Browse Results

Showing 82,351 through 82,375 of 82,742 results

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 (Exam 70-292): Study Guide & DVD Training System

by Will Schmied

MCSA/MCSE Exam 70-292 Study Guide & DVD Training System: Managing and Maintaining a Windows Server 2003 Environment for an MCSA Certified on Windows 2000 is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-292 exam objectives plus test preparation software for the edge you need to pass the exam on your first try.In June, 2003 Microsoft will launch beta exams for the Windows Server 2003 certification line. Exams will likely go live the following August and September. This launch is a comprehensive revamping of the MCSE (Microsoft Certified System Enginner) track with all new core exams and all new electives. In addition, the MCSA (Microsoft Certified System Administrator) certification will expand its program to include an additional upgrade exam for MCSAs wanting to become MCSEs. The launch of this new certification track means that all current MCSEs, representing an installed base of approximately 200,000 (source: MCP Magazine) will need to recertify under Windows Server 2003. In addition, any MCP looking to become an MCSE--estimates are about 1.2 million (source: MCP Magazine)--will also have to continue their certifications under the new program. Many industry experts expect the Windows 2003 certification, and product line as well, to be a more popular track since many organziations are still using NT and plan to skip 2000 and go directly to 2003.* DVD Provides a "Virtual Classroom": Get the benefits of instructor led training at a fraction of the cost and hassle.* Guaranteed Coverage of All Exam Objectives: If the topic is listed in Microsoft's Exam 70-292 objectives, it is covered here.* Fully Integrated Learning: This system includes a study guide, DVD training and Web-based practice exams.

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment (Exam 70-290): Study Guide & DVD Training System

by Syngress

MCSA/MCSE Managing and Maintaining a Windows Server 2003 Environment: Exam 70-290 Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft 70-290 exam objectives plus test preparation software for the edge you need to pass the exam on your first try.In June, 2003 Microsoft will launch beta exams for the Windows Server 2003 certification line. Exams will likely go live the following August and September. This launch is a comprehensive revamping of the MCSE (Microsoft Certified System Enginner) track with all new core exams and all new electives. In addition, the MCSA (Microsoft Certified System Administrator) certification will expand its program to include an additional upgrade exam for MCSAs wanting to become MCSEs. The launch of this new certification track means that all current MCSEs, representing an installed base of approximately 200,000 (source: MCP Magazine) will need to recertify under Windows Server 2003. In addition, any MCP looking to become an MCSE--estimates are about 1.2 million (source: MCP Magazine)--will also have to continue their certifications under the new program. Many industry experts expect the Windows 2003 certification, and product line as well, to be a more popular track since many organziations are still using NT and plan to skip 2000 and go directly to 2003.* DVD Provides a "Virtual Classroom": Get the benefits of instructor led training at a fraction of the cost and hassle.* Guaranteed Coverage of All Exam Objectives: If the topic is listed in Microsoft's Exam 70-290 objectives, it is covered here.* Fully Integrated Learning: This system includes a study guide, DVD training and Web-based practice exams.

MCSA/MCSE Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure (Exam 70-291): Study Guide and DVD Training System

by Syngress

Syngress Study Guides guarantee comprehensive coverage of all exam objectives. There are no longer any short cuts or gimmicks that allow candidates to pass Microsoft's new, more rigorous exams. The days of cramming to become a "paper MCSE" are over; candidates must have a full grasp of all core concepts and plenty of hands-on experience to become certified. This book provides complete coverage of Microsoft Exam 70-291 and features one-of-a-kind integration of text, DVD-quality instructor-led training, and Web-based exam simulation and remediation, this study guide and DVD training system gives students 100% coverage of official Microsoft exam objectives plus realistic test prep. The System package consists of: 1) STUDY GUIDE. 800 pages of coverage explicitly organized in the identical structure of Microsoft's exam objectives. Sections are designed to "standalone", allowing readers to focus on those areas in which they are weakest and skim topics they may have already mastered. 2) DVD: A full hour of instructor-led training, complete with on-screen configurations and networking schematics, demystifying the toughest exam topics. 3) ONLINE PRACTICE EXAMS AND E-BOOK. Most exam candidates indicate that PRACTICE EXAMS are their single most valuable exam prep tool. Buyers of our Study Guides have immediate access to our exam simulations located at WWW.SYNGRESS.COM/SOLUTIONS. Syngress practice exams are highly regarded for rigor or the questions, the extensive explanation of the right AND wrong answers, and the direct hyperlinks from the exams to appropriate sections in the e-book for remediation.Readers will be fully prepared to pass the exam based on our 100% Certified guaranteeReaders may save thousands of dollars required to purchase alternative methods of exam preparationBecause of its breadth of coverage, this book will serve as a post-certification reference for IT professionals

