|
|
Books > Computing & IT > Computer communications & networking
One of the biggest buzzwords in the IT industry for the past few
years, virtualization has matured into a practical requirement for
many best-practice business scenarios, becoming an invaluable tool
for security professionals at companies of every size. In addition
to saving time and other resources, virtualization affords
unprecedented means for intrusion and malware detection,
prevention, recovery, and analysis. Taking a practical approach in
a growing market underserved by books, this hands-on title is the
first to combine in one place the most important and sought-after
uses of virtualization for enhanced security, including sandboxing,
disaster recovery and high availability, forensic analysis, and
honeypotting.
Already gaining buzz and traction in actual usage at an impressive
rate, Gartner research indicates that virtualization will be the
most significant trend in IT infrastructure and operations over the
next four years. A recent report by IT research firm IDC predicts
the virtualization services market will grow from $5.5 billion in
2006 to $11.7 billion in 2011. With this growth in adoption,
becoming increasingly common even for small and midsize businesses,
security is becoming a much more serious concern, both in terms of
how to secure virtualization and how virtualization can serve
critical security objectives.
Titles exist and are on the way to fill the need for securing
virtualization, but security professionals do not yet have a book
outlining the many security applications of virtualization that
will become increasingly important in their job requirements. This
book is the first to fill that need, covering tactics such as
isolating a virtual environment on the desktop for application
testing, creating virtualized storage solutions for immediate
disaster recovery and high availability across a network, migrating
physical systems to virtual systems for analysis, and creating
complete virtual systems to entice hackers and expose potential
threats to actual production systems.
About the Technologies
A sandbox is an isolated environment created to run and test
applications that might be a security risk. Recovering a
compromised system is as easy as restarting the virtual machine to
revert to the point before failure. Employing virtualization on
actual production systems, rather than just test environments,
yields similar benefits for disaster recovery and high
availability. While traditional disaster recovery methods require
time-consuming reinstallation of the operating system and
applications before restoring data, backing up to a virtual machine
makes the recovery process much easier, faster, and efficient. The
virtual machine can be restored to same physical machine or an
entirely different machine if the original machine has experienced
irreparable hardware failure. Decreased downtime translates into
higher availability of the system and increased productivity in the
enterprise.
Virtualization has been used for years in the field of forensic
analysis, but new tools, techniques, and automation capabilities
are making it an increasingly important tool. By means of
virtualization, an investigator can create an exact working copy of
a physical computer on another machine, including hidden or
encrypted partitions, without altering any data, allowing complete
access for analysis. The investigator can also take a live
?snapshot? to review or freeze the target computer at any point in
time, before an attacker has a chance to cover his tracks or
inflict further damage.
A honeypot is a system that looks and acts like a production
environment but is actually a monitored trap, deployed in a network
with enough interesting data to attract hackers, but created to log
their activity and keep them from causing damage to the actual
production environment. A honeypot exposes new threats, tools, and
techniques used by hackers before they can attack the real systems,
which security managers patch based on the information gathered.
Before virtualization became mainstream, setting up a machine or a
whole network (a honeynet) for research purposes only was
prohibitive in both cost and time management. Virtualization makes
this technique more viable as a realistic approach for companies
large and small.
* The first book to collect a comprehensive set of all
virtualization security tools and strategies in a single
volume
* Covers all major virtualization platforms, including market
leader VMware, Xen, and Microsoft's Hyper-V virtualization
platform, a new part of Windows Server 2008 releasing in June
2008
* Breadth of coverage appeals to a wide range of security
professionals, including administrators, researchers, consultants,
and forensic
"While Nokia is perhaps most recognized for its leadership in the
mobile phone market, they have successfully demonstrated their
knowledge of the Internet security appliance market and its
customers requirements."
--Chris Christiansen, Vice President, Internet Infrastructure and
Security Software, IDC.
Syngress has a long history of publishing market-leading books for
system administrators and security professionals on commercial
security products, particularly Firewall and Virtual Private
Network (VPN) appliances from Cisco, Check Point, Juniper,
SonicWall, and Nokia (see related titles for sales histories). The
Nokia Firewall, VPN, and IPSO Configuration Guide will be the only
book on the market covering the all-new Nokia Firewall/VPN
Appliance suite. Nokia Firewall/VPN appliances are designed to
protect and extend the network perimeter.
