Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Security Log Management: Identifying Patterns in the Chaos
Security Log Management: Identifying Patterns in the Chaos
Logs, logs, logs. Ever since I started taking my first steps in the world of security,
it has been clear that “the log” plays a crucial—and sometimes undervalued—
role in the security management of any IT infrastructure.This fact
alone explains the plethora of tools, applications, and solutions whose only
...
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
BigNum Math: Implementing Cryptographic Multiple Precision Arithmetic
The origins of this book are part of an interesting period of my life. A period that
saw me move from a shy and disorganized young adult, into a software developer
who has toured various parts of the world, and met countless new friends and
colleagues. It all began in December of 2001, nearly five years ago. I started a
project
...
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
Zero Day Exploit: Countdown to Darkness (Cyber-Fiction S.)
There exists a 0-day vulnerability in a particular line of SCADA Master products that are widely used in petrochemical facilities. Furthermore, since the telemetry between the Master and the RTUs (the units located at valves, gauges, etc.) is particularly fragile under attack, the attackers are able to take a two-tiered approach to the damage they...
Dictionary of Information Security
Dictionary of Information Security

IT professionals and IT students will find this a handy reference to help them identify terms used in practice, in journals and articles, and on websites. The dictionary has complete coverage of security terms and includes cutting-edge technologies and newer terminology only now becoming accepted use amongst security practitioners. Certification...

Managing Cisco Network Security
Managing Cisco Network Security
Providing good internetwork security and remaining current on new
hardware and software products is a never-ending task. Every network
security manager aims to achieve the best possible security because
the risks are real and the stakes are high. An enterprise must decide
what level of security is required, taking into account
...
CYA: Securing Exchange Server 2003 & Outlook Web Access
CYA: Securing Exchange Server 2003 & Outlook Web Access
Coverage includes: Exchange 2000 Administrative Rights, Mailbox Rights, Denial of Service and Exchange, Types of File Vulnerabilities, Vulnerability of Transmitted Data, Message Authenticity, Event Service and Event Sinks, Message Relay via SMTP, Preventing Exchange Security Problems, The W2K/IIS Platform Must Be Solid, Dedicate Servers to Specific...
Syngress IT Security Project Management Handbook
Syngress IT Security Project Management Handbook
Let’s start by stating two assumptions we’re making in this book. First, we’re assuming you have a solid understanding of IT project management. If not, we have provided you with a free download of the book How to Cheat at IT Project Management (visit www.syngress.com/solutions to register this book and download the PDF) so you...
Security Sage's Guide to Hardening the Network Infrastructure
Security Sage's Guide to Hardening the Network Infrastructure
With the proliferation of wireless access points (WAPs), virtual private networks
(VPNs), and extranets, it’s becoming increasingly difficult to determine where
your network begins and ends. Add this complexity to common economic factors,
such as company mergers and acquisitions, and now you have a tangled web
of
...
How to Cheat at Managing Information Security
How to Cheat at Managing Information Security
Information security is different from many other disciplines both within mainstream
information technology and other business areas. Even though there are
now many good books on various areas, getting the breadth of knowledge
across the many subareas is still difficult, but it is essential to success.

Unlike so many
...
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Active Directory Infrastructure: How to Cheat at Designing a Windows Server 2003
Before the design of any system implementation may commence, first one must assess the
environment into which that system is to be deployed.This argument holds true especially for
Active Directory (AD). Active Directory has the potential to affect every facet of your IT
infrastructure and every team involved with IT, even in the
...
Cyber Adversary Characterization: Auditing the Hacker Mind
Cyber Adversary Characterization: Auditing the Hacker Mind
A book about hacking is a book about everything.
First, the meaning of hacker.

The word “hacker” emerged in an engineering context and became popular
at The Massachusetts Institute of Technology (MIT), among other places, as a
way to talk about any ingenious, creative, or unconventional use of a machine...
Developing Web Services with Java APIs for XML (JAX Pack) with CDROM
Developing Web Services with Java APIs for XML (JAX Pack) with CDROM
It should come as no surprise to someone reading this foreword that two of the most
influential forces in information systems over the last few years have been Java and
XML. Java provides a stable, industrial-strength language that runs on a variety of
platforms, while XML offers a simple format for the exchange of information
...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy