Автор: Стюарт Мак-Клар, Джоел Скембрэй, Джордж Куртц
Издательство: McGraw-Hill, Вильямс
Год издания: 2002
isbn: 0-0721-9381-6, 5-8459-0354-8
Количество страниц: 728
Язык: русский
Формат: PDF
В книге рассматриваются принципы организации атак взломщиков и способы защиты от них. При этом основной акцент делается на описании общей методологии атак, начиная с предварительного сбора данных и заканчивая реальным проникновением в систему. Множество ссылок на информационные ресурсы позволит получить дополнительные ценные знания. Книга будет полезна для администраторов, занимающихся обеспечением безопасности сетей, для программистов, стремящихся к созданию защищенных приложений, а также для всех тех, кто интересуется вопросами сетевой защиты. Материал третьего издания значительно обновлен с учетом особенностей новейшего программного обеспечения, так что она будет интересна и тем читателям, кто знаком с предыдущими двумя изданиями.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-51-5
Количество страниц: 393
Язык: english
Формат: PDF
If you're like most people, your day includes writing checks or using a debit card at stores, using credit cards at the gas station, or using an ATM terminal to get cash. If you're among the growing numbers of Internet users, you've probably also bought a thing or two online, and might even do your banking or trade stocks online.
Издательство: Syngress
Год издания: 2001
isbn: 1-928994-31-8
Количество страниц: 626
Язык: english
Формат: PDF
As a developer, the best possible way to focus on security is to begin to think like a hacker. Examine the methods that hackers use to break into and attack Web sites and use that knowledge to prevent attacks. You already test your code for functionality, one step further is to test it for security-attempt to break into it by finding some hole that you may have unintentionally left in.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-70-1
Количество страниц: 434
Язык: english
Формат: PDF
The Complete Guide to Nokia Firewalls and VPNs. Complete Coverage of Each Nokia Enterprise Security Platform Member: IP120, IP330, IP400 Series, IP530, IP650, and IP700. Hundreds of Configuring & Implementing, Designing & Planning Sidebars, Tips, and Nokia FAQs. Step-by-Step Instructions to Configure and Administer Your Nokia Appliance. As the number two leader in the firewall/VPN appliances market, Nokia has received numerous accolades for the reliability and security of its systems. There are over 50,000 Nokia systems currently installed and, until now, no book for Nokia administrators existed. The Nokia Network Security Solutions Handbook will show network professionals how to configure and administer Nokia's newest, most popular security hardware and software products.
Издательство: Syngress
Год издания: 2002
isbn: 1-928994-59-8
Количество страниц: 514
Язык: english
Формат: PDF
Traditionally, someone had to be sitting in front of your computer to read your documents, see your e-mail, and play with your settings. Today, however, someone can be sitting in the office next door, a few floors up, or even in the next building, and have the same abilities as if he were in front of your computer. Are you using an 802.11 or Bluetooth device on your computer? Are you using a PDA to communicate with other systems or to get onto the Internet? Are you using a cellular phone to initiate a network connection back to your office? Have you just set up the latest wireless gateway at home? Are you planning on implementing a wireless solution in your office? Then you need Hack Proofing Your Wireless Network.
Издательство: Syngress
Год издания: 2002
isbn: 1-928994-77-6
Количество страниц: 546
Язык: english
Формат: PDF
Much of the content in Web sites, chat rooms, and e-mail communications was built with the ColdFusion Markup Language. The same properties that make it easy to produce applications in ColdFusion-rapid design and development, loose variable typing, and a programming markup language accessible to nonprogrammers-are attractive attributes to hackers. Hack Proofing ColdFusion will bring the reader the most comprehensive and relevant information needed to help develop and deploy secure applications.
Издательство: Syngress
Год издания: 2001
isbn: 1-928994-44-X
Количество страниц: 429
Язык: english
Формат: PDF
As a child, my father and I tried to design a birdfeeder that was easily accessible by birds but impossible to reach by squirrels. Our birdfeeders ranged from the simple to the absurd. Each design worked temporarily, but eventually the squirrels would figure out a way around our defenses. Our efforts were helping breed a smarter, craftier squirrel. The "Ultimate Squirrel-Proof Birdfeeder" scenario is similar to the challenges we face in computer security. How can we provide easy access to resources by the authorized users and still deny unauthorized access? Luckily, as Solaris System Administrators, we have some excellent tools available to us. Sun Microsystems has spent a great deal of effort in designing Solaris to be both stable and secure. This book is your reference guide for not only securing your Solaris systems, but also for securing the environment in which they operate.
Автор: Chad Todd
Издательство: Syngress
Год издания: 2001
isbn: 1-931836-49-3
Количество страниц: 722
Язык: english
Формат: PDF
The complete and authoritative guide to protecting your Windows 2000 network! Step-by-step instructions for an NT4 to Windows 2000 Security Migration. Complete coverage of Kerberos, Distributed Security Services, and Public Key Infrastructure. Additional coverage of securing a W2K server running IIS, using the Configuration Tool Set, and implementing IP security.
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-50-7
Количество страниц: 402
Язык: english
Формат: PDF
XML is quickly becoming the universal protocol for transferring information from site to site via HTTP. Whereas HTML will continue to be the language for displaying documents on the Internet, developers will find new and interesting ways to harness the power of XML to transmit, exchange, and manipulate data using XML. Validation of the XML document and of the messages going to that document is the first line of defense in hack proofing XML. The same properties that make XML a powerful language for defining data across systems make it vulnerable to attacks. More important, since many firewalls will pass XML data without filtering, a poorly constructed and invalidated document can constitute a serious system-level vulnerability. Hack ProofingA® XML will show you the ins and outs of XML and .NET security.
Издательство: Syngress
Год издания: 2001
isbn: 1-928994-27-X
Количество страниц: 690
Язык: english
Формат: PDF
Security in the virtual world of the Internet is even more confusing than in the real world. Vendors and free products abound, but according to experts, the Internet world is becoming more dangerous every day. How can that be? How can all these solutions from so many directions not solve even basic problems? The answer is not simple because the problems are so complex. Security is difficult to create and maintain. Security is messy.