![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Network security
This book covers selected topics and methods for peripheral security, which are gaining attention nowadays. The book discusses the security arrangement and methods for monitoring the inside/outside entry of peripheral areas that need to be secured. It relates to a periphery, often portable device (as well as the methods employed, and systems including such a peripheral device and a host central command device with which the local geographical command device communicates), enabling one or more security operations performed by the peripheral device. It also covers the security scenario of snow-prone areas in a remote location. It also elaborates how we can secure the person and devices in extremely cold conditions and rescue them. This book helps the researchers, academicians, and industry persons working in security areas to protect unauthentic entry in large scale areas that may be defense camps or civilian applications like large-sized bungalows, institutes, and organizations of national importance. The experimental results are in close conformance to the proposed methodologies.
Finally--a single volume guide to really effective security for
both voice and data wireless networks!
The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For the experienced security practitioner, it provides the tools necessary for developing effective solutions and responses to the growing number of challenges encountered by today's security professionals.
Businesses now realize that their communications infrastructure can be crippled instantly. This work looks at technologies that both help keep connections up with the outside world and uses communications itself to prevent employees from physically getting in harms way. Topics include audio, data and videoconferencing, telecommuting, wireless communications, uninterruptible power systems, disaster planning and recovery, using both the Internet and the telephone network for voice communications, wireless LANs, and distributed systems.
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology.
This book presents trading in local energy markets and communities. It covers electrical, business, economics, telecommunication, information technology (IT), environment, building, industrial, and computer science and examines the intersections of these areas with these markets and communities. Additionally, it delivers an vision for local trading and communities in smart cities. Since it also lays out concepts, structures, and technologies in a variety of applications intertwined with future smart cities, readers running businesses of all types will find material of use in the book. Manufacturing firms, electric generation, transmission and distribution utilities, hardware and software computer companies, automation and control manufacturing firms, and other industries will be able to use this book to enhance their energy operations, improve their comfort and privacy, as well as to increase the benefit from the energy system. This book is also used as a textbook for graduate level courses.
The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the social and political climates in which they worked. They all appeared to struggle with some of the same issues. With a fresh set of interviews exploring further cross-cultural differences and similarities, Volume Two extends the reach to several new countries, including Slovenia, Slovakia, Northern Ireland, Switzerland, and France. The interviews are conducted by scholars or practitioners with intimate knowledge of correctional practice and who are familiar with the correctional system in the country of the interviewees. They expand the knowledge base by asking correction leaders specifically about the impact of the economic downturn on corrections in each country, the changes in correctional practice they've experienced, and how they think about and evaluate trends and developments. This revealing series affords correctional leaders an unprecedented opportunity to express their views on current practices and the future of corrections in their countries, facilitating the development of solutions to corrections challenges worldwide. This book is a volume in the Interviews with Global Leaders in Policing, Courts and Corrections series.
The International Police Executive Symposium (IPES, www.ipes.info) coordinates annual international conferences to evaluate critical issues in policing and recommend practical solutions to law enforcement executives deployed across the globe. Drawn from the 2005 proceedings hosted by the Czech Republic in Prague, Effective Crime Reduction Strategies: International Perspectives contains contributions from the renowned criminal justice and law enforcement professionals who gathered at this elite annual meeting. Dedicated to continued reduction in crime through local and global response, these international experts share effective crime-fighting principles and tried and proven best practices. Thoroughly revised and updated since the initial proceedings, the reports in this volume are divided into six sections which explore a host of essential topics: Critical Issues in European Law Enforcement: Highlights efforts in Hungary, Austria, and Norway to revise policies and organizational structures to meet the demands of developing events and political pressures Contemporary Concerns: Policing in the United States and Canada: Analyzes the impact of international terrorism and transnational crime on police work Paradigm Shifts: Policing as Democracy Evolves: Evaluates the success of democratic reforms in South Africa, Brazil, Argentina, Nigeria, and Cameroon Revising Traditional Law Enforcement in Asia to Meet Contemporary Demands: Describes how counterterrorism, cultural ideology, and transnational criminal influence affects the traditional nature of policing in New Zealand, Turkey, Indonesia, and Thailand The Positive Influence of Unionization on Police Professionalism: Addresses the impact of police associations on management decision-making and policy development in the United States, Canada, New Zealand, and South Africa
In Brazil, where crime is closely associated with social inequality and failure of the criminal justice system, the police are considered by most to be corrupt, inefficient, and violent, especially when occupying poor areas, and they lack the widespread legitimacy enjoyed by police forces in many nations in the northern hemisphere. This text covers hot-button issues like urban pacification squads, gangs, and drugs, as well as practical topics such as policy, dual civil and military models, and gender relations. The latest volume in the renowned Advances in Police Theory and Practice Series, Police and Society in Brazil fills a gap in English literature about policing in a nation that currently ranks sixth in number of homicides. It is a must-read for criminal justice practitioners, as well as students of international policing.