Managing Cisco Network Security

by Syngress

An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today's internetworked world "There's no question that attacks on enterprise networks are increasing in frequency and sophistication..." -Mike Fuhrman, Cisco Systems Manager, Security Consulting Managing Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco's security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions. Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisco including: 500 series of Cisco PIX Firewall, CiscoIntrusion Detection System, and the Cisco Secure ScannerRevised edition of a text popular with CCIP (Cisco Certified Internetwork Professional) studentsExpanded to include separate chapters on each of the security products offered by Cisco Systems

Managing and Securing a Cisco Structured Wireless-Aware Network

by David Wall

Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, Managing and Securing a Cisco Structured Wireless-Aware Network also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE).Emphasis on AUTOMATING and SIMPLIFYING the management of mixed environment (wired and wireless) networksDescribes how to centralized control and configuration of thousands of networking devicesSecurity blueprint to help detect rogue access points and achieve fast, secure roaming for mobile applications

Joe Celko's SQL Programming Style (The Morgan Kaufmann Series in Data Management Systems)

by Joe Celko

Are you an SQL programmer that, like many, came to SQL after learning and writing procedural or object-oriented code? Or have switched jobs to where a different brand of SQL is being used, or maybe even been told to learn SQL yourself? If even one answer is yes, then you need this book. A "Manual of Style" for the SQL programmer, this book is a collection of heuristics and rules, tips, and tricks that will help you improve SQL programming style and proficiency, and for formatting and writing portable, readable, maintainable SQL code. Based on many years of experience consulting in SQL shops, and gathering questions and resolving his students’ SQL style issues, Joe Celko can help you become an even better SQL programmer.Help you write Standard SQL without an accent or a dialect that is used in another programming language or a specific flavor of SQL, code that can be maintained and used by other people.Enable you to give your group a coding standard for internal use, to enable programmers to use a consistent style.Give you the mental tools to approach a new problem with SQL as your tool, rather than another programming language — one that someone else might not know!

IT Ethics Handbook: Right and Wrong for IT Professionals

by Stephen Northcutt Cynthia Madden Cynthia Welti

The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter of success or failure for big business.* This groundbreaking book takes on the difficult ethical issues that IT professional confront every day.* The book provides clear guidelines that can be readily translated into policies and procedures.* This is not a text book. Rather, it provides specific guidelines to System Administrators, Security Consultants and Programmers on how to apply ethical standards to day-to-day operations.

IPv6 Network Programming

by Jun-ichiro itojun Hagino

This book contains everything you need to make your application program support IPv6. IPv6 socket APIs (RFC2553) are fully described with real-world examples. It covers security, a great concern these days. To secure the Internet infrastructure, every developer has to take a security stance - to audit every line of code, to use proper API and write correct and secure code as much as possible. To achieve this goal, the examples presented in this book are implemented with a security stance. Also, the book leads you to write secure programs. For instance, the book recommends against the use of some of the IPv6 standard APIs - unfortunately, there are some IPv6 APIs that are inherently insecure, so the book tries to avoid (and discourage) the use of such APIs. Another key issue is portability. The examples in the book should be applicable to any of UNIX based operating systems, MacOS X, and Windows XP.* Covers the new protocol just adopted by the Dept of Defense for future systems* Deals with security concerns, including spam and email, by presenting the best programming standards * Fully describes IPv6 socket APIs (RFC2553) using real-world examples * Allows for portability to UNIX-based operating systems, MacOS X, and Windows XP

