Автор: Mike Pastore, Emmett Dulaney
Издательство: Sybex
Год издания: 2004
isbn: 0-7821-4350-4
Количество страниц: 540
Язык: english
Формат: PDF
This book presents the material at an intermediate technical level. Experience with and understanding of security concepts, operating systems, and applications systems will help you get a full understanding of the challenges facing you as a security professional.
Автор: Mel Reyes
Издательство: Wiley
Год издания: 2005
isbn: 0-7645-9650-0
Количество страниц: 459
Язык: english
Формат: PDF
To use this book, all you need to do is have a basic understanding of how Firefox works, how to install it, and how to find files on your computer. As you read, you will begin to unravel the marvels of coding for Firefox using the basics of Cascading Style Sheets (CSS) and JavaScript and then later diving into XML User Interface Language (XUL) and the Cross Platform Component Object Model (XPCOM). The final goal is being able to create extensions that will allow you to customize Firefox to your heart’s content. This book starts by giving you a brief overview of how to hack manually, how to hack with extensions, and then a quick glance at what you will need to do to back up critical files so that you can practice safe hacking.
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-20-5
Количество страниц: 417
Язык: english
Формат: PDF (scan)
When the Worm Turns… Analyze the technical and legal implications of “neutralizing” machines that propagate malicious worms across the Internet. Are You the Hunter or the Hunted? Discover for yourself how easy it is to cross the line from defender to aggressor, and understand the potential consequences. Reverse Engineer Working Trojans, Viruses, and Keyloggers Perform forensic analysis of malicious code attacking a Pocket PC to track down, identify, and strike back against the attacker. To Catch a Thief… Track stolen software as it propagates through peer-to-peer networks and learn to bypass MD5 checksum verification to allow multiple generations of attackers to be traced. Learn the Definition of “Hostile Corporate Takeover” in Cyberspace Find out who will own the fictional Primulus Corporation as attacker and defender wage war. Understand the Active Defense Algorithm Model (ADAM) Analyze the primary considerations of implementing an active defense strategy in your organization: ethical, legal, unintended consequences, and risk validation. See What Can Happen when the Virtual World Meets the Real World Use keyloggers, Bluetooth device exploitation, and Windows forensics to discover if your cubicle mate has been stealing more than post-it notes. Where the Wild Things Are… Follow along as a real-life “in-the-wild” format string bug is morphed into strike-back code that launches a listening shell on the attacker's own machine. Implement Passive Strike-Back Technologies Learn the strategy and implement the tools for responding to footprinting, network reconnaissance, vulnerability scanning, and exploit code.
Издательство: Syngress
Год издания: 2004
isbn: 1-932266-81-X
Количество страниц: 417
Язык: english
Формат: PDF (scan)
The security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy, microprocessors and hard drives are common and used in car Global Positioning Systems (GPS), telephones, and even portable video game systems. Black Hat Physical Device Security looks at the risk involved with network hardware, home security, security installation companies, biometric devices, and much more. This is the book that answers the questions: How can I protect against physical device exposures if I already have these systems in place? How do I factor risk from not having a secure method of communication over a network that is not trusted I have one or more tools that I use to test for these types of exposures in software and hardware that we manufacture. Do I need to do more than that? So much of the data that I would record through monitoring can be spoofed, so why record it at all? Can you break any embedded device with physical access? If we place high-level communication processes within our devices, isn’t that creating more problems then simply plugging wires that carry raw signals into these devices?
Автор: T.Fair, M.Nordfeld
Издательство: Syngress
Год издания: 2005
isbn: 1-931836-41-8
Количество страниц: 465
Язык: english
Формат: PDF (scan)
Many people have no idea of the evils that exist across the Internet or the danger that can result from simply answering an innocent-sounding e-mail or participating in a chat. Your loved ones could unknowingly be putting themselves in grave risk. By using the tools and techniques in this book to check up or spy on them, you can identify the perils, educate your loved ones about impending danger, and avoid potential physical, emotional, or financial disasters. This book was written to help make the Internet safe for families and friends; to raise awareness of the inherent dangers of the Internet; and to help parents keep their children out of trouble.
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-90-6
Количество страниц: 1329
Язык: english
Формат: PDF
The Internets explosive growth over the last decade has forced IT professionals to work even harder to secure the private networks connected to it, from erecting firewalls that keep out malicious intruders to building virtual private networks (VPNs) that permit protected, fully encrypted communications over the Internets vulnerable public infrastructure. The Best Damn Firewalls Book Period covers the most popular Firewall products, from Ciscos PIX Firewall to Microsofts ISA Server to CheckPoint NG, and all the components of an effective firewall set up. Anything needed to protect the perimeter of a network can be found in this book.
Автор: Ryan Russell
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-87-6
Количество страниц: 329
Язык: english
Формат: PDF
Stealing the Network is a book of science fiction. It's a series of short stories about characters who gain unauthorized access to equipment and information, or deny use of those resources to the people who are meant to have access to them. The characters, though sometimes well described, are not the stars of these stories. That honor belongs to the tools that the black-hat hackers use in their attacks, and also to the defensive measures arrayed against them by the hapless sysadmins who, in this volume, always lose. Consider this book, with its plentiful detail, the answer to every pretty but functionally half-baked user interface ever shown in a feature film.
Издательство: Syngress
Год издания: 2004
isbn: 1-932266-55-0
Количество страниц: 817
Язык: english
Формат: PDF
MCSE Designing Security for a Windows Server 2003 Network: Exam 70-298 is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives readers 100% coverage of the official Microsoft exam objectives plus test preparation software for the edge needed to pass the exam on your first try…
Издательство: Syngress
Год издания: 2003
isbn: 1-931836-84-1
Количество страниц: 862
Язык: english
Формат: PDF
The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide & DVD Training System (Exam 70-214) is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-214 exam objectives plus test preparation software for the edge you need to pass the exam on your first try.
Автор: Майкл Ховард, Дэвид Леблан
Издательство: Microsoft Press, Русская Редакция
Год издания: 2004
isbn: 0-7356-1722-8, 5-7502-0238-0
Количество страниц: 699
Язык: русский
Формат: PDF
В этой книге разработчики найдут советы и рекомендации по защите создаваемых приложений на всех этапах процесса создания ПО — от проектирования безопасных приложений до написания надежного кода, способного устоять перед атакам хакеров. Здесь рассказывается о моделировании угроз, планировании процесса разработки защищенных приложений, проблемах локализации и связанных с ней опасностях, недостатках файловых систем, поддержке секретности в приложениях и анализе исходного кода на предмет безопасности. Авторыиллюстрируют свой рассказ примерами программ на самых разных языках — от C# до Perl. Издание обогащено знанием, полученным авторами в процессе реализации Windows Security Push — инициативы по укреплению защиты продуктов Microsoft. Интересно, что эту книгу Билл Гейтс объявил `обязательным чтением в Microsoft.