The huge proliferation of security vulnerability exploits, worms, and viruses place an incredible drain on both cost and confidence for manufacturers and consumers. The release of trustworthy code requires a specific set of skills and techniques, but this information is often dispersed and decentralized, encrypted in its own jargon and terminology, and can take a colossal amount of time and data mining to find. Written in simple, common terms, Testing Code Security is a consolidated resource designed to teach beginning and intermediate testers the software security concepts needed to conduct relevant and effective tests. Answering the questions pertinent to all testing procedures, the book considers the differences in process between security testing and functional testing, the creation of a security test plan, the benefits and pitfalls of threat-modeling, and the identification of root vulnerability problems and how to test for them. The book begins with coverage of foundation concepts, the process of security test planning, and the test pass. Offering real life examples, it presents various vulnerabilities and attacks and explains the testing techniques appropriate for each. It concludes with a collection of background overviews on related topics to fill common knowledge gaps. Filled with cases illustrating the most common classes of security vulnerabilities, the book is written for all testers working in any environment, and it gives extra insight to threats particular to Microsoft Windows (R) platforms. Providing a practical guide on how to carry out the task of security software testing, Testing Code Security gives the reader the knowledge needed to begin testing software security for any project and become an integral part in the drive to produce better software security and safety.
Reflecting the latest developments and emerging trends from the field, COMPTIA SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS, 6e, helps you prepare for professional certification -- and career success. The text fully maps to the new CompTIA Security+ SY0-501 Certification Exam, providing thorough coverage of all domain objectives. In addition to its comprehensive coverage of the fundamental essentials of network and computer security, the sixth edition includes expanded coverage of embedded device security, attacks and defenses, and new software tools to assess security. Practical, Hands-On Projects and case activities help you put what you learn into real-world practice, while the innovative Information Security Community Site connects you to additional activities, blogs, videos, and up-to-the-minute news and insights from the information security field.
What is IPSec? What's a VPN? Why do the need each other? Virtual Private Network (VPN) has become one of the most recognized terms in our industry, yet there continuously seems to be different impressions of what VPNs really are and can become.
With an ever-increasing amount of information on the web, it is critical to understand the pedigree, quality, and accuracy of your data. Using provenance, you can ascertain the quality of data based on its ancestral data and derivations, track back to sources of errors, allow automatic re-enactment of derivations to update data, and provide attribution of the data source. Secure Data Provenance and Inference Control with Semantic Web supplies step-by-step instructions on how to secure the provenance of your data to make sure it is safe from inference attacks. It details the design and implementation of a policy engine for provenance of data and presents case studies that illustrate solutions in a typical distributed health care system for hospitals. Although the case studies describe solutions in the health care domain, you can easily apply the methods presented in the book to a range of other domains. The book describes the design and implementation of a policy engine for provenance and demonstrates the use of Semantic Web technologies and cloud computing technologies to enhance the scalability of solutions. It covers Semantic Web technologies for the representation and reasoning of the provenance of the data and provides a unifying framework for securing provenance that can help to address the various criteria of your information systems. Illustrating key concepts and practical techniques, the book considers cloud computing technologies that can enhance the scalability of solutions. After reading this book you will be better prepared to keep up with the on-going development of the prototypes, products, tools, and standards for secure data management, secure Semantic Web, secure web services, and secure cloud computing.
From fires, floods, and power outages to hackers and software problems, companies need to protect against a variety of threats. Business Continuity Planning takes a best practices approach to provide a comprehensive continuity solution. It details how to build a plan to handle disruptions in business, keep vital operations up and running, and prevent losses that occur when productivity is crippled or security is compromised. The book explains how to evaluate a current plan for completeness and how to monitor and maintain it to ensure it remains up-to-date.
China's emergence as a great power in the twenty-first century is strongly enabled by cyberspace. Leveraged information technology integrates Chinese firms into the global economy, modernizes infrastructure, and increases internet penetration which helps boost export-led growth. China's pursuit of "informatization " reconstructs industrial sectors and solidifies the transformation of the Chinese People's Liberation Army into a formidable regional power. Even as the government censors content online, China has one of the fastest growing internet populations and most of the technology is created and used by civilians. Western political discourse on cybersecurity is dominated by news of Chinese military development of cyberwarfare capabilities and cyber exploitation against foreign governments, corporations, and non-governmental organizations. Western accounts, however, tell only one side of the story. Chinese leaders are also concerned with cyber insecurity, and Chinese authors frequently note that China is also a victim of foreign cyber--attacks--predominantly from the United States. China and Cybersecurity: Political, Economic, and Strategic Dimensions is a comprehensive analysis of China's cyberspace threats and policies. The contributors--Chinese specialists in cyber dynamics, experts on China, and experts on the use of information technology between China and the West--address cyberspace threats and policies, emphasizing the vantage points of China and the U.S. on cyber exploitation and the possibilities for more positive coordination with the West. The volume's multi-disciplinary, cross-cultural approach does not pretend to offer wholesale resolutions. Contributors take different stances on how problems may be analyzed and reduced, and aim to inform the international audience of how China's political, economic, and security systems shape cyber activities. The compilation provides empirical and evaluative depth on the deepening dependence on shared global information infrastructure and the growing willingness to exploit it for political or economic gain.
Port-based authentication is a "network access control" concept in which a particular device is evaluated before being permitted to communicate with other devices located on the network. 802.1X Port-Based Authentication examines how this concept can be applied and the effects of its application to the majority of computer networks in existence today. 802.1X is a standard that extends the Extensible Authentication Protocol (EAP) over a Local Area Network (LAN) through a process called Extensible Authentication Protocol Over LANs (EAPOL). The text presents an introductory overview of port-based authentication including a description of 802.1X port-based authentication, a history of the standard and the technical documents published, and details of the connections among the three network components. It focuses on the technical aspect of 802.1X and the related protocols and components involved in implementing it in a network. The book provides an in-depth discussion of technology, design, and implementation with a specific focus on Cisco devices. Including examples derived from the 802.1X implementation, it also addresses troubleshooting issues in a Cisco environment. Each chapter contains a subject overview. Incorporating theoretical and practical approaches, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms. It explores various applications to today's computer networks using this particular network protocol.
In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace. The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter. The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned. The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book. Contents 1. Cybercrime. 2. Cyberwarfare. About the Authors Igor Bernik is Vice Dean for Academic Affairs and Head of the Information Security Lab at the University of Maribor, Slovenia. He has written and contributed towards over 150 scientific articles and conference papers, and co-authored 4 books. His current research interests concern information/cybersecurity, cybercrime, cyberwarfare and cyberterrorism.
This book covers various aspects of security, privacy and reliability in Internet of Things (IoT) and Cyber-Physical System design, analysis and testing. In particular, various established theories and practices both from academia and industry are presented and suitably organized targeting students, engineers and researchers. Fifteen leading academicians and practitioners wrote this book, pointing to the open problems and biggest challenges on which research in the near future will be focused.
Reflecting the latest trends and developments from the information security field, best-selling Security+ Guide to Network Security Fundamentals, International Edition, provides a complete introduction to practical network and computer security and maps to the CompTIA Security+ SY0-301 Certification Exam. The text covers the fundamentals of network security, including compliance and operational security; threats and vulnerabilities; application, data, and host security; access control and identity management; and, cryptography. This updated edition includes new topics, such as psychological approaches to social engineering attacks, Web application attacks, penetration testing, data loss prevention, cloud computing security, and application programming development security. This new edition features activities that link to the Information Security Community Site, which offers video lectures, podcats, discussion boards, additional hands-on activities and more to provide a wealth of resources and up-to-the minute information.