According to IDC research, Nokia Firewall/VPN Appliances hold the
#3 worldwide market-share position in this space behind Cisco and
Juniper/NetScreen. IDC estimated the total Firewall/VPN market at
$6 billion in 2007, and Nokia owns 6.6% of this market. Nokia's
primary customers for security appliances are Mid-size to Large
enterprises who need site-to-site connectivity and Mid-size to
Large enterprises who need remote access connectivity through
enterprise-deployed mobile devices. Nokia appliances for this
market are priced form $1,000 for the simplest devices (Nokia IP60)
up to $60,0000 for large enterprise- and service-provider class
devices (like the Nokia IP2450 released in Q4 2007). While the
feature set of such a broad product range obviously varies greatly,
all of the appliances run on the same operating system: Nokia IPSO
(IPSO refers to Ipsilon Networks, a company specializing in IP
switching acquired by Nokia in 1997. The definition of the acronym
has little to no meaning for customers.) As a result of this common
operating system across the product line, The Nokia Firewall, VPN,
and IPSO Configuration Guide will be an essential reference to
users of any of these products. Users manage the Nokia IPSO (which
is a Linux variant, specifically designed for these appliances)
through a Web interface called Nokia Network Voyager or via a
powerful Command Line Interface (CLI). Coverage within the book
becomes increasingly complex relative to the product line.
The Nokia Firewall, VPN, and IPSO Configuration Guide and companion
Web site will provide seasoned network administrators and security
professionals with the in-depth coverage and step-by-step
walkthroughs they require to properly secure their network
perimeters and ensure safe connectivity for remote users. The book
contains special chapters devoted to mastering the complex Nokia
IPSO command line, as well as tips and tricks for taking advantage
of the new "ease of use" features in the Nokia Network Voyager Web
interface. In addition, the companion Web site offers downloadable
video walkthroughs on various installation and troubleshooting tips
from the authors.
* Only book on the market covering Nokia Firewall/VPN appliances,
which hold 6.6% of a $6 billion market
* Companion website offers video walkthroughs on various
installation and troubleshooting tips from the authors
* Special chapters detail mastering the complex Nokia IPSO command
line, as well as tips and tricks for taking advantage of the new
"ease of use" features in the Nokia Network Voyager Web interface
One of the hottest topics in computer forensics today, electronic
discovery (e-discovery) is the process by which parties involved in
litigation respond to requests to produce electronically stored
information (ESI). According to the 2007 Socha-Gelbmann Electronic
Discovery Survey, it is now a $2 billion industry, a 60% increase
from 2004, projected to double by 2009. The core reason for the
explosion of e-discovery is sheer volume; evidence is digital and
75% of modern day lawsuits entail e-discovery.
A recent survey reports that U.S. companies face an average of 305
pending lawsuits internationally. For large U.S. companies ($1
billion or more in revenue)that number has soared to 556 on
average, with an average of 50 new disputes emerging each year for
nearly half of them. To properly manage the role of digital
information in an investigative or legal setting, an
enterprise--whether it is a Fortune 500 company, a small accounting
firm or a vast government agency--must develop an effective
electronic discovery program. Since the amendments to the Federal
Rules of Civil Procedure, which took effect in December 2006, it is
even more vital that the lifecycle of electronically stored
information be understood and properly managed to avoid risks and
costly mistakes.
This books holds the keys to success for systems administrators,
information security and other IT department personnel who are
charged with aiding the e-discovery process.
*Comprehensive resource for corporate technologists, records
managers, consultants, and legal team members to the e-discovery
process, with information unavailable anywhere else
*Offers a detailed understanding of key industry trends, especially
the Federal Rules of Civil Procedure, that are driving the adoption
of e-discovery programs
*Includes vital project management metrics to help monitor
workflow, gauge costs and speed the process
*Companion Website offers e-discovery tools, checklists, forms,
workflow examples, and other tools to be used when conducting
e-discovery strategy
This book focuses on broadband distribution and systems
architecture and concentrates on practical concepts that will allow
the reader to do their own design, improvement, and troubleshooting
work. The objective is to enhance the skill sets of a large
population that designs and builds broadband cable plants, as well
as those maintaining and troubleshooting it. A large cross-section
of technical personnel who need to learn these skills design,
maintain, and service HFC systems from signal creation through
transmission to reception and processing at the customer end point.
