Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Safari Tech Books Online  (125)
  • Safari, an O’Reilly Media Company
  • Linux  (79)
  • Computer networks ; Security measures  (52)
Datasource
Material
Language
  • 1
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780137341658 , 0137341652 , 9780135938058
    Language: English
    Pages: 1 online resource (714 pages)
    Edition: 1st edition
    DDC: 005.432076
    Keywords: Red Hat, Inc ; Linux Study guides Examinations ; Operating systems (Computers) Study guides Examinations ; Electronic data processing personnel Certification ; Systems engineering Study guides Examinations ; Electronic books ; local ; Red Hat, Inc ; Linux ; Systèmes d'exploitation (Ordinateurs) ; Examens ; Guides de l'étudiant ; Ingénierie des systèmes ; Examens ; Guides de l'étudiant ; Electronic data processing personnel ; Certification ; Examinations ; Operating systems (Computers) ; Examinations ; Systems engineering ; Examinations ; Study guides ; Study guides
    Abstract: Learn, prepare, and practice for Red Hat RHCSA 8 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning. Master Red Hat RHCSA 8 EX200 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam-preparation tasks Practice with four unique practice tests Learn from two full hours of video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Red Hat RHCSA 8 Cert Guide is a best-of-breed exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website also contains two additional practice tests plus two full hours of personal video training from the author’s Red Hat Certified System Administrator (RHCSA) Complete Video Course , 3rd Edition. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, including Basic system management: Installation, tools, file management, text files, RHEL8 connections, user/group management, permissions, and network configuration Operating running systems: Managing software, processes, storage, and advanced storage; working with systemd; scheduling tasks; and configuring logging Advanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scripting Managing network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; and accessing network storage Companion Website The website contains two free, complete practice exams and two full hours of video training from the author’s Red Hat Certified System Ad...
    Note: Online resource; Title from title page (viewed December 13, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (1 video file, approximately 20 hr., 42 min.)
    Edition: 1st edition
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Electronic videos ; local ; Linux ; Electronic data processing personnel ; Certification ; Examinations ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: Sneak Peek The Sneak Peek program provides early access to Pearson video products and is exclusively available to Safari subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing. 20+ Hours of Video Instruction Description CompTIA Linux+ has more than 20 hours of comprehensive video training so you have everything you need to prepare for the CompTIA Linux+ exam and also build a strong understanding of working with Linux. This title includes a copy of Linux Fundamentals LiveLessons. Overview CompTIA Linux+ Complete Video Course has more than 20 hours of comprehensive video training covering all of the objectives on the CompTIA Linux+ exam. Expert author and trainer Sander van Vugt will walk you first through Linux basics with 10 hours of essential concepts in his Linux Fundamentals LiveLessons title. You will then get a deep dive into core Linux topics. This thorough and engaging training provides whiteboard concept teaching, live CLI work, screencast teaching, and hands-on labs, so you have everything you need to study for - and pass - the CompTIA Linux+ exam. To offer this course in the way that is most efficient for you, the contents have been developed to build upon your existing knowledge of Linux. You will start with Linux Fundamentals LiveLessons, a full video course on Linux basics, concepts, practices, and theories so you can get the foundational knowledge you need. You will then dive into the core part of the CompTIA Linux+ exam, including advanced user settings, storage management, managing server roles, and both common and advanced system administration tasks. Each lesson ends with a lab so you can practice your own skills as you complete the course. The labs are built so you first have the opportunity to walk through a task on your own. Each lab is then followed by a Lab Solution, where the author walks you through the most efficient way to complete the lab. This accessible self-paced video training solution provides learners with more than 20 hours of personal visual instruction from an expert trainer with more than 20 years of practical Linux teaching experience. Through the use of topic-focused instructional videos you will gain an in-depth understanding of all topics on the CompTIA Linux+ exam, as well as a deeper understanding of Linux. The combination of video and labs is a unique offering...
    Note: Online resource; Title from title screen (viewed July 10, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Pearson IT Certification | Boston, MA : Safari
    ISBN: 9780135591949 , 0135591945
    Language: English
    Pages: 1 online resource (416 pages)
    Edition: 1st edition
    Keywords: Linux Study guides Examinations ; Electronic data processing personnel Study guides Certification ; Electronic books ; local ; Linux ; Electronic data processing personnel ; Certification ; Examinations ; Electronic books ; examination study guides ; Study guides ; Study guides ; Guides de l'étudiant
    Abstract: For each exam objective, the key commands and configuration files will be detailed. The CompTIA Linux+ Portable Command Guide provides a single point of reference while studying for the certification exams as well as a valuable resource after the candidate has successfully passed the exams. The guide summarizes all commands, keywords, command arguments, and associated prompts. Configuration examples are provided throughout the book to give a better understanding of how these commands are used. This guide is not meant to replace any existing learning materials but rather serve as a supplementary guide to assist readers in the proper use of the many different commands to use on a regular basis and that are required to successfully pass the exams.
    Note: Online resource; Title from title page (viewed September 27, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : CRC Press | Boston, MA : Safari
    Language: English
    Pages: 1 online resource (447 pages)
    Edition: 1st edition
    Keywords: Information technology ; Security measures ; Computer security ; Management ; Computer networks ; Security measures ; Data protection ; Electronic books ; local
    Abstract: Financial market reform has focused chiefly on the threats to stability arising from the risky, uncontrolled activity of the leaders of financial institutions. Nevertheless, organized crime, white-collar crime, and corruption have a huge impact on financial systems worldwide and must also be confronted if true reform is to be achieved. A collection of articles written by experts in their fields of study, Financial Crimes: A Threat to Global Security spotlights the importance of addressing the problem of illegal financial activity as part of a greater comprehensive plan for reforming the financial sector. Drawn from the 23rd Annual Meeting of the Academic Council on the United Nations System (ACUNS) held in Vienna, the book explores the major themes discussed at this elite symposium. In the first section, the contributors examine changing concepts in security over the course of history and across nations. They discuss how an event in Austria led to the implementation of a new security philosophy that is now followed by the majority of the European Union. The book examines the diverse models of preventing security threats that have grown from that idea as well as the gradual expansion of the role of the security council of the United Nations. The next section analyzes the present state of security worldwide and examines the wide array of criminal activity that plagues the financial sector. Expert contributors reveal methods to identify certain types of behavior and criminals as well as efforts to combat illegal activity—including the role of the media. The final section investigates alternative approaches to preventing another worldwide financial disaster through investigative reporting, human factors analysis, legislative initiatives, and other methods. Filled with insight from international experts, the book highlights both the warning signs to illegal activity as well as the most effective methods for combating the invidious corruption that, if unchecked, puts all nations at risk. Maximilian Edelbacher will be appearing at three upcoming events: June 28, 2012: Roundtable in the House of the European Union in Vienna on the topic "Financial Crimes: A Threat to European Security?" October 8, 2012: Roundtable in Joannneum, Austria on the topic "Financial Crimes: A Threat to Global Security" October 9, 2012: Book presentation at the Hans Gross Museum in Graz, Austria
    Note: Online resource; Title from title page (viewed April 19, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 246 p. , ill. ; , 23 cm. +
    DDC: 005.438
    Keywords: Linux ; Z.E.N.works ; Graphical user interfaces (Computer systems) ; Electronic books ; local
    Abstract: Novell ZENworks Linux Management Administrator's Handbook is the official guide to ZENworks Linux Management, written by Ron Tanner , Novell ZENworks product manager, and Richard Whitehead , Novell ZENworks product marketing manager. Learn about the innovative combination of SUSE Linux and the advanced management capabilities of ZENworks that has positioned Novell as the leading enterprise Linux solution provider. You will learn about: The ZENworks family The ZENworks Management web console Registering devices into them system and system settings Reporting Common device management tasks Keeping servers synchronized Troubleshooting Gather insight directly from the minds behind ZENworks Linux Management with the Novell ZENworks Linux Management Administrator's Handbook .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiii, 435 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Novell Linux Desktop 9 User's Handbook is the official handbook to help you take control of you Novell Linux Desktop. Walk through the new Novell Linux interfaces as you learn how to use them, interact with the operating system, create files and more. Cover everything that you need to know to effectively and efficiently use the new desktop and quickly get up to speed on the latest technology from Novell with Novell Linux Desktop 9 User's Handbook .
    Note: Accompanied by Supplemental DVD. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: x, 182 p. , ill. ; , 23 cm. +
    DDC: 005.446076
    Keywords: Linux ; Operating systems (Computers) ; Problems, exercises, etc ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: Familiarize yourself with practicum exams to successfully take either the Novell Certified Linux Professional (CLP) or the Novell Certified Linux Engineer (CLE) exam with the Novell Linux Certification Practicum Lab Manual . The first half of the book consists of exercises with scenarios and relevant background information. The second half of the book walks through the exercises and shows the reader how to obtain the needed results, and is broken into four sections: Working with the Desktop (CLP) Intermediate Administration (CLP and CLE) Advanced Administration (CLE) Answers (CLP and CLE) You will be able to walk through the scenarios and assess your preparedness for the exam with the help of the Novell Linux Certification Practicum Lab Manual .
