Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Features the real world cases of botnet attacks to underscore the need for action. This title explains botnet fundamentals using real world examples. It covers what they are, how they operate, and the environment and technology that makes them possible. It analyzes botnets for opportunities to detect, track, and remove them.
A guide to CompTIA's RFID+ Security exam.
Discusses the hard questions cyber crime investigators are asking. This book includes chapters that discuss the methodologies behind cyber investigations; and frequently encountered pitfalls. It examines issues relating to cyber crime definitions, the electronic crime scene, and preparing and presenting a cyber crime investigation in court.
Offers an explanation of information security, physical security, and why approaching these two different types of security in one way (called convergence) is so critical in the changing security landscape. This work details enterprise security management as it relates to incident detection and incident management.
Explains what is meant by Certification and Accreditation and why the process is mandated by federal law. This book cites and discusses the different Certification and Accreditation laws including the three leading types of C&A: NIST, NIAP, and DITSCAP. It also explains how to prepare for, perform, and document a C&A project.
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.
Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.
Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
The Real MCTS/MCITP Exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. This title helps newcomers to Microsoft certification, study for and pass MCTS exam for Active Directory on their way to MCITP certification.
Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.
The Microsoft Certified Technology Specialist (MCTS)/MCITP exam is designed to validate Windows Server 2008 network infrastructure configuration skills. It will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. This title addresses both newcomers to MS certification, and those who are upgrading from Windows 2003.
A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.
Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.
Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network. This book covers a variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems.
Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.
Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this configuration guide allows you to configure these appliances to allow remote and mobile access for employees.
Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.
A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.
Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.
Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and hosting Web applications and services. For the average SysAdmin, it presents a difficult migration path. This title aims to help the SysAdmin get IIS 7 up and running as quickly as possible.
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. This book identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, and email threats.
Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers of a network. It includes chapters that focus on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. It features a chapter on the mythical eighth layer: the people layer.
Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.
Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.