![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer communications & networking > Network security
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
Fuzzing is often described as a "black box" software testing
technique. It works by automatically feeding a program multiple
input iterations in an attempt to trigger an internal error
indicative of a bug, and potentially crash it. Such program errors
and crashes are indicative of the existence of a security
vulnerability, which can later be researched and fixed.
In this book, we aim to describe how to make a computer bend to
your will by finding and exploiting vulnerabilities specifically in
Web applications. We will describe common security issues in Web
applications, tell you how to find them, describe how to exploit
them, and then tell you how to fix them. We will also cover how and
why some hackers (the bad guys) will try to exploit these
vulnerabilities to achieve their own end. We will also try to
explain how to detect if hackers are actively trying to exploit
vulnerabilities in your own Web applications.
Dr. Tom Shinder's ISA Server 2006 Migration Guide provides a clear,
concise, and thorough path to migrate from previous versions of ISA
Server to ISA Server 2006. ISA Server 2006 is an incremental
upgrade from ISA Server 2004, this book provides all of the tips
and tricks to perform a successful migration, rather than rehash
all of the features which were rolled out in ISA Server 2004. Also,
learn to publish Exchange Server 2007 with ISA 2006 and to build a
DMZ.
Electronic discovery refers to a process in which electronic data
is sought, located, secured, and searched with the intent of using
it as evidence in a legal case. Computer forensics is the
application of computer investigation and analysis techniques to
perform an investigation to find out exactly what happened on a
computer and who was responsible. IDC estimates that the U.S.
market for computer forensics will be grow from $252 million in
2004 to $630 million by 2009. Business is strong outside the United
States, as well. By 2011, the estimated international market will
be $1.8 billion dollars. The Techno Forensics Conference has
increased in size by almost 50% in its second year; another example
of the rapid growth in the market.
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
This book will teach the reader how to make the most of their
WRT54G series hardware. These handy little inexpensive devices can
be configured for a near endless amount of networking tasks. The
reader will learn about the WRT54G s hardware components, the
different third-party firmware available and the differences
between them, choosing the firmware that is right for you, and how
to install different third-party firmware distributions. Never
before has this hardware been documented in this amount of detail,
which includes a wide-array of photographs and complete listing of
all WRT54G models currently available, including the
WRTSL54GS.
Understanding cybersecurity principles and practices is vital to all users of IT systems and services, and is particularly relevant in an organizational setting where the lack of security awareness and compliance amongst staff is the root cause of many incidents and breaches. If these are to be addressed, there needs to be adequate support and provision for related training and education in order to ensure that staff know what is expected of them and have the necessary skills to follow through. Cybersecurity Education for Awareness and Compliance explores frameworks and models for teaching cybersecurity literacy in order to deliver effective training and compliance to organizational staff so that they have a clear understanding of what security education is, the elements required to achieve it, and the means by which to link it to the wider goal of good security behavior. Split across four thematic sections (considering the needs of users, organizations, academia, and the profession, respectively), the chapters will collectively identify and address the multiple perspectives from which action is required. This book is ideally designed for IT consultants and specialist staff including chief information security officers, managers, trainers, and organizations.
This book provides an in-depth exploration of the phenomenon of hacking from a multidisciplinary perspective that addresses the social and technological aspects of this unique activity as well as its impact. What defines the social world of hackers? How do individuals utilize hacking techniques against corporations, governments, and the general public? And what motivates them to do so? This book traces the origins of hacking from the 1950s to today and provides an in-depth exploration of the ways in which hackers define themselves, the application of malicious and ethical hacking techniques, and how hackers' activities are directly tied to the evolution of the technologies we use every day. Rather than presenting an overly technical discussion of the phenomenon of hacking, this work examines the culture of hackers and the technologies they exploit in an easy-to-understand format. Additionally, the book documents how hacking can be applied to engage in various forms of cybercrime, ranging from the creation of malicious software to the theft of sensitive information and fraud-acts that can have devastating effects upon our modern information society. Documents how computer hacking fits into various forms of cybercrime Describes the subculture of computer hackers and explains how this social world plays an integral role in the business of hacking Clarifies the subtle differences between ethical and malicious hacks Focuses on the non-technical aspects of computer hacking to enable the reader to better understand the actors and their motives
Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.
The Dictionary of Information Security is a compilation of security
terms and definitions that working security professionals and IT
students will find helpful.
SonicWALL firewalls are the number 3 in sales worldwide in the
security appliance market space as of 2004. This accounts for 15%
total market share in the security appliance sector. The SonicWALL
firewall appliance has had the largest annual growth in the
security appliance sector for the last two years.
In the modern era each new innovation poses its own special ethical dilemma. How can human society adapt to these new forms of expression, commerce, government, citizenship, and learning while holding onto its ethical and moral principles? Ethical Impact of Technological Advancements and Applications in Society explores the ethical challenges of these innovations, providing cutting-edge analysis of designs, developments, impacts, policies, theories, and methodologies related to ethical aspects of technology in society. It advances scholarship on both in established areas such as computer ethics, engineering ethics, and biotech ethics as well as nascent areas of research such as nanoethics, artificial morality, and neuroethics.
Over 95% of computers around the world are running at least one
Microsoft product. Microsoft Windows Software Update Service is
designed to provide patches and updates to every one of these
computers.
This book is about software piracy--what it is and how it's done.
Stealing software is not to be condoned, and theft of intellectual
property and copyright infringement are serious matters, but it's
totally unrealistic to pretend that it doesn't happen. Software
piracy has reached epidemic proportions. Many computer users know
this, the software companies know this, and once you've read the
Introduction to this book, you'll understand why. Seeing how
widespread software piracy is, learning how it's accomplished, and
particularly how incredibly easy it is to do might surprise you.
This book describes how software piracy is actually being carried
out.
Recent advancements and innovations in medical image and data processing have led to a need for robust and secure mechanisms to transfer images and signals over the internet and maintain copyright protection. The Handbook of Research on Information Security in Biomedical Signal Processing provides emerging research on security in biomedical data as well as techniques for accurate reading and further processing. While highlighting topics such as image processing, secure access, and watermarking, this publication explores advanced models and algorithms in information security in the modern healthcare system. This publication is a vital resource for academicians, medical professionals, technology developers, researchers, students, and practitioners seeking current research on intelligent techniques in medical data security.
A practical reference written to assist the security professional
in clearly identifying what systems are required to meet security
needs as defined by a threat analysis and vulnerability assessment.
All of the elements necessary to conduct a detailed survey of a
facility and the methods used to document the findings of that
survey are covered. Once the required systems are determined, the
chapters following present how to assemble and evaluate bids for
the acquisition of the required systems in a manner that will meet
the most rigorous standards established for competitive bidding.
The book also provides recommended approaches for system/user
implementation, giving checklists and examples for developing
management controls using the installed systems. This book was
developed after a careful examination of the approved reference
material available from the American Society for Industrial
Security (ASIS International) for the certification of Physical
Security Professionals (PSP). It is intended to fill voids left by
the currently approved reference material to perform implementation
of systems suggested in the existing reference texts. This book is
an excellent "How To" for the aspiring security professional who
wishes to take on the responsibilities of security system
implementation, or the security manager who wants to do a
professional job of system acquisition without hiring a
professional consultant.
The explosive growth and deployment of networking technology poses many security challenges to networking professionals including network administrators and information systems managers. Often, network administrators and managers learn about specific tools and techniques that are applicable to specific systems or situations only, and hence, have a great deal of difficulty in applying their knowledge of security when a technology, a system, or a situation changes. Network Security, Administration and Management: Advancing Technology and Practice identifies the latest technological solutions, practices and principles on network security while exposing possible security threats and vulnerabilities of contemporary software, hardware, and networked systems. This book is a collection of current research and practices in network security and administration to be used as a reference by practitioners as well as a text by academicians and trainers.