In addition, data/voice and video specialists need to master and
reference the basics of HFC design and distribution before
contending with the intricacies of their own unique services. This
book serves as an essential reference to all cable engineers-those
who specifically design and maintain the HFC distribution plant as
well as those primarily concerned with data/voice technology as
well as video technology. Included is an online component
consisting of spreadsheets that were used in developing the
material presented in the book.
* Concentrates on practical concepts that will allow the user to do
his own design, improvement, and trouble-shooting work.
* Prepares cable engineers and technicians to work with assurance
as they face the latest developments and future directions.
* Concise and tightly focused, allowing readers to easily find
answers to questions about an idea or concept they are developing
in this area.
Network management refers to the activities, methods, procedures,
and tools that pertain to the operation, administration,
maintenance, and provisioning of networked systems, which includes
controlling, planning, allocating, deploying, coordinating, and
monitoring the resources of a network. This book brings all of the
elements of network management together in a single volume, saving
the reader the time and expense of making multiple purchases. It
introduces network management, explains the basics, describes the
protocols, and discusses advanced topics, by the best and brightest
experts in the field. It is a quick and efficient way to bring
valuable content together from leading experts in the field while
creating a one-stop-shopping opportunity for customers to receive
the information they would otherwise need to round up from separate
sources.
* Chapters contributed by recognized experts in the field cover
theory and practice of network management, allowing the reader to
develop a new level of knowledge and technical expertise.
* This book's up-to-date coverage of network quality of service
issues facilitates learning and lets the reader remain current and
fully informed from multiple viewpoints.
* Presents methods of analysis and problem-solving techniques,
enhancing the reader's grasp of the material and ability to
implement practical solutions.
* Use of examples illustrate core network management concepts for
enhanced comprehension.
Adoption of Bluetooth wireless technology has become ubiquitous in
the last few years. One of the biggest steps forward is the
standardization of Java APIs for Bluetooth wireless technology
(JABWT). The latest updates to this standard is explained in detail
in this book. The JABWT standard, defined by the JSR-82 Java
Specification Request, supports rapid development of Bluetooth
applications that are portable, secure, and highly-usable. Wireless
device manufacturers have responded overwhelmingly to the JABWT
specification by implementing JABWT applications in mobile phones
and other personal wireless communications products.
"Bluetooth Application Programming Essentials: Programming with the
Java APIs" explains in detail how to write Bluetooth applications
using the Java APIs to exploit the power of both technologies.
Written by the specification lead for JSR-82 and two other key
participants in developing the standards of JABWT, this book
provides the authoritative explanations and concrete examples
needed to get started right away.
This book provides embedded Java developers with to-the-point
information on the APIs in the specification with detailed
programmatic examples of the APIs in use. A NEW chapter on the Push
Registry definition (a new feature in the 1.1 version of JSR-82)
has been added. Finally, the new Essentials version of the book
will update the remaining chapters to reflect changes in the latest
Bluetooth spec (2.1) and the industry as a whole.
As a bonus, this edition of the book offers over 200 pages of added
content on the website. This "bonus material" includes complete
source code from examples in the book, the javex.bluetooth code
package, the java.obex code package, an enhanced set of "Example
Applications," and a tutorial on "Implementing JABWT on a Device."
These code-heavy sections are actually more effective in electonic
format where the application can be easily downloaded.
KEY FEATURES & BENEFITS
* By focusing only on the essentials, this concise resource enables
software and hardware vendors to quickly develop Bluetooth
applications for mobile devices in an increasingly competitive
market.
* The updated material examines crucial programming areas
(including RFCOMM, OBEX, device discovery, service discovery, and
L2CAP), which allows developers to not only successfully design,
but master and build Java APIs for Bluetooth Wireless Technology.
* Includes a new and valuable chapter that delineates the pivotal
Push Registry feature ? a recent development that will help
programmers avoid the common problem of connection collision.
* By providing real-world issues and problems involved in
implementing the Java APIs specification, the book allows
developers to identify with the text and encourages repeated
reference.
