|
|
|
|
Security Log Management: Identifying Patterns in the ChaosLogs, logs, logs. Ever since I started taking my first steps in the world of security, it has been clear that “the log” plays a crucial—and sometimes undervalued— role in the security management of any IT infrastructure.This fact alone explains the plethora of tools, applications, and solutions whose only... | | BigNum Math: Implementing Cryptographic Multiple Precision ArithmeticThe origins of this book are part of an interesting period of my life. A period that saw me move from a shy and disorganized young adult, into a software developer who has toured various parts of the world, and met countless new friends and colleagues. It all began in December of 2001, nearly five years ago. I started a project... | | Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they... |
|
Dictionary of Information SecurityIT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification... | | Managing Cisco Network SecurityProviding good internetwork security and remaining current on new hardware and software products is a never-ending task. Every network security manager aims to achieve the best possible security because the risks are real and the stakes are high. An enterprise must decide what level of security is required, taking into account... | | CYA: Securing Exchange Server 2003 & Outlook Web AccessCoverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific... |
|
Syngress IT Security Project Management HandbookLet’s start by stating two assumptions we’re making in this book. First, we’re assuming you have a solid understanding of IT project management. If not, we have provided you with a free download of the book How to Cheat at IT Project Management (visit www.syngress.com/solutions to register this book and download the PDF) so you... | | Security Sage's Guide to Hardening the Network InfrastructureWith the proliferation of wireless access points (WAPs), virtual private networks (VPNs), and extranets, it’s becoming increasingly difficult to determine where your network begins and ends. Add this complexity to common economic factors, such as company mergers and acquisitions, and now you have a tangled web of... | | How to Cheat at Managing Information SecurityInformation security is different from many other disciplines both within mainstream information technology and other business areas. Even though there are now many good books on various areas, getting the breadth of knowledge across the many subareas is still difficult, but it is essential to success.
Unlike so many... |
|
| | Cyber Adversary Characterization: Auditing the Hacker MindA book about hacking is a book about everything. First, the meaning of hacker.
The word “hacker” emerged in an engineering context and became popular at The Massachusetts Institute of Technology (MIT), among other places, as a way to talk about any ingenious, creative, or unconventional use of a machine ... | | Developing Web Services with Java APIs for XML (JAX Pack) with CDROMIt should come as no surprise to someone reading this foreword that two of the most influential forces in information systems over the last few years have been Java and XML. Java provides a stable, industrial-strength language that runs on a variety of platforms, while XML offers a simple format for the exchange of information... |
|
|
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |