Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Online Resource  (17)
  • Safari Tech Books Online  (17)
  • Boston : Addison-Wesley  (17)
  • Computer security  (11)
  • Internet programming  (6)
Datasource
Material
  • Online Resource  (17)
Language
Years
  • 1
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 747 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: In this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security challenges of IT environments. Bishop explains the fundamentals of security: the different types of widely used policies, the mechanisms that implement these policies, the principles underlying both policies and mechanisms, and how attackers can subvert these tools--as well as how to defend against attackers. A practicum demonstrates how to apply these ideas and mechanisms to a realistic company. Coverage includes Confidentiality, integrity, and availability Operational issues, cost-benefit and risk analyses, legal and human factors Planning and implementing effective access control Defining security, confidentiality, and integrity policies Using cryptography and public-key systems, and recognizing their limits Understanding and using authentication: from passwords to biometrics Security design principles: least-privilege, fail-safe defaults, open design, economy of mechanism, and more Controlling information flow through systems and networks Assuring security throughout the system lifecycle Malicious logic: Trojan horses, viruses, boot sector and executable infectors, rabbits, bacteria, logic bombs--and defenses against them Vulnerability analysis, penetration studies, auditing, and intrusion detection and prevention Applying security principles to networks, systems, users, and programs Introduction to Computer Security is adapted from Bishop's comprehensive and widely praised book, Computer Security: Art and Science. This shorter version of the original work omits much mathematical formalism, making it more accessible for professionals and students who have a less formal mathematical background, or for readers with a more practical than theoretical interest.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 006.7/6
    Keywords: Application software ; Development ; Internet programming ; Web site development ; XML (Document markup language) ; Electronic books ; local
    Abstract: Praise for XForms: XML Powered Web Forms "XForms is an exciting new technology for designing Web forms in an elegant and accessible way. Raman's book provides strong motivations for flexibility in the design of human-machine interactions, and explains how to use XForms to this end in crystal-clear prose." - Eve Maler XML Standards Architect, Sun Microsystems "Interactive forms technology is the logical evolution of Web user interface design. XForms represents a significant leap forward in that evolution." - Sean McGrath CTO, Propylon "The greatest strength of this book is the skill with which T. V. Raman links the XForms technology with the larger context of the Web. The limitations of HTML forms, the ways in which XForms provides a better foundation for Web and Web service user interfaces, and the opportunities for an XForms-powered Web that is accessible to all users and devices are outlined and brought together in a compelling way." - Michael Champion Advisory Research and Development Specialist, Software AG "Raman's book gives the reader an excellent explanation of the emerging W3C XForms recommendation. It's a well-organized and well-written book that begins with a gentle introduction to the concepts that motivated the development of XForms and then provides a reasonable overview of the relevant XML technology related to XForms. Most of the book covers XForms components: user interface controls, model properties, functions, actions, and events. It concludes with XForms as a Web service, offering multi-modal access and accessibility. In light of the October 2003 deadline for U.S. federal agencies to comply with the mandate of the Government Paperwork Elimination Act (GPEA) to give citizens the opportunity to provide information online, this important technical work comes none too soon. As T. V. masterfully elucidates, XForms provides the 'last mile' in 'connecting users to their data.' Insightfully, he also observes 'the document is the human interface' to data-an understanding without which the challenge to make eGov services 'citizen-centered' simply cannot and will not be met." - Owen Ambur Cofounder and Cochair, XML Working Group, U.S. CIO Council "I found the author's straightforward style quite comfortable and informative. I heartily recommend this book, especially for government XML developers interested in the broader area of E-Forms. Understanding XForms is key to developing robust and flexible E-Forms solutions that separate cont...