![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Applications of computing > Databases > Data security & data encryption
The only guide for software developers who must learn and implement
cryptography safely and cost effectively.
This is the only book that covers all the topics that any budding
security manager needs to know This book is written for managers
responsible for IT/Security departments from mall office
environments up to enterprise networks.
Though rootkits have a fairly negative image, they can be used for both good and evil. Designing BSD Rootkits arms you with the knowledge you need to write offensive rootkits, to defend against malicious ones, and to explore the FreeBSD kernel and operating system in the process. Organized as a tutorial, Designing BSD Rootkits will teach you the fundamentals of programming and developing rootkits under the FreeBSD operating system. Author Joseph Kong's goal is to make you smarter, not to teach you how to write exploits or launch attacks. You'll learn how to maintain root access long after gaining access to a computer and how to hack FreeBSD. Kongs liberal use of examples assumes no prior kernel-hacking experience but doesn't water down the information. All code is thoroughly described and analyzed, and each chapter contains at least one real-world application.Included: The fundamentals of FreeBSD kernel module programming Using call hooking to subvert the FreeBSD kernel Directly manipulating the objects the kernel depends upon for its internal record-keeping Patching kernel code resident in main memory; in other words, altering the kernel's logic while it's still running How to defend against the attacks described Hack the FreeBSD kernel for yourself
Information Security: Contemporary Cases Addresses Fundamental Information Security Concepts In Realistic Scenarios. Through A Series Of Substantive Cases, Different Aspects Of Information Security Are Addressed By Real Organizations. The Organizations Include Kraft Foods, Advo, IBM, SRA, Aetna, The FBI, And The Yale New Haven Center For Emergency Preparedness And Disaster Response. Case Topics Include Data Protection, Integrating IT And Physical Security, Contingency Planning, Disaster Recovery, Network Security, Hardware Design, Encryption, Standards Compliance, Tracking Intruders, And Training And Awareness Programs. This Casebook Will Enable Students To Develop The Practical Understanding Needed For Today's Information Security And Information Assurance Profession.
* Shows how to improve Windows desktop and server security by configuring default security before installing off-the-shelf security products* Educates readers about the most significant security threats, building the ultimate defense, operating system hardening, application security, and automating security* As a security consultant, the author has an impressive record-of his clients, not one who followed his recommendations has suffered a virus, worm, Trojan, or successful hacker attack in the past five years* The companion Web site includes author-created custom security templates and group policies that will automate advice given in the book
A fascinating work on the history and development of cryptography, from the Egyptians to WWII. Many of the earliest books, particularly those dating back to the 1900s and before, are now extremely scarce and increasingly expensive. Hesperides Press are republishing these classic works in affordable, high quality, modern editions, using the original text and artwork Contents Include - The Beginings of Cryptography - From the Middle Ages Onwards - Signals, Signs, And Secret Languages - Commercial Codes - Military Codes and Ciphers - Types of Codes and Ciphers - Methods of Deciphering - Bibliography
The Official (ISC)2 (R) Guide to the CISSP (R)-ISSEP (R) CBK (R) provides an inclusive analysis of all of the topics covered on the newly created CISSP-ISSEP Common Body of Knowledge. The first fully comprehensive guide to the CISSP-ISSEP CBK, this book promotes understanding of the four ISSEP domains: Information Systems Security Engineering (ISSE); Certification and Accreditation; Technical Management; and an Introduction to United States Government Information Assurance Regulations. This volume explains ISSE by comparing it to a traditional Systems Engineering model, enabling you to see the correlation of how security fits into the design and development process for information systems. It also details key points of more than 50 U.S. government policies and procedures that need to be understood in order to understand the CBK and protect U.S. government information. About the Author Susan Hansche, CISSP-ISSEP is the training director for information assurance at Nortel PEC Solutions in Fairfax, Virginia. She has more than 15 years of experience in the field and since 1998 has served as the contractor program manager of the information assurance training program for the U.S. Department of State.
Take network security to the next level!This book has never before published advanced security techniques and step-by-step instructions showing how to defend against devastating vulnerabilities to systems and network infrastructure.Just about every day the media is reporting another hard-core hack against some organisation. It was reported mid-March that hackers had taken over one of Lexis Nexis' databases gaining access to the personal files of as many as 32,000 people. Extreme Exploits provides advanced methodologies and solutions needed to defend against sophisticated exploits by showing them how to use the latest advanced security tools. The book teaches you how little-known vulnerabilities have been successfully exploited in the real world and have wreaked havoc on large-scale networks.
