Narrow your search
Listing 11 - 20 of 109 << page
of 11
>>
Sort by
Infosecurity 2008 threat analysis
Author:
ISBN: 1281273317 9786611273316 0080558690 1597492248 9781597492249 9780080558691 9781281273314 661127331X Year: 2008 Publisher: Burlington, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DS

No tech hacking
Authors: ---
ISBN: 1281762911 9786611762919 0080558755 1597492159 9781597492157 9780080558752 9781281762917 6611762914 Year: 2008 Publisher: Rockland, Mass. Oxford Syngress Elsevier Science [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Johnny Long's last book sold 12,000 units worldwide. Kevin Mitnick's last book sold 40,000 units in North America.As the cliché goes, information is power. In this age of technology, an increasing majority of the world's information is stored electronically. It makes sense then that we rely on high-tech electronic protection systems to guard that information. As professional hackers, Johnny Long and Kevin Mitnick get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, their goal has always been the s

Reverse engineering code with IDA Pro
Authors: ---
ISBN: 1281273333 9786611273330 0080558798 159749237X 9780080558790 9781597492379 Year: 2008 Publisher: Burlington, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

If you want to master the art and science of reverse engineering code with IDA Pro for security R&D or software debugging, this is the book for you. Highly organized and sophisticated criminal entities are constantly developing more complex, obfuscated, and armored viruses, worms, Trojans, and botnets. IDA Pro's interactive interface and programmable development language provide you with complete control over code disassembly and debugging. This is the only book which focuses exclusively on the world's most powerful and popular took for reverse engineering code.*Reverse Engineer REA

OSSEC host-based intrusion detection guide
Authors: --- ---
ISBN: 1281762938 9786611762933 0080558771 159749240X 9781597492409 9780080558776 Year: 2008 Publisher: Burlington, Mass. Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

This book is the definitive guide on the OSSEC Host-based Intrusion Detection system and frankly, to really use OSSEC you are going to need a definitive guide. Documentation has been available since the start of the OSSEC project but, due to time constraints, no formal book has been created to outline the various features and functions of the OSSEC product. This has left very important and powerful features of the product undocumented...until now! The book you are holding will show you how to install and configure OSSEC on the operating system of your choice and provide detailed examples to h


Book
Securing Citrix XenApp Server in the enterprise
Authors: --- ---
ISBN: 1281755028 9786611755027 0080569986 1597492817 9781597492812 9780080569987 Year: 2008 Publisher: Burlington, Mass. Oxford Syngress Elsevier Science [distributor]

Loading...
Export citation

Choose an application

Bookmark

Abstract

Citrix Presentation Server allows remote users to work off a network server as if they weren't remote. That means: Incredibly fast access to data and applications for users, no third party VPN connection, and no latency issues. All of these features make Citrix Presentation Server a great tool for increasing access and productivity for remote users. Unfortunately, these same features make Citrix just as dangerous to the network it's running on. By definition, Citrix is granting remote users direct access to corporate servers?..achieving this type of access is also the holy grail for malicious


Book
Malware forensics
Authors: --- ---
ISBN: 1281762954 9786611762957 0080560199 159749268X 9780080560199 9781597492683 9781281762955 6611762957 Year: 2008 Publisher: Burlington, MA Syngress Pub.

Loading...
Export citation

Choose an application

Bookmark

Abstract

Malware Forensics: Investigating and Analyzing Malicious Code covers the emerging and evolving field of ""live forensics,"" where investigators examine a computer system to collect and preserve critical live data that may be lost if the system is shut down. Unlike other forensic texts that discuss ?live forensics? on a particular operating system, or in a generic context, this book emphasizes a live forensics and evidence collection methodology on both Windows and Linux operating systems in the context of identifying and capturing malicious code and evidence of its effect on the compromised

Securing information and communications systems : principles, technologies, and applications
Author:
ISBN: 1596932295 9781596932296 1596932287 Year: 2008 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This one-stop reference gives you the latest expertise on everything from access control and network security, to smart cards and privacy. Representing a total blueprint to security design and operations, this book brings all modern considerations into focus. It maps out user authentication methods that feature the latest biometric techniques, followed by authorization and access controls including DAC, MAC, and ABAC and how these controls are best applied in today's relational and multilevel secure database systems.


Book
Fuzzing for software security testing and quality assurance
Authors: --- ---
ISBN: 1596932155 9781596932159 1596932147 9781596932142 9781596932159 Year: 2008 Publisher: Boston : [Piscataqay, New Jersey] : Artech House, IEEE Xplore,

Loading...
Export citation

Choose an application

Bookmark

Abstract

This comprehensive reference goes through each phase of software development and points out where testing and auditing can tighten security. It surveys all popular commercial fuzzing tools and explains how to select the right one for a software development project. The book also identifies those cases where commercial tools fall short and when there is a need for building your own fuzzing tools.

Trust and security in collaborative computing
Authors: --- ---
ISBN: 1281933589 9786611933586 9812790888 9789812703682 9812703683 9789812790880 Year: 2008 Volume: v. 2 Publisher: Hackensack, NJ World Scientific

Loading...
Export citation

Choose an application

Bookmark

Abstract

Computer networks are compromised by various unpredictable factors, such as hackers, viruses, spam, faults, and system failures, hindering the full utilization of computer systems for collaborative computing - one of the objectives for the next generation of the Internet. It includes the functions of data communication, resource sharing, group cooperation, and task allocation. One popular example of collaborative computing is grid computing. This monograph considers the latest efforts to develop a trusted environment with the high security and reliability needed for collaborative computing.

Listing 11 - 20 of 109 << page
of 11
>>
Sort by