Автор: Chun Hai (Bernard) Cheah
Издательство: Syngress
Год издания: 2004
isbn: 1-931836-25-6
Количество страниц: 417
Язык: english
Формат: PDF
This book fills the need of Networking professionals responsible for configuring, maintaining and troubleshooting the security of Microsoft’s Internet Information Server 6.0. The book is organized around the security services offered by IIS. The table of contents reflects the hierarchy of topics within the IIS MMC, and covers any configuration option within IIS that relates to security. In some instances, references are made to non-IIS services, but only as they relate to or support the IIS service being discussed.
Автор: Tom Owad
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-40-X
Количество страниц: 369
Язык: english
Формат: PDF (scan)
The Apple I was really the computer designed from the ground up that would kick off personal computing on a large scale. But the Apple I took the biggest step of all. Some very simple concepts are very hard to do the first time. This computer told the world that small computers should never again come with geeky front panels, but rather with human keyboards, ready to type on.
Издательство: Syngress
Год издания: 2000
isbn: 1-928994-13-X
Количество страниц: 610
Язык: english
Формат: PDF
Covers the key protocols and connectivity considerations involved with using the Cisco line of routers and access servers to interconnect central sites to branch offices and support home office workers and telecommuters. Chapters discuss point-to-point protocol, virtual private network technology, ISDN, dial-on-demand routing, configuring and backing up permanent connections, security, and network address translation in remote access networks.
Издательство: Syngress
Год издания: 2003
isbn: 1-932266-69-0
Количество страниц: 673
Язык: english
Формат: PDF
This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. The concepts and information presented in this book are one step towards providing a more secure working and living network environment. This book also exists as a guide for Security Administrators seeking to pass the Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100), which is associated with CCSP, Cisco IDS Specialist, and Cisco Security Specialist 1 certifications.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-63-9
Количество страниц: 658
Язык: english
Формат: PDF
The firewall has come to exemplify network security. While an overall security strategy requires a harmonious integration of people, process, and technologies to reduce risk, thereA???s no doubt that firewalls can be a very valuable security tool. Cisco Systems' PIX firewalls have gained market leadership by demonstrating a mix of functionality, performance, and flexibility. The objective of this book is to help you gain a deeper knowledge of Cisco PIX Firewalls. Whether you have administrative responsibilities or are studying to pass an exam such as the Cisco Secure PIX Firewall Advanced (CSPFA), this comprehensive guide will be of value to you. This is the only book in the market that focuses on covering (and going well beyond) all of the objectives of the latest CSPFA 3.0 exam (9E0-111). Through the use of detailed examples, this book provides step-by-side instructions on how to configure, maintain, and troubleshoot PIX firewalls running software version 6.2 and PIX Device Manager (PDM) version 2.1. All the latest and greatest features of PIX firewall software version 6.2 are covered, including TurboACLs, object grouping, NTP, HTTP failover replication, command level authorization, downloadable ACLs, LAN-based failover, and PPPoE.
Автор: Howard Fosdick
Издательство: Wrox
Год издания: 2005
isbn: 0-7645-7996-7
Количество страниц: 723
Язык: english
Формат: PDF
This book teaches standard Rexx, quickly and simply. It teaches you what you need to know to work with Rexx on any platform. You’ll know a language that runs anywhere—from handheld devices such as personal digital assistants, pocket PCs, Palm Pilots, and mobile and smart phones to desktop and laptop PCs, with operating systems like Windows, Linux, and others, to midrange servers from all the major vendors—right on up to the world’s largest mainframes. Rexx applies to almost any programming problem.
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)
When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
Издательство: Syngress
Год издания: 2004
isbn: 1-932266-81-X
Количество страниц: 417
Язык: english
Формат: PDF (scan)
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices?
Автор: T.Fair, M.Nordfeld
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-41-8
Количество страниц: 465
Язык: english
Формат: PDF (scan)
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-91-4
Количество страниц: 1169
Язык: english
Формат: PDF
Step-by-Step Instructions for Integrating Wired and Wireless LAN Technologies, Including Coverage of the Cisco Aironet Line of Devices. Detailed Coverage of Cisco WAN Technologies, Including Configuration and Deployment. Build a Working PIX Firewall Design, from Initial Planning to Robust Configuration.