The Newnes Know It All Series takes the best of what our authors
have written to create hard-working desk references that will be an
engineer's first port of call for key information, design
techniques and rules of thumb. Guaranteed not to gather dust on a
shelf
Communications engineers need to master a wide area of topics to
excel. The "Wireless Security Know It All" covers every angle
including Emerging Wireless Technologies and Security Issues,
Wireless LAN and MAN Security, as well as Wireless Personal Area
Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions
and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential
information, techniques and tricks of the trade in one volume"
Today all companies, U.S. federal agencies, and non-profit
organizations have valuable data on their servers that needs to be
secured. One of the challenges for IT experts is learning how to
use new products in a time-efficient manner, so that new
implementations can go quickly and smoothly. Learning how to set up
sophisticated products is time-consuming, and can be confusing.
GFI's LANguard Network Security Scanner reports vulnerabilities so
that they can be mitigated before unauthorized intruders can wreck
havoc on your network. To take advantage of the best things that
GFI's LANguard Network Security Scanner has to offer, you'll want
to configure it on your network so that it captures key events and
alerts you to potential vulnerabilities before they are exploited.
In this book Brien Posey has pinpointed the most important concepts
with examples and screenshots so that systems administrators and
security engineers can understand how to get the GFI security tools
working quickly and effectively. His straightforward, no nonsense
writing style is devoid of difficult to understand technical
jargon. His descriptive examples explain how GFI's security tools
enhance the security controls that are already built into your
server's operating system.
* Secure Your Network Master the various components that make up
the management console and prepare to use it for most tasks.
* Analyze Scan Results View detected vulnerabilities, save and
print results, query open ports, and filter your results.
* Install and Use the ReportPack Learn how to build custom reports
and schedule reports. See how filters allow you to control the
information that is processed when a reports is run.
* Perform a Hardware Inventory and Compile a Software Inventory Use
GFI to do your inventories and perform audits. See how to blacklist
and whitelist applications to make your reports more meaningful.
* Manage Patches Effectively See how to deploy a specific patch,
perform a scan comparison, uninstall a patch, and deploy custom
software.
* Use GFI EndPointSecurity to Lock Down Hardware Be prepared for
users trying to install unauthorized software, copy sensitive data
onto removable media, or perform other actions to try and
circumvent your network's security.
* Create Protection Policies Control the level of device access
allowed on a system and create separate protection policies; one
for servers, one for workstations, and one for laptops. Learn how
to deploy agents.
* Regulate Specific Devices Master some of the advanced features of
GFI: locking device categories, blacklisting and whitelisting
devices, and using file type restrictions.
* Monitor Device Usage Keep tabs on your network by setting logging
options, setting alerting options, and generating end point
security reports.
* Use GFI EndPointSecurity to Lock Down Hardware
* Create Protection Policies to Control the Level of Device
Access
* Master Advanced Features of GFI: Locking Device Categories,
Blacklisting and Whitelisting Devices, Using File Type Restrictions
and More
Malware has gone mobile, and the security landscape is changing
quickly with emerging attacks on cell phones, PDAs, and other
mobile devices. This first book on the growing threat covers a wide
range of malware targeting operating systems like Symbian and new
devices like the iPhone. Examining code in past, current, and
future risks, protect your banking, auctioning, and other
activities performed on mobile devices.
* Visual Payloads
View attacks as visible to the end user, including notation of
variants.
* Timeline of Mobile Hoaxes and Threats
Understand the history of major attacks and horizon for emerging
threates.
* Overview of Mobile Malware Families
Identify and understand groups of mobile malicious code and their
variations.
* Taxonomy of Mobile Malware
Bring order to known samples based on infection, distribution, and
payload strategies.
* Phishing, SMishing, and Vishing Attacks
Detect and mitigate phone-based phishing (vishing) and SMS phishing
(SMishing) techniques.
* Operating System and Device Vulnerabilities
Analyze unique OS security issues and examine offensive mobile
device threats.
* Analyze Mobile Malware
Design a sandbox for dynamic software analysis and use
"MobileSandbox" to analyze mobile malware.
* Forensic Analysis of Mobile Malware
Conduct forensic analysis of mobile devices and learn key
differences in mobile forensics.
* Debugging and Disassembling Mobile Malware
Use IDA and other tools to reverse-engineer samples of malicious
code for analysis.
* Mobile Malware Mitigation Measures
Qualify risk, understand threats to mobile assets, defend against
attacks, and remediate incidents.
