Автор: Nathan Derksen, Jeff Berg
Издательство: Wiley, Wrox
Год издания: 2006
isbn: 0-7645-7768-9
Количество страниц: 839
Язык: english
Формат: PDF
Offering guidance in an exercise-oriented format that readers will find helpful, this book is the perfect mix of tutorial and hands-on coding Written by a well-known and well-respected Flash development expert, this code-intensive guide shows readers how to work with objects, write and use various functions, handle dynamic data, and integrate with XML Contains complete coverage of the ActionScript language, including data types, variables, events, and more Addresses important topics such as understanding how code fits into a Flash project and where it goes, working with new screen technology, and scripting for video and sound
Автор: Michael Gregg
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-109-8
Количество страниц: 480
Язык: english
Формат: PDF
Remember the first time someone told you about the OSI model and described the various layers? It's probably something you never forgot. This book takes that same layered approach but applies it to network security in a new and refreshing way. It guides readers step-by-step through the stack starting with physical security and working its way up through each of the seven OSI layers. Each chapter focuses on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. The book even includes a chapter on the mythical eighth layer. It's called the people layer. It's included because security is not just about technology it also requires interaction with people, policy and office politics. This book is designed to offer readers a deeper understanding of many common vulnerabilities and the ways in which attacker's exploit, manipulate, misuse, and abuse protocols and applications. The authors guide the readers through this process by using tools such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to help readers understand how the protocols should work and what the various attacks are doing to break them. IDS is used to demonstrate the format of specific signatures and provide the reader with the skills needed to recognize and detect attacks when they occur. What makes this book unique is that it presents the material in a layer by layer approach which offers the readers a way to learn about exploits in a manner similar to which they most likely originally learned networking. This methodology makes this book a useful tool to not only security professionals but also for networking professionals, application programmers, and others. All of the primary protocols such as IP, ICMP, TCP are discussed but each from a security perspective. The authors convey the mindset of the attacker by examining how seemingly small flaws are often the catalyst of potential threats. The book considers the general kinds of things that may be monitored that would have alerted users of an attack.
Автор: Chris Hurley, Russ Rogers, Frank Thornton
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-111-X
Количество страниц: 449
Язык: english
Формат: PDF
WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks. As wireless networking continues to spread in corporate and government use, security experts need to become familiar with the methodologies, tools, and tactics used by both penetration testers and attackers to compromise wireless networks and what they can do to both accomplish their jobs as penetration testers and how to protect networks from sophisticated attackers. WarDriving and Wireless Penetration Testing brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
Автор: Jon Duckett
Издательство: Wrox
Год издания: 2005
isbn: 0-7645-8306-9
Количество страниц: 482
Язык: english
Формат: PDF
Shows Web developers how to make the transition from HTML to XHTML, an XML-based reformulation of HTML that offers greater design flexibility. Demonstrates how to work with CSS (Cascading Style Sheets)-now supported by ninety percent of browsers and integral to new site-building tools from Macromedia and others-and implement a consistent style throughout and entire site. Explains how to make a site accessible to people with impaired vision, limited hand use, dyslexia, and other issues-now a legal requirement for many sites in the U.S. and the U.K.
Автор: Paul Crowley
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-128-4
Количество страниц: 321
Язык: english
Формат: PDF
CD and DVD Forensics takes the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time when data forensics is becoming a major part of law enforcement and prosecution in the public sector, as well as corporate and system security and integrity in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how-to book that gives the reader tools to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, readers in law enforcement and corporate security and private investigators will be more effective in performing their evidence-related tasks.
Автор: Tony Bradley
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-114-4
Количество страниц: 321
Язык: english
Формат: PDF
This book is not intended to be comprehensive.There are hundreds of books on the shelf covering all areas of computer and network security.You can find many books that cover general information security in a much deeper and technical sense than this book will.There are also books that cover specific areas of security, such as encryption, firewalls, backup and recovery, and so on, in much more depth and detail than this book.
Автор: Denise Gosnell, Matthew Reynolds, Bill Forgey
Издательство: Wrox
Год издания: 2001
isbn: 1861005555
Количество страниц: 689
Язык: english
Формат: PDF
This book has been fully tested on and is compliant with the official release of NET. Almost all applications have to deal with data access in some way or another. This book will teach you how to build Visual Basic .NET applications that make effective use of databases. Visual Basic .NET is the latest version of the most widely used programming language in the world, popular with professional developers and beginners alike. Starting with a guide to the basic principles of database design, we then examine how to query databases and how to access their data - both in Windows applications and remotely using the Internet and Web Services. Every new concept is explained thoroughly with Try It Out examples, plenty of code samples, and end-of-chapter questions to test you.
Автор: Peter Wainwright
Издательство: Wrox
Год издания: 2001
isbn: 1-861004-49-4
Количество страниц: 1200
Язык: english
Формат: PDF
Perl is one of the most important scripting languages in use today. Open source, freely available, portable, versatile, and robust, powerful and easy to use, Perl is the first choice for thousands of professional web developers. But Perl is far more than a scripting language for the web. Supported by a comprehensive standard library and hundreds of third-party libraries, Perl is an increasingly popular choice for application programming. This book provides comprehensive coverage of the Perl language. It covers the fundamentals of data types and file handling through advanced features like regular expressions, object-oriented programming, threads, internationalization, and integrating Perl with the C programming language. The latest version of the language, Perl 5.6, is used throughout, with commentary for those with earlier versions
Автор: David Rule Jr., Ken Majors, Matthijs ten Seldam
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-106-3
Количество страниц: 481
Язык: русский
Формат: PDF
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtual Server allows you to consolidate 15 to 20 or even more servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs.
Автор: Jacob Babbin, Dave Kleiman, Everett F. Carter Jr
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-042-3
Количество страниц: 352
Язык: русский
Формат: PDF
As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network's overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.