This is the definitive real-world guide to Microsoft System Center 2012, Microsoft’s newest and most powerful version of System Center. Authored by consultants who’ve deployed System Center in hundreds of enterprises and innovative smaller businesses, this book brings together up-to-the-minute tips, tricks, and...
The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments....
Microsoft Operations Manager (MOM) 2005 can deliver a huge amount of value to organizations of any size. It automates burdensome and lengthy diagnostic tasks so that you are notified of an event in your environment almost as soon as it happens. Armed with this information, and a set of integrated tools engineered to help you fix...
"The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute
"One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture...
The goal of forensics and crime scene reconstruction is simply to seek the truth. The analyst has no other agenda. In pursuing this end, we revisit what we hope is a not too distant past and attempt to recreate the events that unfolded. This task is anything but simple and the tools employed are all of the forensic disciplines.
Since 2001, the CERT® Insider Threat Center at Carnegie Mellon University’s Software Engineering Institute (SEI) has collected and analyzed information about more than seven hundred insider cyber crimes, ranging from national security espionage to theft of trade secrets. The CERT® Guide to Insider...
Become a cyber-hero — know the common wireless weaknesses
"Reading a book like this one is a worthy endeavor toward becoming an experienced wireless security professional." —Devin Akin - CTO, The Certified Wireless Network Professional (CWNP) Program
Now fully updated for Windows XP Service Pack 2, this all-in-one training kit provides in-depth preparation, practice, and review for one of two required exams for the Microsoft Desktop Support Technician Certification (MCDST). Covering Exam 70-271, this kit packs the tools and features exam candidates want most—including in-depth, self-paced...
Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...
This unique and critical book shares no-fail secrets for building software and offers tried-and-true practices and principles for software design, development, and testing for mission-critical systems that must not fail. A veteran software architect walks you through the lifecycle of a project as well as each area of production...