10 domains of today's Information Security Common Body of Knowledge. Authored by two of the world's most experienced IT security practitioners, it brings together foundational knowledge that prepares readers for real-world environments, making it ideal for introductory courses in information security, and for anyone interested in entering the field. This edition addresses today's newest trends,...

9. 

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World

By: Hamid Nemati

Publisher: IGI Global

Publication Date: 31-DEC-2013

Insert Date: 26-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein....

10. 

Learning Nagios 4

Learning Nagios 4

By: Wojciech Kocjan

Publisher: Packt Publishing

Publication Date: 21-MAR-2014

Insert Date: 25-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn how to set up Nagios 4 in order to monitor your systems efficiently Set up, configure, and manage Nagios 4 to secure and monitor your system Learn how to use libnagios and NERD to process and handle queries Packed with lots of tips, tricks and illustrations to explain the Nagios configuration and monitoring concepts in a simplified manner In Detail One of the most important challenges in system monitoring is to detect and report any malfunctioning system or device as soon as possible, so that you as an administrator are aware of the problem before a user runs into...

11. 

Computer Forensics with FTK

Computer Forensics with FTK

By: Fernando Carbone

Publisher: Packt Publishing

Publication Date: 20-MAR-2014

Insert Date: 22-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Enhance your computer forensics knowledge through illustrations, tips, tricks, and practical real-world scenarios Receive step-by-step guidance on conducting computer investigations Explore the functionality of FTK Imager and learn to use its features effectively Conduct increasingly challenging and more applicable digital investigations for generating effective evidence using the FTK platform In Detail With the increase of electronic crimes and the need to constantly audit the proper use of resources, companies need qualified professionals and appropriate tools to carry...

12. 

Large Scale Network-Centric Distributed Systems

Large Scale Network-Centric Distributed Systems

By: 

Publisher: Wiley-IEEE Press

Publication Date: 28-OCT-2013

Insert Date: 22-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A highly accessible reference offering a broad range of topics and insights on large scale network-centric distributed systems Evolving from the fields of high-performance computing and networking, large scale network-centric distributed systems continues to grow as one of the most important topics in computing and communication and many interdisciplinary areas. Dealing with both wired and wireless networks, this book focuses on the design and performance issues of such systems. Large Scale Network-Centric Distributed Systems provides in-depth coverage ranging from ground-level...

13. 

Cyber Conflict: Competing National Perspectives

Cyber Conflict: Competing National Perspectives

By: Daniel Ventre

Publisher: John Wiley & Sons

Publication Date: 14-MAY-2012

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power. Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational...

14. 

Threat Modeling: Designing for Security

Threat Modeling: Designing for Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems...

15. 

Computer-Forensik, 6th Edition

Computer-Forensik, 6th Edition

By: Alexander Geschonneck

Publisher: dpunkt

Publication Date: 18-MAR-2014

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Dieses Buch zeigt, wie sich Unternehmen auf die Analyse von Computerstraftaten vorbereiten können, welche Maßnahmen »im Fall der Fälle« (und danach) zu ergreifen sind und wie man bei Bedarf Behörden einbezieht. Beschrieben werden u.a. Post-mortem-Analyse, geeignete Toolkits, forensische Analyse unter Unix und Windows sowie bei PDAs und Routern.In der 6. Auflage wurden Statistiken und Toolbeschreibungen aktualisiert sowie neueste rechtliche Entwicklungen aufgenommen. Hinzugekommen sind neue Ansätze der strukturierten Untersuchung von Hauptspeicherinhalten und die Analyse von Malware....

16. 

Analyzing how hacks are done, so as to stop them in the future Reverse engineering is the process of analyzing hardware or software and understanding it, without having access to the source code or design documents. Hackers are able to reverse engineer systems and exploit what they find with scary results. Now the good guys can use the same tools to thwart these threats. Practical Reverse Engineering goes under the hood of reverse engineering for security analysts, security engineers, and system programmers, so they can learn how to use these same processes to stop hackers in their...

17. 

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

By: 

Publisher: John Wiley & Sons

Publication Date: 04-NOV-2013

Insert Date: 21-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

A must-have, hands-on guide for working in the cybersecurity profession Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a...

18. 

Unmasking the Social Engineer: The Human Element of Security

Unmasking the Social Engineer: The Human Element of Security

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Learn to identify the social engineer by non-verbal behavior Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals...

19. 

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

Hacking Point of Sale: Payment Application Secrets, Threats, and Solutions

By: 

Publisher: John Wiley & Sons

Publication Date: 17-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Must-have guide for professionals responsible for securing credit and debit card transactions As recent breaches like Target and Neiman Marcus show, payment card information is involved in more security breaches than any other data type. In too many places, sensitive card data is simply not protected adequately. Hacking Point of Sale is a compelling book that tackles this enormous problem head-on. Exploring all aspects of the problem in detail - from how attacks are structured to the structure of magnetic strips to point-to-point encryption, and more – it's packed with practical...

20. 

Data-Driven Security: Analysis, Visualization and Dashboards

Data-Driven Security: Analysis, Visualization and Dashboards

By: 

Publisher: John Wiley & Sons

Publication Date: 24-FEB-2014

Insert Date: 19-MAR-2014

Slots: 1.0

Table of Contents • Start Reading

Uncover hidden patterns of data and respond with countermeasures Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful data analysis and visualization. You'll soon understand how to harness and wield data, from collection and storage to management and analysis as well as visualization and presentation. Using a hands-on approach with real-world examples, this book shows you how to gather feedback, measure the effectiveness of your security methods, and...