![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
Luiz Augusto de Carvalho - WANOPT Wide area network
Specialist "Telecommunications is usually responsible for a large percentage of the IT infrastructure costs, usually only surpassed by personnel. Therefore identifying savings, even small in terms of percentage in a large corporate network may mean hundreds of thousands of dollars per month." "The techniques described in this book already helped and continuous helping hundreds of organizations to save millions of dollars with their telecommunications infra-structures." Contents Presents the concepts of the WAN design algorithms Provides practical examples of algorithms and demonstrates how to deploy them Discusses cases where the techniques described were deployed with favorable results Discusses negotiating and managerial strategies Presents a practical guide about how to implement and manage a large WAN
Advances in mobile computing, wireless communications, mobile positioning, and sensor technologies have given rise to a new class of context-aware mobile and ubiquitous applications. ""Context-Aware Mobile and Ubiquitous Computing for Enhanced Usability: Adaptive Technologies and Applications"" provides thorough insights and significant research developments on mobile technologies and services. This significant reference book explains how users of such applications access intelligent and adaptable information services, maximizing convenience and minimizing intrusion.
With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.
As network science and technology continues to gain popularity, it becomes imperative to develop procedures to examine emergent network domains, as well as classical networks, to help ensure their overall optimization. Advanced Methods for Complex Network Analysis features the latest research on the algorithms and analysis measures being employed in the field of network science. Highlighting the application of graph models, advanced computation, and analytical procedures, this publication is a pivotal resource for students, faculty, industry practitioners, and business professionals interested in theoretical concepts and current developments in network domains.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
Fuzzing is often described as a "black box" software testing
technique. It works by automatically feeding a program multiple
input iterations in an attempt to trigger an internal error
indicative of a bug, and potentially crash it. Such program errors
and crashes are indicative of the existence of a security
vulnerability, which can later be researched and fixed.
In this book, we aim to describe how to make a computer bend to
your will by finding and exploiting vulnerabilities specifically in
Web applications. We will describe common security issues in Web
applications, tell you how to find them, describe how to exploit
them, and then tell you how to fix them. We will also cover how and
why some hackers (the bad guys) will try to exploit these
vulnerabilities to achieve their own end. We will also try to
explain how to detect if hackers are actively trying to exploit
vulnerabilities in your own Web applications.
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear,
concise, and thorough path to migrate from previous versions of ISA
Server to ISA Server 2006. ISA Server 2006 is an incremental
upgrade from ISA Server 2004, this book provides all of the tips
and tricks to perform a successful migration, rather than rehash
all of the features which were rolled out in ISA Server 2004. Also,
learn to publish Exchange Server 2007 with ISA 2006 and to build a
DMZ.
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
System administration is about the design, running and maintenance
of human-computer systems. Examples of human-computer systems
include business enterprises, service institutions and any
extensive machinery that is operated by, or interacts with human
beings. System administration is often thought of as the
technological side of a system: the architecture, construction and
optimization of the collaborating parts, but it also occasionally
touches on softer factors such as user assistance (help desks),
ethical considerations in deploying a system, and the larger
implications of its design for others who come into contact with
it.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
This book will teach the reader how to make the most of their
WRT54G series hardware. These handy little inexpensive devices can
be configured for a near endless amount of networking tasks. The
reader will learn about the WRT54G s hardware components, the
different third-party firmware available and the differences
between them, choosing the firmware that is right for you, and how
to install different third-party firmware distributions. Never
before has this hardware been documented in this amount of detail,
which includes a wide-array of photographs and complete listing of
all WRT54G models currently available, including the
WRTSL54GS.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.
A comprehensive look at the emerging science of networks Network science helps you design faster, more resilient communication networks; revise infrastructure systems such as electrical power grids, telecommunications networks, and airline routes; model market dynamics; understand synchronization in biological systems; and analyze social interactions among people. This is the first book to take a comprehensive look at this emerging science. It examines the various kinds of networks (regular, random, small-world, influence, scale-free, and social) and applies network processes and behaviors to emergence, epidemics, synchrony, and risk. The book's uniqueness lies in its integration of concepts across computer science, biology, physics, social network analysis, economics, and marketing. The book is divided into easy-to-understand topical chapters and the presentation is augmented with clear illustrations, problems and answers, examples, applications, tutorials, and a discussion of related Java software. Chapters cover: Origins Graphs Regular Networks Random Networks Small-World Networks Scale-Free Networks Emergence Epidemics Synchrony Influence Networks Vulnerability Net Gain Biology This book offers a new understanding and interpretation of the field of network science. It is an indispensable resource for researchers, professionals, and technicians in engineering, computing, and biology. It also serves as a valuable textbook for advanced undergraduate and graduate courses in related fields of study.
The Dictionary of Information Security is a compilation of security
terms and definitions that working security professionals and IT
students will find helpful. |
You may like...
|