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: When an intruder, worm, virus, or automated attack succeeds in targeting a computer system, having specific controls and a response plan in place can greatly lessen losses. Accordingly, businesses are realizing that it is unwise to invest resources in preventing computer-related security incidents without equal consideration of how to detect and respond to such attacks and breaches. The Effective Incident Response Team is the first complete guide to forming and managing a Computer Incident Response Team (CIRT). In this book, system and network administrators and managers will find comprehensive information on establishing a CIRT's focus and scope, complete with organizational and workflow strategies for maximizing available technical resources. The text is also a valuable resource for working teams, thanks to its many examples of day-to-day team operations, communications, forms, and legal references. IT administrators and managers must be prepared for attacks on any platform, exploiting any vulnerability, at any time. The Effective Incident Response Team will guide readers through the critical decisions involved in forming a CIRT and serve as a valuable resource as the team evolves to meet the demands of ever-changing vulnerabilities. Inside, readers will find information on: Formulating reactive or preventative operational strategy Forming, training, and marketing the CIRT Selecting penetration-testing, intrusion-detection, network-monitoring, and forensics tools Recognizing and responding to computer incidents and attacks, including unauthorized access, denial-of-service attacks, port scans, and viruses Tracking, storing, and counting incident reports and assessing the cost of an incident Working with law enforcement and the legal community Benefiting from shared resources Scrutinizing closed incidents to further prevention Offering services such as user-awareness training, vulnerability and risk assessments, penetration testing, and architectural reviews Communicating the CIRT's return on investment through management reporting 0201761750B10062003
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xv, 392 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Microsoft Windows (Computer file) ; Computer security ; Microsoft .NET ; Electronic books ; local
    Abstract: "As usual, Keith masterfully explains complex security issues in down-to-earth and easy-to-understand language. I bet you'll reach for this book often when building your next software application." --Michael Howard, coauthor, Writing Secure Code "When it comes to teaching Windows security, Keith Brown is 'The Man.' In The .NET Developer's Guide to Windows Security, Keith has written a book that explains the key security concepts of Windows NT, Windows 2000, Windows XP, and Windows Server 2003, and teaches you both how to apply them and how to implement them in C# code. By organizing his material into short, clear snippets, Brown has made a complicated subject highly accessible." --Martin Heller, senior contributing editor at Byte.com and owner of Martin Heller & Co. "Keith Brown has a unique ability to describe complex technical topics, such as security, in a way that can be understood by mere mortals (such as myself). Keith's book is a must read for anyone attempting to keep up with Microsoft's enhancements to its security features and the next major version of .NET." --Peter Partch, principal software engineer, PM Consulting "Keith's book is a collection of practical, concise, and carefully thought out nuggets of security insight. Every .NET developer would be wise to keep a copy of this book close at hand and to consult it first when questions of security arise during application development." --Fritz Onion, author of Essential ASP.NET with Examples in C# The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Windows Server 2003, Windows XP, and Windows 2000. Author Keith Brown crystallizes his application security expertise into 75 short, specific guidelines. Each item is clearly explained, cross-referenced, and illustrated with detailed examples. The items build on one another until they produce a comprehensive picture of what tools are available and how developers should use them. The book highlights new features in Windows Server 2003 and previews features of the upcoming version 2.0 of the .NET Framework. A companion Web site includes the source code and examples used throughout the book. Topics covered include: Kerberos authentication Access control Impersonation Network security Constrained delegation Protocol transition Securing enterprise servi...
    Note: Includes bibliographical references (p. 379-380) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.2/762
    Keywords: Internet programming ; Java (Computer program language) ; Web services ; Electronic books ; local
    Abstract: " J2EE™ Web Services is written in the tradition of great books people have come to expect from author Richard Monson-Haefel. More than a complete and concise Web services reference, this essential guide is the way for J2EE developers to quickly master Web services architecture and development." - Floyd Marinescu Author, EJB Design Patterns Director, TheServerSide.com "Written in a straightforward and approachable style, Monson-Haefel's latest book is a mustread for any Java developer who is serious about understanding and applying the J2EE APIs in support of Web services. By concentrating on the core technologies endorsed by the WS-I, it clearly explains why Web services will succeed in realizing the interoperability promise where previous attempts have failed." - James McCabe Software IT Architect IBM "This is the best-and most complete-description of J2EE Web services that I've seen. If you're a Java developer, you need this book." - David Chappell Chappell & Associates "For Java Web service developers, this book is going to be there on their desk next to their PC for easy reference. The book has it all, clear guides as to what WSDL, SAAJ, UDDI are, and how they are used in a variety of examples. Monson-Haefel has created another classic with this volume." - Dr. Bruce Scharlau Department of Computing Science University of Aberdeen, Scotland "Richard Monson-Haefel provides the most comprehensive analysis of J2EE Web services that I've seen so far to date. This book covers the core Web services technologies (XML, SOAP, WSDL, and UDDI), as well as the Java APIs for Web services (JAX-RPC, SAAJ, JAXR, JAXP, and Web Services for J2EE, version 1.1). Richard also goes into detail on issues such as fault handling, type mapping, and JAX-RPC handlers. Developers will find this book to be a very valuable reference." - Anne Thomas Manes Research Director, Burton Group Author, Web Services: A Manager's Guide " J2EE™ Web Services is an excellent reference and tutorial for both beginning and seasoned Web services architects and developers. This book is the first to fully cover the WS-I 1.0 Web services standards and their integration with J2EE 1.4 components. Spend time with this book, and you'll soon master J2EE Web Services and be able to successfully use this technology to solve key business integration problems in your enterprise." - Tom Marrs Senior J2EE/XML/Web Services Architect Distributed Computing Solutions, Inc. Web services are revolutionizing ...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 581 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Java (Computer program language) ; Electronic books ; local
    Abstract: Enterprise Java™ Security: Building Secure J2EE™ Applications provides application developers and programmers with the know-how they need to utilize the latest Java security technologies in building secure enterprise infrastructures. Written by the leading Java security experts at IBM, this comprehensive guide covers the current status of the Java™ 2 Platform, Enterprise Edition (J2EE), and Java™ 2 Platform, Standard Edition (J2SE™), security architectures and offers practical solutions and usage patterns to address the challenges of Java security. To aid developers who need to build secure J2EE applications, Enterprise Java™ Security covers at length the J2EE security technologies, including the security aspects of servlets, JavaServer Pages(TM) (JSP™), and Enterprise JavaBeans™ (EJB™)-technologies that are at the core of the J2EE architecture. In addition, the book covers Web Services security. Examples and sample code are provided throughout the book to give readers a solid understanding of the underlying technology. The relationship between Java and cryptographic technologies is covered in great detail, including: Java Cryptography Architecture (JCA) Java Cryptography Extension (JCE) Public-Key Cryptography Standards (PKCS) Secure/Multipurpose Internet Mail Extensions (S/MIME) Java Secure Socket Extension (JSSE)
    Note: Includes bibliographical references (p. 563) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 418 p. , ill. ; , 23 cm. +
    DDC: 005.13/3
    Keywords: Application software ; Development ; Internet programming ; Java (Computer program language) ; Web servers ; Web site development ; Java (Langage de programmation) ; Logiciels d'application ; Développement ; Programmation sur Internet ; Serveurs Web ; Sites Web ; Développement ; Electronic books ; local
    Abstract: Written by Sun Microsystems' Java™ BluePrints team, Designing Web Services with the J2EE™ 1.4 Platform is the authoritative guide to the best practices for designing and integrating enterprise-level Web services using the Java 2 Platform, Enterprise Edition (J2EE) 1.4. This book provides the guidelines, patterns, and real-world examples architects and developers need in order to shorten the learning curve and start building robust, scalable, and portable solutions. The authors use the Java Adventure Builder application to bring the design process to life and help illustrate the use of Java APIs for XML Processing (JAXP), Java APIs for XML-Based RPC (JAX-RPC), and other Web service and Java-XML technologies. Key topic coverage includes: Web service requirements and design issues Support for Web services provided by the J2EE 1.4 platform Designing and implementing Web service end points Writing efficient Web service client applications Designing and developing XML-based applications Integrating applications and data using Web services The J2EE platform security model as it applies to Web services A coherent programming model for designing and developing Web service endpoints and clients Designing Web Services with the J2EE™ 1.4 Platform provides the insight, advice, and detail that make it easier to create effective Web service applications using the J2EE 1.4 platform.
    Note: Includes bibliographical references (p. xx-xxii) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 577 p. , ill. ; , 24 cm. +
    DDC: 005.2/76
    Keywords: Microsoft Visual BASIC ; Internet programming ; Microsoft .NET Framework ; XML (Document markup language) ; Electronic books ; local
    Abstract: "You are holding in your hands my favorite book on Web services and .NET. What else can I say? Buy this book now, and be prepared for a new way of coding!" -Keith Ballinger, Program Manager for XML Web Services, Microsoft "If you've been searching for a book that goes beyond the Web services hype, and distills the benefits of the actual platform, look no further, you've found the right one." -Aaron Skonnard, Instructor and Author, DevelopMentor Real World XML Web Services is the Visual Basic programmer's definitive guide to designing and building Web services. It provides developers with a comprehensive understanding of Web services, covering everything from basic concepts and solutions to interoperability problems. This book begins with a concise and practical introduction to Web services and the foundation on which they are built, including Web Services Description Language (WSDL) and Simple Object Access Protocol (SOAP). Readers learn, by example, how to use each tool for developing Web services, starting with the SOAP Toolkit and the .NET framework. Visual Basic programmers discover how to: Use XML Schema to define Web service messages Use SOAP for messaging and Remote Procedure Calls (RPC) Read and modify WSDL documents Build Web services with the SOAP Toolkit Create and invoke Web services using the .NET framework Implement SOAP headers and use SOAP Fault Develop interface-based Web services Handle data in .NET Web services, including objects, arrays, and DataSets Use SOAP extensions to build reusable infrastructure for security and compression Use Universal Description Discovery and Integration (UDDI) at design time and run time Understand the architecture of other popular toolkits, such as Apache SOAP for Java, and learn how to solve interoperability problems The book closes by walking the reader through the creation of a Web service with .NET and Visual Basic 6 clients. Real World XML Web Services empowers Visual Basic programmers to design and build the next generation of applications using Web services. 0201774259B08192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 523 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Computer software ; Development ; Internet programming ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: Programming in the .NET Environment is the software developer's guide to the .NET Framework. The authors describe Microsoft's vision for distributed component-based systems development and then show programmers how to develop software that takes full advantage of the features of the .NET Framework. Readers learn how to author components, libraries, and frameworks that not only exploit the capabilities of the .NET Framework but also integrate seamlessly into that environment. This book begins with an introduction to the goals and architecture of the .NET Framework. Readers will then gain a thorough understanding of the type, metadata, and execution systems; learn how to build and deploy their components within .NET assemblies; and gain an understanding of the facilities of the Framework Class Libraries. Topic coverage includes: The Common Language Runtime (CLR) and the Framework Class Libraries The CLR's Type, Metadata, and Execution Systems Creating and deploying .NET Assemblies Internationalization and localization facilities .NET Languages, including C# and Visual Basic .NET The book concludes with appendixes written by other specialists in the field: Paul Vick (writing about VB .NET), Eric Gunnerson (on C#), Mark Hammond (on Python for .NET), Jan Dubois (on Perl for .NET), John Gough (on Component Pascal for .NET), Pankaj Surana (on Scheme for .NET), Nigel Perry (on Mondrian), and Juerg Gutknecht (on Active Oberon for .NET). Written by a team of experienced authors using a practical, authoritative approach, Programming in the .NET Environment is an indispensable guide to developing components that fulfill the promise of Microsoft's .NET Framework. Books in the Microsoft .NET Development Series are written and reviewed by the principal authorities and pioneering developers of the Microsoft .NET technologies, including the Microsoft .NET development team and DevelopMentor. Books in the Microsoft .NET Development Series focus on the design, architecture, and implementation of the Microsoft .NET initiative to empower developers and students everywhere with the knowledge they need to thrive in the Microsoft .NET revolution. 0201770180B10312002
    Note: Includes bibliographical references (p. 489) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xli, 1084 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer security ; Electronic books ; local
