Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. This book sheds light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats.
Explores organized crime, terrorist threats, and hackers. This work addresses the steps organizations must take to address insider threats at a people, process, and technology level.
Helps you find and exploit vulnerabilities, specifically in Web applications. This book: describes common security issues in Web applications, tells you how to find them, describes how to exploit them, and then tells you how to fix them. It also features an companion website.
Members of AVIEN (the Anti-Virus Information Exchange Network) have been setting agendas in malware management for several years. This book takes up the theme of the sometimes stormy relationship between the antivirus industry and its customers, and tries to dispel some common myths. It considers the thorny issue of malware nomenclature.
Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why Macintosh's OS X system is vulnerable and understanding how to defend it is critical to computer security. This title helps you master the boot process, and Macintosh forensic software.
The Real MCTS/MCITP Exam is designed to validate Windows Server 2008 Active Directory skills. This exam will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-640. This title helps newcomers to Microsoft certification, study for and pass MCTS exam for Active Directory on their way to MCITP certification.
Contains information of dedicated exploit, vulnerability, and tool code along with corresponding instruction. This book also includes a CD which contains both commented and uncommented versions of the source code examples presented throughout, along with a copy of the author-developed Hacker Code Library v1.0.
The Microsoft Certified Technology Specialist (MCTS)/MCITP exam is designed to validate Windows Server 2008 network infrastructure configuration skills. It will fulfill the Windows Server 2008 Technology Specialist requirements of Exam 70-643. This title addresses both newcomers to MS certification, and those who are upgrading from Windows 2003.
A guide to the Snort version 2.6. It offers coverage ranging from packet inspection to optimizing Snort for speed to using the advanced features of Snort to defend even the largest and most congested enterprise networks.
Microsoft Office Communications Server (OCS) 2007 is Microsoft's latest version of Live Communications Server 2005. This title offers the system administrator with an easy-to-access reference that provides step-by-step instructions on how to install, configure, manage and troubleshoot Communicator across the network.
Focuses on the methods used by professionals to perform WarDriving and wireless pentration testing. This work is suitable for those individuals that are tasked with performing penetration testing on wireless networks.
Voice Over IP (VoIP) phone lines must be protected from malicious hackers because these devices reside on the network. This book covers a variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems.
Suitable for those who have an interest in useful Perl scripting for the purpose of incident response, forensic analysis, and application monitoring, this book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems.
Microsoft Forefront is a suite of security products that provides companies with multiple layers of defense against threats. This book offers a reference to Microsoft's security products. It includes a companion web site providing best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this configuration guide allows you to configure these appliances to allow remote and mobile access for employees.
Provides IT security professionals with the information needed to create, manage and sustain a digital forensics lab and investigative team that can accurately and effectively analyze forensic data and recover digital evidence, while preserving the integrity of the electronic evidence for discovery and trial.
Offers robotics information to be compatible with the new set and to show how sound, sight, touch, and distance issues are now dealt with. This book unleashes the full power and potential of the tools, sensors, and components that make up LEGO Mindstorms Nxt.
A guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. It shows how to: create protocol definitions and firewall policy to allow only authorized users to connect to your Exchange Server; configure SMTP Filtering and SMTP Message Screener; and, troubleshoot the SSL connection to your Exchange Server.
Combines cybercrime and digital forensic topics to provides law enforcement and IT security professionals with the information needed to manage a digital investigation. This book helps analyze forensic data and recover digital evidence, and includes instructions for building a digital forensics lab. It is helpful for law enforcement agencies.
Teaches the reader how to make the most of their WRT54G series hardware. This title teaches readers about the WRT54G's hardware components, the different third-party firmware and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions.
According to Microsoft, Internet Information Services (IIS) 7.0 is a web server that provides a secure, easy to manage platform for developing and hosting Web applications and services. For the average SysAdmin, it presents a difficult migration path. This title aims to help the SysAdmin get IIS 7 up and running as quickly as possible.
Most System Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. This book identifies the primary vulnerabilities of most computer networks, including user access, remote access, messaging, wireless hacking, media, and email threats.
Offers a look at network security. This book guides readers step-by-step through the 'stack' - the seven layers of a network. It includes chapters that focus on one layer of the stack along with the attacks, vulnerabilities, and exploits that can be found at that layer. It features a chapter on the mythical eighth layer: the people layer.
Microsoft's Virtual Server is the enterprise tool to free an infrastructure from its physical limitations providing the transformation into a virtual environment - this book shows you how. It details the default and custom installation of Microsoft's Virtual Server 2005, as well as basic and advanced virtual machine configurations.
Presents a path to migrate from previous versions of ISA Server to ISA Server 2006. This book provides the tips and tricks to perform a successful migration. It helps you learn to publish Exchange Server 2007 with ISA 2006 and to build a DMZ. It highlights key issues for migrating from previous versions of ISA Server to ISA Server 2006.
A book for multi-tasked IT managers responsible for securing the version of SQL Server 2005. It provides the multi-tasked Sys Admin with the useful information needed to perform the daily tasks. It covers SQL Server 2005, which is a massive product with significant challenges for IT managers. It emphasizes best-practice security measures.
Suitable for the multitasked SysAdmin, this book tells how you can automate Windows Vista installation. It also shows how Windows installations can be automated for large-scale deployments using the Windows Automated Installation Kit (WAIK). It tells how to install and maintain devices.
Shows you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have control over your servers and web sites using tools like IIS7, Windows Server Manager, and Windows PowerShell; and, secure your network with Network Access Protection and the Read-Only Domain Controller.
Describes the real security threats that you have to worry about, and more importantly, what to do about them. This book is suitable for the business, consumer, and technical users short on time but looking for information along with reader friendly analogies.
Describes how alternate data storage devices (ADS) are used to both move and hide data. This book features case studies that demonstrate how to perform forensic investigations on a variety of ADS devices including: Apple iPods, Digital Video Recorders, Cameras, Gaming Consoles (Xbox, PS2, and PSP), Bluetooth devices, and more.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.