Lock down your most important information by understanding numerous practical security applications in different environments. Robust coverage includes the most recent advances in technology and the law, including wireless security, biometrics, Windows, IDS technology, as well as the new Patriot Act, homeland security initiatives, and special information on relevant state laws. End-of-chapter review sections include summaries, key term lists, quizzes, and lab projects.
There are many ways that a potential attacker can intercept information, or learn more about the sender, as the information travels over a network. Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems. "Silence on the Wire" dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
Thsi comprehensive reference provides a detailed overview of intrusion detection systems [IDS], offering the latest detection systems, the latest technology in information protection.
Take a proactive approach to enterprise network security by implementing preventive measures against attacks before they occur. Written by a team of IT security specialists, this hands-on resource provides concrete steps you can take immediately as well as ongoing actions to ensure long-term security. Whether you're working on a Windows, UNIX, wireless, or mixed network, you'll get complete details on how to systematically harden your network from the ground up, as well as strategies for getting company-wide support for your security plan. With coverage of all major platforms and applications, this book is an essential security tool for on-the-job IT professionals. Features a four-part hardening methodology: Do This Now!--Checklist of immediate steps to take to lockdown your system from further attack Take It From The Top--Systematic approach to hardening your enterprise from the top down, focusing on network, data, and software access, storage, and communications Once Is Never Enough!--Ongoing monitoring and assessment plan to keep your network secure, including patch management and auditing How to Succeed at Hardening Network Security--Strategies for getting budget approval, management buy-in, and employee cooperation for your security program John Mallery is a Managing Consultant at BKD, LLP, and a veteran security specialist. Jason Zann, CISSP, is an Information Security Consultant for DST Systems. Patrick Kelly, CISSP, CCSE, MCSE, MCP+I, is an Information Assurance Engineer for ComGlobal Systems, Inc. Paul Love, MS Network Security, CISSP, CISM, CISA, is a Security Manager with a large financial institution. Wesley Noonan, MCSE, CCNA, CCDA, NNCSS, Security+, is aSenior Network Consultant for Collective Technologies, LLC. Eric S. Seagren, CISSP, ISSAP, SCNP, CCNA, CNE, MCP+I, MCSE, is an IT architect, designing secure, scalable, and redundant networks. Rob Kraft is the director of software development for KCX, Inc. Mark O'Neil is the CTO of Vordel and principal author of "Web Services Security." Series Editor and author Roberta Bragg, CISSP, MCSE: Security, Security+, writes a column for Redmond Magazine and writes the weekly Security Watch newsletter. She is the author of "Hardening Windows Systems" and several other information security books.
This book constitutes the refereed proceedings of the 4th International Conference on Security and Cryptology, ICISC 2001, held in Seoul, Korea, in December 2001. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from a total of 107 submissions. All current issues of cryptography and cryptanalysis and their applications to securing data, systems, and communications are addressed.
This intermediate-to-advanced guide to implementing preventative security measures for the Windows operating system is the only book that covers NT, 2000, XP, and 2003. This book is designed to provide a quick and easy checklist-style reference to the steps system administrators need to take to anticipate attacks and compromises, and harden Windows NT, 2000, XP, and Server 2003 against them.
Software forensics -- analyzing program code to track, identify, and prosecute computer virus perpetrators -- has emerged as one of the most promising and technically challenging aspects of information management and security. This is a technical tutorial that thoroughly examines the programming tools, investigative and analysis methods, and legal implications of the complex evidence chain. Also included are eye-opening case studies, including the famous Enron case, and sample code from real criminal investigations. Written by a security consultant whose clients include the Canadian Government, Software Forensics covers: * Basic concepts * Hackers, crackers, and phreaks * Objects of analysis: text strings, source code, machine code * User interfaces and commands * Program structures and versions * Virus families * Function indicators * Stylistic analysis * and much more There is no better or faster way for programmers, security analysts and consultants, security officers in the enterprise, application developers, lawyers, judges, and anyone else interested in software forensics to get up to speed on forensic programming tools and methods and the nature of cyber evidence.
Enigma und Lucifer-Chiffre: das spannende Lehrbuch zur
Kryptographie mit Online-Service.
This hands-on guide to hacking begins with step-by-step tutorials on hardware modifications that teach basic hacking techniques as well as essential reverse engineering skills. The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. "Hacking the Xbox" includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide. "Hacking the Xbox" also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.
LOCK IN PDA SECURITY: DOWNSIZE PDA RISKS. SUPERSIZE PDA REWARDS. PDAs have moved into the workplace. More than 25 million of them will soon be accessing company networks. Are you prepared? If you’re an information technology or business executive, the time is right to size up the unique security risks these small, portable devices pose. This essential primer for those deploying, managing or using PDAs in the workplace will help you understand and address the challenges presented by this emerging set of technologies. Written by respected IT security experts, PDA Security, shows you how to: * Assess the level of threat posed by PDAs in your organization * Develop a measured and enforceable policy response to minimize the risk * Understand the technical issues and defend against the threats PDAs pose to privacy, theft of sensitive information, system corruption, and other issues of network and data misuse * Analyze secure solutions for all major handhelds -- Palm, PocketPC, and RIM * Examine a case study on securing Palm for the work environment * Learn why solutions almost always involve the operating system * Discover what White-Hat Hacking reveals about vulnerabilities * Find profitable ways to integrate PDAs into business plans and networks, while downsizing risks * Get an insider’s preview of the future of handhelds -- the PCs of the early twenty-first century With a Foreword by Rebecca Bace, internationally renowned intrusion-detection and network-security specialist and former member of the United States Department of Defense National Security Agency (NSA). For ongoing news and original content on PDA security, related Web sites, and a calendar of related events, visit www.pdasecurity-book.com
* Configuring an intrusion detection system (IDS) is very challenging, and if improperly configured an IDS is rendered ineffective
Many faces of modern computing - from archiving data to coding theory to image processing ¿ rely heavily on data compression. This new and practical guide explains the process of compressing all types of computer data, as well as the use of significant methods and algorithms. Its purpose is to succinctly describe both the principles underlying the field of data compression and how to use the key methods effectively. A Guide to Data Compression Methods concentrates on general concepts and methods and describes them with a minimal amount of mathematical detail. It presents the main approaches to data compression, describes the most important algorithms, and includes straightforward examples. Statistical, dictionary, and wavelet methodologies are addressed in specific chapters, as well as image, video, and audio compression. The reader can expect to gain a basic understanding of the key algorithms and methods used to compress data for storage and transmission. Topics and features: ¿ All core methods are clearly explained with realistic examples, and some computer code is included ¿ Accessible presentation, with only minimum computer and mathematics technical background ¿ Discussion of wavelet methods and JPEG 2000 ¿ Appendix lists all algorithms presented in the book ¿ CD-ROM included compromising computer code from the book and extensive public-domain compression utility programs This book is an invaluable practical reference and guide for all practitioners and professionals in computer science, software engineering, and programming.
Completely reviewed by technical experts at CheckPoint, this valuable tool shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. Includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.
In the aftermath of the 9/11 terrorist attacks, responsible organizations are now even more interested in identifying their specific needs for information system security. This book provides a structured process for assisting any analyst in performing this task.
Get comprehensive coverage of XP Professional security with this definitive and focused resource. Work with firewalls and intrusion detection systems, fully utilize XP’s built-in support tools, manage security remotely, and much more.
Protect your IIS server with help from this authoritative book. Covering all basic security tools that come with IIS -- and explaining their weaknesses -- this complete guide shows you how to utilize encryption, authorization, filtering, and other restrictive techniques to protect against attacks and other security violations.
Get full details on major mobile/wireless clients and operating systems--including Windows CE, Palm OS, UNIX, and Windows. You’ll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security -- the most trusted name in e-security -- this is your one-stop guide to wireless security. |
You may like...
Validated Designs for Object-oriented…
John Fitzgerald, Peter Gorm Larsen, …
Hardcover
R2,137
Discovery Miles 21 370
Formal Methods for Open Object-based…
Howard Bowman, John Derrick
Hardcover
R5,403
Discovery Miles 54 030
Encyclopedia of Earthquake Research and…
Daniel Galea
Hardcover
Econophysics and Sociophysics: Recent…
Frederic Abergel, Hideaki Aoyama, …
Hardcover
R4,653
Discovery Miles 46 530
Active Lavas - Monitoring and Modelling
Christopher R. J Kilburn, Giuseppe Luongo
Hardcover
R3,672
Discovery Miles 36 720
|