This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...
Nearly every business depends on its network to provide information services to carry out essential activities, and network intrusion attacks have been growing increasingly frequent and severe. When network intrusions do occur, it's imperative that a thorough and systematic analysis and investigation of the attack is conducted to...
As you move through this book you may notice that this book doesn’t gently flow from one topic to another like a lot of technical books.This is intentional asmany of the subjects covered in this book are going to be related, but separate fields of study. As you move through the various chapters in this book you’ll be able to...
I am a vampire, and that is the truth. But the modern meaning of the word vampire, the stories that have been told about creatures such as I, are not precisely true. I do not turn to ash in the sun, nor do I cringe when I see a crucifix. I wear a tiny gold cross now around my neck, but only because I like it. I cannot command a pack of wolves...
This volume contains the proceedings of the 8th International PhD Student Workshop on Service Life and Durability of Reinforced Concrete Structures that was held in Marne-la-Vallée, France, on September the 26th and 27th 2016.
Topics discussed in the book are related to durability performance of reinforced...
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
A physical and philosophical mediation on why we are drawn to fight each other for sport, what happens to our bodies and brains when we do, and what it all means
Anyone with guts or madness in him can get hit by someone who knows how; it takes a different kind of madness, a more persistent...
E-mail is now an established and increasingly essential channel of business and personal communication. As such, safeguarding its operation and integrity is an issue of widespread significance. At the same time, e-mail has proven itself to represent a considerable threat vector, providing a route for a variety of attacks including malware,...
The only end-to-end guide to securing Apache Web servers and Web applications
Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...