* Understand the History and Threat Landscape of Rapidly Emerging
Mobile Attacks
* Analyze Mobile Device/Platform Vulnerabilities and Exploits
* Mitigate Current and Future Mobile Malware Threats
Luiz Augusto de Carvalho - WANOPT Wide area network
Specialist
Benjamin Naude - Magna international
"Telecommunications is usually responsible for a large
percentage of the IT infrastructure costs, usually only surpassed
by personnel. Therefore identifying savings, even small in terms of
percentage in a large corporate network may mean hundreds of
thousands of dollars per month."
"The techniques described in this book already helped and
continuous helping hundreds of organizations to save millions of
dollars with their telecommunications infra-structures."
Contents Presents the concepts of the WAN design algorithms
Provides practical examples of algorithms and demonstrates how to
deploy them Discusses cases where the techniques described were
deployed with favorable results Discusses negotiating and
managerial strategies Presents a practical guide about how to
implement and manage a large WAN
As big data becomes increasingly pervasive and cloud computing
utilization becomes the norm, the security and privacy of our
systems and data becomes more critical with emerging security and
privacy threats and challenges. This book presents a comprehensive
view on how to advance security and privacy in big data, cloud
computing, and their applications. Topics include cryptographic
tools, SDN security, big data security in IoT, privacy preserving
in big data, security architecture based on cyber kill chain,
privacy-aware digital forensics, trustworthy computing, privacy
verification based on machine learning, and chaos-based
communication systems. This book is an essential reading for
networking, computing, and communications professionals,
researchers, students and engineers, working with big data and
cloud computing.
This book provides a comprehensive examination of Internet QoS
theory, standards, vendor implementation and network deployment
from the practitioner's point of view, including extensive
discussion of related economic and regulatory issues. Written in a
technology-light way so that a variety of professionals and
researchers in the information and networking industries can easily
grasp the material. Includes case studies based on real-world
experiences from industry.
The author starts by discussing the economic, regulatory and
technical challenges of the existing QoS model. Key coverage
includes defining a clear business model for selling and buying QoS
in relation to current and future direction of government
regulation and QoS interoperability (or lack thereof) between
carriers and networking devices. The author then demonstrates how
to improve the current QoS model to create a clear selling point,
less regulation uncertainty, and higher chance of deployment
success. This includes discussion of QoS re-packaging to end-users;
economic and regulatory benefits of the re-packaging; and the
overall benefits of an improved technical approach. Finally, the
author discusses the future evolution of QoS from an Internet
philosophy perspective and lets the reader draw the conclusions.
This book is the first QoS book to provide in depth coverage on the
commercial and regulatory aspects of QoS, in addition to the
technical aspect. From that, readers can grasp the commercial and
regulatory issues of QoS and their implications on the overall QoS
business model. This book is also the first QoS book to provide
case studies of real world QoS deployments, contributed by the
people who did the actual deployments. From that, readers can grasp
the practical issues of QoS in real world. This book is also the
first QoS book to cover both wireline QoS and wireless QoS. Readers
can grasp the QoS issues in the wireless world. The book was
reviewed and endorsed by a long list of prominent industrial and
academic figures.
* The only book to discuss QoS technology in relation to economic
and regulatory issues
* Includes case studies based on real-world examples from industry
practitioners.
* Provides unique insight into how to improve the current QoS model
to create a clear selling point, less regulatory uncertainty, and
higher chance of deployment success.
From transportation to healthcare, IoT has been heavily implemented
into practically every professional industry, making these systems
highly susceptible to security breaches. Because IoT connects not
just devices but also people and other entities, every component of
an IoT system remains vulnerable to attacks from hackers and other
unauthorized units. This clearly portrays the importance of
security and privacy in IoT, which should be strong enough to keep
the entire platform and stakeholders secure and smooth enough to
not disrupt the lucid flow of communication among IoT entities.
Applied Approach to Privacy and Security for the Internet of Things
is a collection of innovative research on the methods and applied
aspects of security in IoT-based systems by discussing core
concepts and studying real-life scenarios. While highlighting
topics including malware propagation, smart home vulnerabilities,
and bio-sensor safety, this book is ideally designed for security
analysts, software security engineers, researchers, computer
engineers, data scientists, security professionals, practitioners,
academicians, and students seeking current research on the various
aspects of privacy and security within IoT.
Technological innovations in the banking sector have provided
numerous benefits to customers and banks alike; however, the use of
e-banking increases vulnerability to system attacks and threats,
making effective security measures more vital than ever. Online
Banking Security Measures and Data Protection is an authoritative
reference source for the latest scholarly material on the
challenges presented by the implementation of e-banking in
contemporary financial systems. Presenting emerging techniques to
secure these systems against potential threats and highlighting
theoretical foundations and real-world case studies, this book is
ideally designed for professionals, practitioners, upper-level
students, and technology developers interested in the latest
developments in e-banking security.
Network processors are the basic building blocks of today's
high-speed, high-demand, quality-oriented communication networks.
Designing and implementing network processors requires a new
programming paradigm and an in-depth understanding of network
processing requirements. This book leads the reader through the
requirements and the underlying theory of networks, network
processing, and network processors. It covers implementation of
network processors and intergrates EZchip Microcode Development
Environment so that you can gain hands-on experience in writing
high-speed networking applications. By the end of the book, the
reader will be able to write and test applications on a simulated
network processor.
Comprehensive, theoretical, and pracitical coverage of networks and
high-speed networking applicationsDescirbes contemporary core,
metro, and access networks and their processing algorithmsCovers
network processor architectures and programming models, enabling
readers to assess the optimal network processor typer and
configuration for their applicationFree download from http:
//www.cse.bgu.ac.il/npbook includes microcode development tools
that provide hands-on experience with programming a network
processor
Around the world, SCADA (supervisory control and data acquisition)
systems and other real-time process control networks run
mission-critical infrastructure--everything from the power grid to
water treatment, chemical manufacturing to transportation. These
networks are at increasing risk due to the move from proprietary
systems to more standard platforms and protocols and the
interconnection to other networks. Because there has been limited
attention paid to security, these systems are seen as largely
unsecured and very vulnerable to attack.
This book addresses currently undocumented security issues
affecting SCADA systems and overall critical infrastructure
protection. The respective co-authors are among the leading experts
in the world capable of addressing these related-but-independent
concerns of SCADA security. Headline-making threats and
countermeasures like malware, sidejacking, biometric applications,
emergency communications, security awareness llanning, personnel
& workplace preparedness and bomb threat planning will be
addressed in detail in this one of a kind book-of-books dealing
with the threats to critical infrastructure protection. They
collectivly have over a century of expertise in their respective
fields of infrastructure protection. Included among the
contributing authors are Paul Henry, VP of Technology Evangelism,
Secure Computing, Chet Hosmer, CEO and Chief Scientist at Wetstone
Technologies, Phil Drake, Telecommunications Director, The
Charlotte Observer, Patrice Bourgeois, Tenable Network Security,
Sean Lowther, President, Stealth Awareness and Jim Windle, Bomb
Squad Commander, CMPD.
* Internationally known experts provide a detailed discussion of
the complexities of SCADA security and its impact on critical
infrastructure
* Highly technical chapters on the latest vulnerabilities to SCADA
and critical infrastructure and countermeasures
* Bonus chapters on security awareness training, bomb threat
planning, emergency communications, employee safety and much
more
* Companion Website featuring video interviews with subject matter
experts offer a "sit-down" with the leaders in the field
 |
Kismet Hacking
(Paperback)
Frank Thornton, Michael J. Schearer, Brad Haines
|
R1,154
Discovery Miles 11 540
|
Ships in 10 - 15 working days
|
|
|
Kismet is the industry standard for examining wireless network
traffic, and is used by over 250,000 security professionals,
wireless networking enthusiasts, and WarDriving hobbyists.
Unlike other wireless networking books that have been published in
recent years that geared towards Windows users, Kismet Hacking is
geared to those individuals that use the Linux operating system.
People who use Linux and want to use wireless tools need to use
Kismet. Now with the introduction of Kismet NewCore, they have a
book that will answer all their questions about using this great
tool. This book continues in the successful vein of books for
wireless users such as WarDriving: Drive, Detect Defend.
*Wardrive Running Kismet from the BackTrack Live CD
*Build and Integrate Drones with your Kismet Server
*Map Your Data with GPSMap, KisMap, WiGLE and GpsDrive
Citrix Presentation Server allows remote users to work off a
network server as if they weren't remote. That means: Incredibly
fast access to data and applications for users, no third party VPN
connection, and no latency issues. All of these features make
Citrix Presentation Server a great tool for increasing access and
productivity for remote users. Unfortunately, these same features
make Citrix just as dangerous to the network it's running on. By
definition, Citrix is granting remote users direct access to
corporate servers?..achieving this type of access is also the holy
grail for malicious hackers. To compromise a server running Citrix
Presentation Server, a hacker need not penetrate a heavily defended
corporate or government server. They can simply compromise the far
more vulnerable laptop, remote office, or home office of any
computer connected to that server by Citrix Presentation Server.
