Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
As the sophistication of cyber-attacks increases, understanding how to defend critical infrastructure systems-energy production, water, gas, and other vital systems-becomes more important, and heavily mandated. Industrial Network Security, Second Edition arms you with the knowledge you need to understand the vulnerabilities of these distributed supervisory and control systems. The book examines the unique protocols and applications that are the foundation of industrial control systems, and provides clear guidelines for their protection. This how-to guide gives you thorough understanding of the unique challenges facing critical infrastructures, new guidelines and security measures for critical infrastructure protection, knowledge of new and evolving security tools, and pointers on SCADA protocols and security implementation. All-new real-world examples of attacks against control systems, and more diagrams of systemsExpanded coverage of protocols such as 61850, Ethernet/IP, CIP, ISA-99, and the evolution to IEC62443 Expanded coverage of Smart Grid security New coverage of signature-based detection, exploit-based vs. vulnerability-based detection, and signature reverse engineering
Microsoft Windows 8.1 and Windows Server 2012 R2 are designed to be the best performing operating systems to date, but even the best systems can be overwhelmed with load and/or plagued with poorly performing code. Windows Performance Analysis Field Guide gives you a practical field guide approach to performance monitoring and analysis from experts who do this work every day. Think of this book as your own guide to "What would Microsoft support do?" when you have a Windows performance issue. Author Clint Huffman, a Microsoft veteran of over fifteen years, shows you how to identify and alleviate problems with the computer resources of disk, memory, processor, and network. You will learn to use performance counters as the initial indicators, then use various tools to "dig in" to the problem, as well as how to capture and analyze boot performance problems. This field guide gives you the tools and answers you need to improve Microsoft Windows performance, including: Save money on optimizing Windows performance with deep technical troubleshooting that tells you "What would Microsoft do to solve this?" Includes performance counter templates so you can collect the right data the first time.Learn how to solve performance problems using free tools from Microsoft such as the Windows Sysinternals tools and more.In a rush? Chapter 1 Start Here gets you on the quick path to solving the problem.Also covers earlier versions such as Windows 7 and Windows Server 2008 R2.
A practical guide to database administrators to secure their Oracle databases. It helps the DBA to assess their level of risk as well as their security posture. It provides practical, applicable knowledge to appropriately secure the Oracle database. It shows you how to securely integrate your database into your enterprise.
Suitable for the multitasked sys admin, this title presents an introduction to VoIP security, covering exploit tools and how they can be used against VoIP (Voice over IP) systems. It also gives the basics of attack methodologies used against the SIP and H.323 protocols as well as VoIP network infrastructure.
Microsoft's flagship ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and Speed. This book provides the system administrators with an understanding of the features of this Internet Server.
Details the default and custom installation of VMware's ESX server as well as basic and advanced virtual machine configurations. This book walks the reader through post installation configurations including installation and configuration of VirtualCenter.
Kismet is the industry standard for examining wireless network traffic, and is used by over 250,000 security professionals, wireless networking enthusiasts, and WarDriving hobbyists. This book is suitable for those individuals that use the Linux operating system.
Helps system administrators learn more than hundred tips for automating daily system administration tasks using Windows command line scripts.
Lists the dangerous hacks and exploits specific to networks, and presents the anatomy of these attacks including how to make your system more secure. This book includes attacks such as: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay.
A guide to developing mobile applications using Microsoft technologies. It focuses on using ASP.NET and the .NET mobile SDK. It provides an introduction to the .NET platform.
Offers information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization.
Active Directory Services changes the way IT professionals design, plan, configure and administer their Windows NT networks. Systems Engineers will probably spend much of their time planning for and deploying Active Directory Services in many different environments. This book aims to provide coverage of everything they will need to succeed.
Written for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH) to the implementation of security policies, plans, and recovery protocols, this book helps users secure their wireless network before its security is compromised.
Choosing the right mobile phone and service plan can be overwhelming. This book aims to help consumers choose what program may best suit them. It helps streamline the wireless-buying process by providing a complete listing of wireless providers and the details of their plans. International listings include coverage of USA, Africa and Asia-Pacific.
Deals with specific e-mail clients, server environments, and anti-virus software. This book places emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. It also shows how to scan content and counter email address forgery attacks.
Talks about the process of preparing and deploying open source host integrity monitoring software, specifically, Osiris and Samhain. From the configuration and installation to maintenance, testing, and fine-tuning, this book cover what you need to know to correctly deploy a centralized host integrity monitoring solution.
Contains portrayals of researching, developing, and defending the Internet from a malicious "Zero-Day" attack. This book, about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists, is useful for the security and IT community.
Hundreds of thousands of business enterprises, large and small, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Part of the "Hack Proofing" series, this book gives system administrators the information they need to fortify their operating system against the never-ending threat of hackers.
Cisco AVVID allows businesses to transmit voice, data, and video over a single integrated architecture called a "converged" network. Intended for network administrators and engineers, this title covers history, protocols, hardware, servers, switches, bridges, and discussions about implementation issues, realities of cost and network limitations.
A guide to the .Net framework that utilizes XML to achieve greater flexibility of information and increased interoperability. It covers the history, applications and implementation of the Extensible Markup Language within Microsoft's .NET framework. It gives an introduction to .NET and its XML building blocks - used to build a Web site.
Because ColdFusion does not require that developers have expertise in Visual Basic, Java and C++; Web applications created using ColdFusion Markup language are vulnerable to a variety of security breaches. Part of the "Hack Proofing" series, this book provides developers with step-by-step instructions for developing secure web applications.
Gives guidance to install and configure Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. It does not cover the Active Directory function of Windows 2000.
SQL Server 2000 is one of the key components of .NET. This title addresses the needs of IT professionals migrating from the popular SQL 7 databases to the SQL 2000, as well as those who are starting from scratch. It covers key features of SQL Server 2000 including; XML support, enhanced data-mining capabilities and integration with Windows 2000.
Cisco Systems, Inc is the worldwide leader in networking for the Internet, and its Intrusion Detection Systems line of products is making in roads in the IDS market segment. This work presents the hardware and software that comprise the Cisco IDS. It also covers Cisco Secure Intrusion Detection Systems Exam (CSIDS 9E0-100) for CCSPs.
Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95 per cent of all companies running it. This guide helps you avoid 'time drains' configuring the many different security standards built into Windows 2003, as well as secure VPN and Extranet Communications.
Fuzzing is often described as a 'black box' software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. This book teaches how fuzzing finds vulnerabilities. It shows how to eliminate buffer overflows and format strings.
RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. This title discusses the motives for someone wanting to hack an RFID system and shows how to protect systems.
Acts as a guide for software developers who must learn and implement cryptography. Introducing the subject of cryptography, this book discusses how to implement large integer arithmetic as required by RSA and ECC public key algorithms, the implementation of symmetric ciphers and other codes and finally, portable coding practices.
The growing connectivity among secure and insecure networks has created opportunities for unauthorized intrusions into sensitive or proprietary computer systems. This book demonstrates the motives and motivations of criminal hackers through profiling attackers at post attack and forensic levels.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.