    Abstract: "This is an excellent text that should be read by every computer security professional and student." -Dick Kemmerer, University of California, Santa Barbara. "This is the most complete book on information security theory, technology, and practice that I have encountered anywhere!" -Marvin Schaefer, Former Chief Scientist, National Computer Security Center, NSA This highly anticipated book fully introduces the theory and practice of computer security. It is both a comprehensive text, explaining the most fundamental and pervasive aspects of the field, and a detailed reference filled with valuable information for even the most seasoned practitioner. In this one extraordinary volume the author incorporates concepts from computer systems, networks, human factors, and cryptography. In doing so, he effectively demonstrates that computer security is an art as well as a science. Computer Security: Art and Science includes detailed discussions on: The nature and challenges of computer security The relationship between policy and security The role and application of cryptography The mechanisms used to implement policies Methodologies and technologies for assurance Vulnerability analysis and intrusion detection Computer Security discusses different policy models, and presents mechanisms that can be used to enforce these policies. It concludes with examples that show how to apply the principles discussed in earlier sections, beginning with networks and moving on to systems, users, and programs. This important work is essential for anyone who needs to understand, implement, or maintain a secure network or computer system. 0201440997B10252002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Abstract: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xvii, 793 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer security ; Microsoft .NET Framework ; Electronic books ; local
    Abstract: In 1997, Microsoft embarked on a "bet the company" strategy that was to reinvent the way the company did business. Even before its release, .NET made major strides in reinventing the way that software developers viewed the software they wrote. Now that it is released, .NET and the .NET Framework will change the software development process for good. .NET Framework Security provides the ultimate high-end comprehensive reference to all of the new security features available in .NET. Through extensive code samples and step-by-step walkthroughs of configuration techniques, the reader is taken deep into the world of secure applications. Demonstrations of creating custom procedures and a full explanation of each aspect separate this book from many other "lecture books." Many of the concepts expressed in this book are not only viable in .NET, but on the Internet in general. These factors combined make this the one reference that every developer and system administrator should have. .NET Framework Security provides An extensive introduction to explanation of Code Access Security, the powerful new security system shipping in the .NET Framework Information on how to write and test safe applications using the .NET Framework Extensive coverage on how to effectively administer .NET Framework security In-depth introduction to the cryptography library shipping in the .NET Framework, including an introduction to XML digital signatures An overview of all of the new security features available in .NET Code samples that can be used to implement security on your own Web site or application Step-by-step guidelines for modifying the various configuration files associated with .NET, and an explanation of the elements involved Instructions for all of the aspects of security in the CLR and what it means How to use ASP.NET to create a secure application Explanations for using the CryptoAPI libraries to create your own custom functionality Guidelines on how to create secure network applications as well as applications that exist on the Internet Detailed examples of how to establish security parameters in IIS that relate to ASP.NET Instructions for administering .NET applications hosted in IE 067232184XB04232002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Language: English
    Pages: xxiv, 512 p. , ill. ; , 24 cm. + 1 CD-ROM (4 3/4 in.)
    DDC: 005.8
    Keywords: Computer security ; Computers ; Access control ; Testing ; Electronic books ; local
    Abstract: "This book covers not just the glamorous aspects such as the intrusion act itself, but all of the pitfalls, contracts, clauses, and other gotchas that can occur. The authors have taken their years of trial and error, as well as experience, and documented a previously unknown black art." --From the Foreword by Simple Nomad, Senior Security Analyst, BindView RAZOR Team Penetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from compromising systems and exploiting proprietary information. Hack I.T. introduces penetration testing and its vital role in an overall network security plan. You will learn about the roles and responsibilities of a penetration testing professional, the motivation and strategies of the underground hacking community, and potential system vulnerabilities, along with corresponding avenues of attack. Most importantly, the book provides a framework for performing penetration testing and offers step-by-step descriptions of each stage in the process. The latest information on the necessary hardware for performing penetration testing, as well as an extensive reference on the available security tools, is included. Comprehensive in scope Hack I.T. provides in one convenient resource the background, strategies, techniques, and tools you need to test and protect your system--before the real hackers attack. Specific topics covered in this book include: Hacking myths Potential drawbacks of penetration testing Announced versus unannounced testing Application-level holes and defenses Penetration through the Internet, including zone transfer, sniffing, and port scanning War dialing Enumerating NT systems to expose security holes Social engineering methods Unix-specific vulnerabilities, such as RPC and buffer overflow attacks The Windows NT Resource kit Port scanners and discovery tools Sniffers and password crackers Web testing tools Remote control tools Firewalls and intrusion detection systems Numerous DoS attacks and tools 0201719568B01042002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 452 p. ill. ; , 24 cm. +