Investigating Child Exploitation and Pornography: The Internet, Law and Forensic Science

by Eoghan Casey Monique Ferraro

Investigating Child Exploitation and Pornography provides the historical, legal, technical, and social background for the laws prohibiting child exploitation, in particular, child pornography. It offers a history of child exploitation cases and studies, outlining the roles of technology in this type of crime and the evidence they can contain, and documenting new research performed by the authors. It details how successful undercover Internet operations are conducted, how the associated evidence is collected, and how to use the evidence to locate and apprehend the offender. The heart of this work is a legal section, detailing all of the legal issues that arise in Internet child exploitation cases. A forensic examination section presents evidentiary issues from a technical perspective and describes how to conduct a forensic examination of digital evidence gathered in the investigative and probative stages of a child exploitation case. The book will become an indispensable resource for those involved in the investigation, prosecution, and study of computer-assisted child sexual exploitation.The first comprehensive title in this subject areaUses real cases and examples of criminal behavior and the means to detect itProvides guidelines for developing a Field Manual and a Checklist to supplement the investigation and legal processEstablishes a reliable system and legal, procedural-backed protocol by which to conduct an online sexual investigation and collect evidence

Integrating Wireless Technology in the Enterprise: PDAs, Blackberries, and Mobile Devices

by William Wheeler

Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld and single desktop to small workgroup to large enterprise environments. The number of devices is not a determinant of success or failure. It's more often the planning and managing of them that's crucial. This book also provides tools to deal with the increase of devices, and the corresponding complexity of managing those resources and the increase in cost to the firm.*Synchronize networked data with the mobile device fleet*Synchronize a mobile device with networked data that is mission critical*Connect any device to any data source, over any network

Inside the SPAM Cartel: By Spammer-X

by Spammer-X Spammer-X

Authored by a former spammer, Inside the SPAM Cartel is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW." For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. Inside the SPAM Cartel offer readers a never-before seen view inside this dark sub-economy. You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running. You may disagree with their objectives, but you can't help but to marvel at their ingenuity and resourcefulness in defeating spam filters, avoiding being identified, and staying one step ahead of the law.Spam makes up now 64% of all email sent and it is said to be the most annoying part of being online.You'll meet the characters that control the flow of money as well as the hackers and programmers committed to keeping the enterprise up and running.Authored by a former spammer, this is a methodical, technically explicit expose of the innerworkings of the SPAM economy.

Information Visualization: Perception for Design (Interactive Technologies)

by Colin Ware

Information Visualization is the major revision of a classic work on information visualization. This book explores the art and science of why we see objects the way we do. Based on the science of perception and vision, the author presents the key principles at work for a wide range of applications - resulting in visualization of improved clarity, utility, and persuasiveness. This is the first work to use the science of perception to help serious designers and analysts optimize understanding and perception of their data visualizations. This unique and essential guide to human visual perception and related cognitive principles will enrich courses on information visualization and empower designers to see their way forward. Its updated review of empirical research and interface design examples will do much to accelerate innovation and adoption of information visualization. New to this edition are a new chapter on visual thinking, new sections on face perception and flow visualization, and a much-expanded chapter on color and color sequences. This book will appeal to interaction designers; graphic designers of all kinds (including web designers); financial analysts; research scientists and engineers; data miners; and managers faced with information-intensive challenges.*First work to use the science of perception to help serious designers and analysts optimize understanding and perception of their data visualizations.* Major revision of this classic work, with a new chapter on visual thinking, new sections on face perception and flow visualization, and a much expanded chapter on color and color sequences. *New to this edition is the full color treatment throughout, to better display over 400 illustrations.

How to Cheat at Managing Windows Small Business Server 2003: In the Land of the Blind, the One-Eyed Man is King (How to Cheat)

by Susan Snedaker

How to Cheat at Managing Windows Small Business Server 2003 deals only with the vital, and will be a huge relief to the hundreds of thousands of managers who probably never imagined they would be managing the operating system equivalent of the Space Shuttle.The "80/20" Rule applied to managing a Windows Small Business Server 2003 network. Concise coverage, with ready-to-use solutions, of the most commonly encountered W2K3 Server tasks and problems.Written for the non-MCSE, with little technical training, who is responsible for running a small to medium sized network.Microsoft has announced it will no longer support Windows NT 4 products, effective Dec. 31, 2004. Millions of small businesses that did not upgrade to Windows Server 2000 will choose to upgrade directly to Windows Server 2003, and this will be a timely book.

Higher-Order Perl: Transforming Programs with Programs

by Mark Jason Dominus

Most Perl programmers were originally trained as C and Unix programmers, so the Perl programs that they write bear a strong resemblance to C programs. However, Perl incorporates many features that have their roots in other languages such as Lisp. These advanced features are not well understood and are rarely used by most Perl programmers, but they are very powerful. They can automate tasks in everyday programming that are difficult to solve in any other way. One of the most powerful of these techniques is writing functions that manufacture or modify other functions. For example, instead of writing ten similar functions, a programmer can write a general pattern or framework that can then create the functions as needed according to the pattern. For several years Mark Jason Dominus has worked to apply functional programming techniques to Perl. Now Mark brings these flexible programming methods that he has successfully taught in numerous tutorials and training sessions to a wider audience.* Introduces powerful programming methods-new to most Perl programmers-that were previously the domain of computer scientists* Gradually builds up confidence by describing techniques of progressive sophistication* Shows how to improve everyday programs and includes numerous engaging code examples to illustrate the methods

High Dynamic Range Imaging: Acquisition, Display, and Image-Based Lighting (The Morgan Kaufmann Series in Computer Graphics)

by Erik Reinhard Greg Ward Sumanta Pattanaik Paul Debevec

High dynamic range imaging produces images with a much greater range of light and color than conventional imaging. The effect is stunning, as great as the difference between black-and-white and color television. High Dynamic Range Imaging is the first book to describe this exciting new field that is transforming the media and entertainment industries. Written by the foremost researchers in HDRI, it will explain and define this new technology for anyone who works with images, whether it is for computer graphics, film, video, photography, or lighting design.* Written by the leading researchers in HDRI* Covers all the areas of high dynamic range imaging including capture devices, display devices, file formats, dynamic range reduction, and image-based lighting* Includes a DVD with over 4 GB of HDR images as well as source code and binaries for numerous tone reproduction operators for Windows, Linux, and Mac OS X

Hardware Hacking: Have Fun while Voiding your Warranty

by Joe Grand Kevin D. Mitnick Ryan Russell

"If I had this book 10 years ago, the FBI would never have found me!" -- Kevin Mitnick This book has something for everyone---from the beginner hobbyist with no electronics or coding experience to the self-proclaimed "gadget geek." Take an ordinary piece of equipment and turn it into a personal work of art. Build upon an existing idea to create something better. Have fun while voiding your warranty! Some of the hardware hacks in this book include: * Don't toss your iPod away when the battery dies! Don't pay Apple the $99 to replace it! Install a new iPod battery yourself without Apple's "help"* An Apple a day! Modify a standard Apple USB Mouse into a glowing UFO Mouse or build a FireWire terabyte hard drive and custom case* Have you played Atari today? Create an arcade-style Atari 5200 paddle controller for your favorite retro videogames or transform the Atari 2600 joystick into one that can be used by left-handed players* Modern game systems, too! Hack your PlayStation 2 to boot code from the memory card or modify your PlayStation 2 for homebrew game development* Videophiles unite! Design, build, and configure your own Windows- or Linux-based Home Theater PC* Ride the airwaves! Modify a wireless PCMCIA NIC to include an external antenna connector or load Linux onto your Access Point* Stick it to The Man! Remove the proprietary barcode encoding from your CueCat and turn it into a regular barcode reader* Hack your Palm! Upgrade the available RAM on your Palm m505 from 8MB to 16MB· Includes hacks of today's most popular gaming systems like Xbox and PS/2.· Teaches readers to unlock the full entertainment potential of their desktop PC.· Frees iMac owners to enhance the features they love and get rid of the ones they hate.