All of this makes Citrix Presentation Server a high-value target
for malicious hackers. And although it is a high-value target,
Citrix Presentation Servers and remote workstations are often
relatively easily hacked, because they are often times deployed by
overworked system administrators who haven't even configured the
most basic security features offered by Citrix. "The problem, in
other words, isn't a lack of options for securing Citrix instances;
the problem is that administrators aren't using them." (eWeek,
October 2007). In support of this assertion Security researcher
Petko D. Petkov, aka "pdp," said in an Oct. 4 posting that his
recent testing of Citrix gateways led him to "tons" of "wide-open"
Citrix instances, including 10 on government domains and four on
military domains.
* The most comprehensive book published for system administrators
providing step-by-step instructions for a secure Citrix
Presentation Server.
* Special chapter by Security researcher Petko D. Petkov'aka "pdp
detailing tactics used by malicious hackers to compromise Citrix
Presentation Servers.
* Companion Web site contains custom Citrix scripts for
administrators to install, configure, and troubleshoot Citrix
Presentation Server.
This book is a convenient, targeted, single-source guide to
integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike
longwinded "comprehensive resources" it doesn't waste time
re-hashing general information on the architectures and purposes of
ISA and Exchange for raw beginners. Instead, its pragmatic purpose
is to smooth the path of the busy administrator who is under
pressure to get the integration done quickly, and done right, the
first time. It features "break-out sessions" for issues that
require in-depth discussion, "tips and tricks" sections that hone
in on and demystify trouble spots, and "FAQs" alphabetized by topic
that act as a quick-reference for readers who just want a quick
answer to a specific question.
Readers will learn how to:
*Create the protocol definitions and firewall policy to allow only
authorized users to connect to your Exchange Server
*Configure SMTP Filtering and SMTP Message Screener
*Troubleshoot the SSL connection to your Exchange Server
*Take advantage of ISA 2006's integrated Exchange 2007
support
*Enable forms-based authentication for Outlook Web Access
*Leverage unified SSL, VPN, application-layer filtering and
endpoint security
to optimize access for mobile devices
*Configure user-based settings to provide pre-authenticated access
to specific Web applications
...and much more
*Practical and focused, this guide explains explains everything you
need to know in order to successfully integrate ISA 2006 and
Exchange 2007, without wasting time on minutiae
*Tips and tricks from the expert author help you avoid pitfalls
before you stumble into them, troubleshoot problems with ease, and
optimize performance
*In-depth coverage of Exchange SP1 highlights the many security
enhancements that optimize integration with ISA
The future for Nagios in the enterprise is certainly bright!
"Nagios 3 Enterprise Network Monitoring" can help you harness the
full power of Nagios in your organization. Nagios 3 contains many
significant new features and updates, and this book details them
all for you. Once up and running, you'll see how a number of useful
add-ons and enhancements for Nagios can extend the functionality of
Nagios throughout your organization. And, if you want to learn how
to write your own plugins...this is the book for you! In these
pages you'll find a cookbook-style chapter full of useful plugins
that monitor a variety of devices, from HTTP-based applications to
CPU utilization to LDAP servers and more.
* Complete Case Study Demonstrates how to Deploy Nagios Globally in
an Enterprise Network
* Monitor Third Party Hardware Devices with Nagios
Network Security: Know It All explains the basics, describes the
protocols, and discusses advanced topics, by the best and brightest
experts in the field of network security.
Assembled from the works of leading researchers and practitioners,
this best-of-the-best collection of chapters on network security
and survivability is a valuable and handy resource. It consolidates
content from the field's leading experts while creating a
one-stop-shopping opportunity for readers to access the information
only otherwise available from disparate sources.
* Chapters contributed by recognized experts in the field cover
theory and practice of network security technology, allowing the
reader to develop a new level of knowledge and technical expertise.
* Up-to-date coverage of network security issues facilitates
learning and lets the reader remain current and fully informed from
multiple viewpoints.
* Presents methods of analysis and problem-solving techniques,
enhancing the reader's grasp of the material and ability to
implement practical solutions.