    DDC: 005.8
    Keywords: Computer hackers ; Computer security ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: "The text is comprehensive, an honest survey of every honeypot technology I had ever heard of and a number I read about for the first time." --Stephen Northcutt, The SANS Institute "One of the great byproducts of Lance's work with honeypots and honeynets is that he's helped give us a much clearer picture of the hacker in action." --From the Foreword by Marcus J. Ranum "From the basics of shrink-wrapped honeypots that catch script kiddies to the detailed architectures of next-generation honeynets for trapping more sophisticated bad guys, this book covers it all....This book really delivers new information and insight about one of the most compelling information security technologies today." --Ed Skoudis, author of Counter Hack, SANS instructor, and Vice President of Security Strategy for Predictive Systems Honeypots are unique technological systems specifically designed to be probed, attacked, or compromised by an online attacker. Implementing a honeypot provides you with an unprecedented ability to take the offensive against hackers. Whether used as simple "burglar alarms," incident response systems, or tools for gathering information about hacker motives and tactics, honeypots can add serious firepower to your security arsenal. Honeypots: Tracking Hackers is the ultimate guide to this rapidly growing, cutting-edge technology. The book starts with a basic examination of honeypots and the different roles they can play, and then moves on to in-depth explorations of six specific kinds of real-world honeypots: BackOfficer Friendly, Specter™, Honeyd, Homemade honeypots, ManTrap®, and Honeynets. Honeypots also includes a chapter dedicated to legal issues surrounding honeypot use. Written with the guidance of three legal experts, this section explores issues of privacy, entrapment, and liability. The book also provides an overview of the Fourth Amendment, the Electronic Communications Privacy Act, the Wiretap Act, and the Pen/Trap Statute, with an emphasis on how each applies to honeypots. With this book you will gain an understanding of honeypot concepts and architecture, as well as the skills to deploy the best honeypot solutions for your environment. You will arm yourself with the expertise needed to track attackers and learn about them on your own. Security professionals, researchers, law enforcement agents, and members of the intelligence and military communities will find this book indispensable. 0321108957B08282002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 754 p. , ill. ; , 24 cm
    DDC: 005.2/762
    Keywords: Internet programming ; Perl (Computer program language) ; Electronic books ; local
    Abstract: "This is a superb book. Another splendid book from Lincoln, whose mastery and lucid exposition make this a must-have for the serious Perl programmer." --Jon Orwant, Chief Technology Officer, O'Reilly & Associates Founder of The Perl Journal, author of Mastering Algorithms with Perl, (O'Reilly & Associates) and co-author of Programming Perl, Third Edition (O'Reilly & Associates) Network Programming with Perl is a comprehensive, example-rich guide to creating network-based applications using the Perl programming language. Among its many capabilities, modern Perl provides a straightforward and powerful interface to TCP/IP, and this book shows you how to leverage these capabilities to create robust, maintainable, and efficient custom client/server applications. The book quickly moves beyond the basics to focus on high-level, application programming concepts, tools, and techniques. Readers will find a review of basic networking concepts and Perl fundamentals, including Perl's I/O functions, process model, and object-oriented extensions. In addition, the book examines a collection of the best third-party modules in the Comprehensive Perl Archive Network, including existing network protocols for e-mail, news, and the Web. The core of the book focuses on methods and alternatives for designing TCP-based client/server systems and more advanced techniques for specialized applications. Specific topics covered include: The Berkeley Sockets API The TCP protocol and the IO::Socket API FTP filesharing service The Net::Telnet module for adapting clients to interactive network services SMTP, including how to create and send e-mails with multimedia attachments POP, IMAP, and NNTP for receiving and processing e-mail HTTP and the LWP module for communicating with Web servers Forking servers and the UNIX and Windows inetd daemons Perl's experimental multithreaded API Multiplexed operations and nonblocking I/O Bulletproofing servers TCP urgent data UDP protocol and servers Broadcasting and multicasting Interprocess communication with UNIX-domain sockets Useful, working programs demonstrate ideas and techniques in action, including a real-time chat and messaging system, a program for processing e-mail containing MIME attachments, a program for mirroring an FTP site, and a Web robot. Network Programming with Perl focuses on TCP/IP rather than just the common Web protocols. Modeled after the critically acclaimed TCP/IP Illustrated by W. Richard Stevens, this book achie...
    Note: Includes bibliographical references (p. 721-726) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...