Hackproofing Your Wireless Network

by Syngress

The only way to stop a hacker is to think like one! Wireless technology is a new and rapidly growing field of concentration for network engineers and administrators. Innovative technology is now making the communication between computers a cordless affair. Wireless devices and networks are vulnerable to additional security risks because of their presence in the mobile environment. Hack Proofing Your Wireless Network is the only book written specifically for architects, engineers, and administrators responsible for securing their wireless networks. From making sense of the various acronyms (WAP, WEP, SSL, PKE, PKI, SSL, SSH, IPSEC) to the implementation of security policies, plans, and recovery protocols, this book will help users secure their wireless network before its security is compromised. The only way to stop a hacker is to think like one...this book details the multiple ways a hacker can attack a wireless network - and then provides users with the knowledge they need to prevent said attacks.Uses forensic-based analysis to give the reader an insight into the mind of a hackerWith the growth of wireless networks architects, engineers and administrators will need this bookUp to the minute Web based support at www.solutions@syngress.com

Hacking the Code: Auditor's Guide to Writing Secure Code for the Web

by Mark Burnett

Hacking the Code has over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, Hacking the Code dives right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations is included in both the Local and Remote Code sections of the book. The book is accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD also contains a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library includes multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.Learn to quickly create security tools that ease the burden of software testing and network administrationFind out about key security issues regarding vulnerabilities, exploits, programming flaws, and secure code developmentDiscover the differences in numerous types of web-based attacks so that developers can create proper quality assurance testing procedures and toolsLearn to automate quality assurance, management, and development tasks and procedures for testing systems and applicationsLearn to write complex Snort rules based solely upon traffic generated by network tools and exploits

Hack Proofing Your Network

by Syngress

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network.Updated coverage of an international bestseller and series flagshipCovers more methods of attack and hacker secretsInterest in topic continues to grow - network architects, engineers and administrators continue to scramble for security booksWritten by the former security manager for Sybase and an expert witness in the Kevin Mitnick trialsA great addition to the bestselling "Hack Proofing..." seriesWindows 2000 sales have surpassed those of Windows NTCritical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to graspUnrivalled web support at www.solutions@syngress.com

Hack Proofing XML

by Syngress

The only way to stop a hacker is to think like one!The World Wide Web Consortium's Extensible Markup Language (XML) is quickly becoming the new standard for data formatting and Internet development. XML is expected to be as important to the future of the Web as HTML has been to the foundation of the Web, and has proven itself to be the most common tool for all data manipulation and data transmission. Hack Proofing XML provides readers with hands-on instruction for how to secure the Web transmission and access of their XML data. This book will also introduce database administrators, web developers and web masters to ways they can use XML to secure other applications and processes.The first book to incorporate standards from both the Security Services Markup Language (S2ML) and the Organization for the Advancement of Structured Information Standards (OASIS) in one comprehensive bookCovers the four primary security objectives: Confidentiality, Integrity, Authentication and Non-repudiationNot only shows readers how to secure their XML data, but describes how to provide enhanced security for a broader range of applications and processes

Hack Proofing Windows 2000 Server

by Syngress

The complete, authoritative guide to protecting your Windows 2000 Network"Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.A great addition to the bestselling "Hack Proofing..." seriesWindows 2000 sales have surpassed those of Windows NTCritical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to graspUnrivalled web support at www.solutions@syngress.com

Hack Proofing Your Web Applications: The Only Way to Stop a Hacker Is to Think Like One

by Syngress

From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programsUnique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs

Hack Proofing Sun Solaris 8

by Syngress

The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.The fifth title in the popular series that brought us the bestseller Hack Proofing Your NetworkTeaches strategy and techniques using forensic-based analysisUp to the minute Web-based support with solutions@syngress.com

Hack Proofing Linux: A Guide to Open Source Security

by James Stanger Patrick T. Lane

From the authors of the bestselling E-Mail Virus Protection Handbook! The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real needUses forensics-based analysis to give the reader an insight to the mind of a hacker

Hack Proofing Your E-commerce Web Site: The Only Way to Stop a Hacker is to Think Like One

by Syngress

From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks

Refine Search

Showing 82,351 through 82,375 of 82,742 results