This practical guide to managing network security covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive resource for monitoring illegal entry attempts, ...
Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from...
This book constitutes the refereed proceedings of the First International Conference on Distributed Computing and Internet Technology, ICDCIT 2004, held in Bhubaneswar, India in December 2004.
The 47 revised papers presented together with 3 invited papers and 5 abstracts of invited or workshop papers were carefully reviewed and selected from...
This practical, hands-on guide captures, categorizes, and builds a process of best practices to avoid creating defects during the development process—rather than fixing them after extensive analysis. While there are various proprietary and competing standards for reducing software defects, these methods suffer from issues surrounding...
Topics in Dynamics of Bridges, Volume 3: Proceedings of the 31st IMAC, A Conference and Exposition on Structural Dynamics, 2013, the third volume of seven from the Conference, brings together contributions to this important area of research and engineering. The collection presents early findings and case studies on...
In the past, many tumor marker laboratory tests have not been sensitive enough for the very early detection of cancer. However, many of them have nonetheless proved useful in monitoring therapy, following the course of the tumor, and predicting prog nosis. Today, cancer may be viewed as a genetic disease with various specific chromo...
An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies
DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This...
If you're responsible for protecting Windows systems, firewalls and anti-virus aren't enough. You also need to master incident response, recovery, and auditing. Leading Windows security expert and instructor Harlan Carvey offers a start-to-finish guide to the subject: everything administrators must know to recognize ...
This comprehensive text reveals how you can evaluate the security needs of your network, develop a security policy for your company, and create a budget based upon that policy.
Today's network administrators are fully aware of the importance of security; unfortunately, they have neither the time nor the resources to be full-time InfoSec...