This book advances an approach that combines the individual and the structural, systemic dimensions of data protection. It considers the right to data protection under the EU Charter and its relationship to the secondary legislation. Furthermore, the case law of the Court of Justice of the EU as well as current academic conceptualizations are analysed. The author finds that current approaches invariably link data protection to privacy and often fail to address the structural implications of data processing. He therefore suggests a dualistic approach to data protection: in its individual dimension, data protection aims to protect natural persons and their rights, while the structural dimension protects the democratic society as a whole from the adverse effects of data processing. Using this approach, the full potential of an independent right to data protection can be realized. Researchers, practitioners and students will find this a valuable resource on the rationales, scope and application of data protection. Felix Bieker is Legal Researcher at the Office of the Data Protection Commissioner of Schleswig-Holstein (Unabhangiges Landeszentrum fur Datenschutz) in Kiel, Germany.
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirement to counter the threat. Network security education generally lacks appropriate textbooks with detailed, hands-on exercises that include both offensive and defensive techniques. Using step-by-step processes to build and generate attacks using offensive techniques, Network Attacks and Defenses: A Hands-on Approach enables students to implement appropriate network security solutions within a laboratory environment. Topics covered in the labs include: Content Addressable Memory (CAM) table poisoning attacks on network switches Address Resolution Protocol (ARP) cache poisoning attacks The detection and prevention of abnormal ARP traffic Network traffic sniffing and the detection of Network Interface Cards (NICs) running in promiscuous mode Internet Protocol-Based Denial-of-Service (IP-based DoS) attacks Reconnaissance traffic Network traffic filtering and inspection Common mechanisms used for router security and device hardening Internet Protocol Security Virtual Private Network (IPsec VPN) security solution protocols, standards, types, and deployments Remote Access IPsec VPN security solution architecture and its design, components, architecture, and implementations These practical exercises go beyond theory to allow students to better anatomize and elaborate offensive and defensive techniques. Educators can use the model scenarios described in this book to design and implement innovative hands-on security exercises. Students who master the techniques in this book will be well armed to counter a broad range of network security threats.
When it's all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networks-using free, open source, and commercially available tools, including Backtrack, Metasploit, Wireshark, Nmap, Netcat, and Nessus. It also considers exploits and other programs using Python, PERL, BASH, PHP, Ruby, and Windows PowerShell. The book taps into Bruce Middleton's decades of experience with computer security, including penetration testing of military networks, the White House, utilities, manufacturing facilities, CIA headquarters, the Defense Information Systems Agency, and NASA. Mr. Middleton begins with a chapter on defensive measures/privacy issues and then moves on to describe a cyber-attack on one of his labs and how he responded to the attack. Next, the book explains how to research a target without directly "touching" that target. Once you've learned all you can, the text describes how to gather even more information using a more direct approach. From there, it covers mathematical analysis, considers target exploitation, and discusses Chinese and Syrian cyber-attacks. Providing authoritative guidance on cyberforensics, reverse engineering, and penetration testing, the book categorizes testing tools according to their use within the standard penetration testing framework. For each of the above-mentioned categories, you will find basic and advanced tools and procedures to help you identify security vulnerabilities in today's networks. After reading this book, you will understand how to perform an organized and efficient penetration test. You will also learn techniques used to bypass anti-virus software and capture keystrokes of remote systems. Explaining how to put together your own penetration testing lab, the text concludes by describing how to utilize various iPhone apps to perform reconnaissance activities on wireless networks.
First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.
Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network. |
You may like...
Managing Catastrophic Loss of Sensitive…
Constantine Photopoulos
Paperback
R1,265
Discovery Miles 12 650
A Primer for Mathematics Competitions
Alexander Zawaira, Gavin Hitchcock
Hardcover
R2,089
Discovery Miles 20 890
The Classes of Higher Dimensional…
Gennadiy Vladimirovich Zhizhin
Hardcover
R5,368
Discovery Miles 53 680
Geometry and its Applications
Vladimir Rovenski, Pawel Walczak
Hardcover
R4,645
Discovery Miles 46 450
Research Anthology on Emerging…
Information Resources Management Association
Hardcover
R13,494
Discovery Miles 134 940
Women's Health, An Issue of Primary…
Joel J. Heidelbaugh, Wendy Biggs
Hardcover
R1,565
Discovery Miles 15 650
|