The book is logically divided into 5 main categories with each
category representing a major skill set required by most security
professionals:
The CISO Handbook: A Practical Guide to Securing Your Company provides unique insights and guidance into designing and implementing an information security program, delivering true value to the stakeholders of a company. The authors present several essential high-level concepts before building a robust framework that will enable you to map the concepts to your company's environment. The book is presented in chapters that follow a consistent methodology - Assess, Plan, Design, Execute, and Report. The first chapter, Assess, identifies the elements that drive the need for infosec programs, enabling you to conduct an analysis of your business and regulatory requirements. Plan discusses how to build the foundation of your program, allowing you to develop an executive mandate, reporting metrics, and an organizational matrix with defined roles and responsibilities. Design demonstrates how to construct the policies and procedures to meet your identified business objectives, explaining how to perform a gap analysis between the existing environment and the desired end-state, define project requirements, and assemble a rough budget. Execute emphasizes the creation of a successful execution model for the implementation of security projects against the backdrop of common business constraints. Report focuses on communicating back to the external and internal stakeholders with information that fits the various audiences. Each chapter begins with an Overview, followed by Foundation Concepts that are critical success factors to understanding the material presented. The chapters also contain a Methodology section that explains the steps necessary to achieve the goals of the particular chapter.
Our world is increasingly driven by sophisticated networks of advanced computing technology, and the basic operation of everyday society is becoming increasingly vulnerable to those networks' shortcomings. The implementation and upkeep of a strong network defense is a substantial challenge, beset not only by economic disincentives, but also by an inherent logistical bias that grants advantage to attackers. Network Security Attacks and Countermeasures discusses the security and optimization of computer networks for use in a variety of disciplines and fields. Touching on such matters as mobile and VPN security, IP spoofing, and intrusion detection, this edited collection emboldens the efforts of researchers, academics, and network administrators working in both the public and private sectors. This edited compilation includes chapters covering topics such as attacks and countermeasures, mobile wireless networking, intrusion detection systems, next-generation firewalls, and more.
The SANS Institute maintains a list of the "Top 10 Software
Vulnerabilities." At the current time, over half of these
vulnerabilities are exploitable by Buffer Overflow attacks, making
this class of attack one of the most common and most dangerous
weapon used by malicious attackers. This is the first book
specifically aimed at detecting, exploiting, and preventing the
most common and dangerous attacks.
In recent years, the surge of blockchain technology has been rising due to is proven reliability in ensuring secure and effective transactions, even between untrusted parties. Its application is broad and covers public and private domains varying from traditional communication networks to more modern networks like the internet of things and the internet of energy crossing fog and edge computing, among others. As technology matures and its standard use cases are established, there is a need to gather recent research that can shed light on several aspects and facts on the use of blockchain technology in different fields of interest. Enabling Blockchain Technology for Secure Networking and Communications consolidates the recent research initiatives directed towards exploiting the advantages of blockchain technology for benefiting several areas of applications that vary from security and robustness to scalability and privacy-preserving and more. The chapters explore the current applications of blockchain for networking and communications, the future potentials of blockchain technology, and some not-yet-prospected areas of research and its application. This book is ideal for practitioners, stakeholders, researchers, academicians, and students interested in the concepts of blockchain technology and the potential and pitfalls of its application in different utilization domains. |
You may like...
Subdivision Surface Modeling Technology
Wenhe Liao, Hao Liu, …
Hardcover
R4,073
Discovery Miles 40 730
Statistical Performance Analysis and…
Ruijing Shen, Sheldon X. D. Tan, …
Hardcover
R2,692
Discovery Miles 26 920
Advanced Computer-Aided Fixture Design
Yiming (Kevin) Rong, Samuel Huang
Hardcover
R2,375
Discovery Miles 23 750
Suicide Squad - Extended Cut
Will Smith, Margot Robbie, …
Blu-ray disc
(2)R346 Discovery Miles 3 460
|