* Examples illustrate core security concepts for enhanced
comprehension
Exchange 2007 represents the biggest advance in the history of
Microsoft Exchange Server technology. Given Exchange's leap to x64
architecture and its wide array of new features, it isn't
surprising that the SP1 release of 2007 would be particularly
robust in terms of hotfixes, security enhancements and additional
functionality.
Tony Redmond's upgraded edition of his popular Microsoft Exchange
Server 2007 bible features extensive coverage of the significant
changes and additions offered with SP1. Every chapter has been
updated, with particular focus on the most pivotal aspects of SP1,
including:
*install enabling on Windows Server 2008
*IVp6 support
*Unified Messaging inclusion
*EMC enhancements
*Client Access Improvements for Outlook Web Access and
Activesync
*New user interfaces for POP3 and IMAP4
*System resource monitoring and message routing improvements
*New features for the mailbox server role
*.pst file data managment improvements
*new high-availability features
*optimization for mobile access
*and much more
*Complete coverage of all the updates in SP1 ensure admins skip the
initial 2007 release's bugs and upgrade with ease
*Written by HP Services CTO Tony Redmond, the world's most trusted
author of Exchange books for over a decade
*250+ pages of updates throughout, including totally new sections
on Windows 2008 compatibility, Microsoft Yona, Windows Mobile 6 and
6.1 devices, Apple iPhone, and more
As the cliche reminds us, information is power. In this age of
computer systems and technology, an increasing majority of the
world's information is stored electronically. It makes sense then
that as an industry we rely on high-tech electronic protection
systems to guard that information. As a professional hacker, I get
paid to uncover weaknesses in those systems and exploit them.
Whether breaking into buildings or slipping past industrial-grade
firewalls, my goal has always been the same: extract the
informational secrets using any means necessary. After hundreds of
jobs, I discovered the secret to bypassing every conceivable
high-tech security system. This book reveals those secrets, and as
the title suggests, it has nothing to do with high technology. As
it turns out, the secret isn't much of a secret at all. Hackers
have known about these techniques for years. Presented in a light,
accessible style, you'll get to ride shotgun with the authors on
successful real-world break-ins as they share photos, videos and
stories that prove how vulnerable the high-tech world is to no-tech
attacks.
As you browse this book, you'll hear old familiar terms like
"dumpster diving," "social engineering," and "shoulder surfing."
Some of these terms have drifted into obscurity to the point of
becoming industry folklore; the tactics of the pre-dawn information
age. But make no mistake; these and other old-school tactics work
with amazing effectiveness today. In fact, there's a very good
chance that someone in your organization will fall victim to one or
more of these attacks this year. Will they be ready?
-Dumpster Diving
Be a good sport and don't read the two "D" words written in big
boldletters above, and act surprised when I tell you hackers can
accomplish this without relying on a single bit of technology
(punny).
-Tailgating
Hackers and ninja both like wearing black, and they do share the
ability to slip inside a building and blend with the shadows.
-Shoulder Surfing
If you like having a screen on your laptop so you can see what
you're working on, don't read this chapter.
-Physical Security
Locks are serious business and lock technicians are true engineers,
most backed with years of hands-on experience. But what happens
when you take the age-old respected profession of the locksmith and
sprinkle it with hacker ingenuity?
-Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys,
CEOs and internal auditors on computer crime and security-related
topics. His unforgettable presentations are filled with three
decades of personal "war stories" from the trenches of Information
Security and Physical Security.
-Google Hacking
A hacker doesn't even need his own computer to do the necessary
research. If he can make it to a public library, Kinko's or
Internet cafe, he can use Google to process all that data into
something useful.
-P2P Hacking
Let's assume a guy has no budget, no commercial hacking software,
no support from organized crime and no fancy gear. With all those
restrictions, is this guy still a threat to you? Have a look at
this chapter and judge for yourself.
-People Watching
Skilled people watchers can learn a whole lot in just a few quick
glances. In this chapter we'll take a look at a few examples of the
types of things that draws a no-tech hacker's eye.
-Kiosks
Whathappens when a kiosk is more than a kiosk? What happens when
the kiosk holds airline passenger information? What if the kiosk
holds confidential patient information? What if the kiosk holds
cash?
-Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular
espionage happens when the cars aren't moving at all!
|
|