    Note: Accompanied by double-sided DVD-ROM. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xv, 362 p. , ill. ; , 23 cm
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: What better way to learn something than from the inside? Novell Linux Desktop 9 Administrator's Handbook brings you inside the system and inside the only Novell authorized administrator's handbook for the new Novell Linux Desktop (NLD). Learn how NLD interacts with other Novell components and how to integrate security throughout the operating system. You'll also cover: Working with graphical interfaces, devices and file systems How to boot, initialize, shutdown and run levels Linux administration With the help of Novell Linux Desktop 9 Administrator's Handbook , you will master the administration of Novell Linux Desktop 9 systems.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Indianapolis, Ind. : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xviii, 532 p. , ill. ; , 23 cm
    DDC: 005.71376
    Keywords: Linux ; Directory services (Computer network technology) ; Electronic books ; local
    Abstract: As a system administrator, you are justly concerned about the security of your infrastructure. SUSE Linux Enterprise Server (SLES 9) can lead the way to infrastructure security and SUSE Linux Enterprise Server Administrator's Handbook is the authoritative source for information on this secure server. Step-by-step procedures will walk you through installing and securing a SLES 9 system, and it will focus on the specific security features that make SLES 9 an important platform for all system administrators. Some of what you will cover is: SuSE server installation User access and security Installing and configuring networking services Securing your SuSE server Leverage Linux and open source with SLES 9 and SUSE Linux Enterprise Server Administrator's Handbook to build a secure computing network for your company.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Upper Saddle River, NJ. ; : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxii, 480 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Marcel Gagné's Moving to Linux: Kiss the Blue Screen of Death Goodbye! "This is kind of a funny book for me to be recommending to readers of a Windows newsletter, but a lot of people ask me about this topic, so here goes. Author Marcel Gagné is a columnist for Linux Journal , and in Moving to Linux he's prepared a step-by-step guide to converting a Windows PC to Linux-or just trying it! The book includes a bootable CD with a version of Linux that you can poke around in without touching or changing anything about your Windows installation. If your boss is asking, 'What's with this Linux stuff?', moving to Linux is a great way to show that you know what you're talking about." -Brian Livingston, Editor, WindowsSecrets.com "Pros: Too many to list in the available space. We liked the book from the very first page right through to the end. Gagné has done a solid job of exposing Linux and all its components in a way that is both inviting, useful, and easy to understand . . . We really liked this book-highly recommended." -Howard Carson, Kickstart News, www.kickstartnews.com "Marcel walks the user through each technique in a very chatty and comfortable style. In fact, when I put the book down, I had a momentary impression that I'd just finished watching a good cooking show with an entertaining chef. (Australian readers may understand if I say that it felt like having just watched Ian Parmenter do an episode of 'Consuming Passions.')" -Jenn Vesperman, Linuxchix.org "Gagné's Moving to Linux is a straightforward exposition of just how a non-hacker PC user can get rid of 'The Blue Screen of Death'. If you have a friend, a co-worker, a significant other, or a relative who periodically screams, sighs, bursts into tears, or asks for help, here's the simple solution. It comes with a bootable CD of Knoppix, Klaus Knopper's variant of Debian." -Peter H. Salus, writing in ;login: The Usenix Magazine "This is a book aimed not at you, dear developer/techie/guru, but at your friends, acquaintances, and family who are lowly users of Windows. Yes, such people do exist even in the tightest of families. Fear not, however, because salvation is at hand should any of them decide that this Linux thing might be worth investigating. No longer will you be faced with the unenviable task of walking them through the process of switching OS. Moving to Linux: Kiss the Blue Screen of Death Goodbye! is a big, bold, and friendly guide to help them along. The emphasis i...
    Note: Disc in pocket attached to inside back cover. - Includes index. - Previous ed.: Boston, Mass. : Addison-Wesley, 2004
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 270 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential--but often overwhelming--challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as: installation optimization logging alerting rules and signatures detecting viruses countermeasures detecting common attacks administration honeypots log analysis But the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches--and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice--will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus--and still have a life.
    Note: "Solutions and examples for Snort administrators"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 341 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: For years, computer users have put up with the bugs, security holes, and viruses on Windows because they had no choice. Until recently, there has never been a good alternative to Windows. But now, Windows users can switch to Linux, the reliable, secure, and spyware free operating system. Linux is easy to use, runs on almost any PC, and enables you to perform all the tasks you can do with Windows.Getting to know Linux has never been easier, because now there's a way to test-drive Linux without changing, installing, or configuring a thing on your computer. It's called Test Driving Linux: From Windows to Linux in 60 Seconds .This latest release from O'Reilly comes with a Live CD called Move, that allows Windows users to try all the features of Mandrake Linux, a popular Linux distribution without the hassle of actually installing Linux. Users simply place the Move CD into their CD drive, boot from the disc, then watch an entire Mandrake system run on the fly from the CD-ROM. Test Driving Linux: From Windows to Linux in 60 Seconds is a detailed step-by-step guide to the Linux operating system and several popular open source programs. With this guide you can quickly learn how to use Linux to perform the tasks you do most: surf the web, send and receive email, instant message with friends, write letters, create spreadsheets, and even how to enhance your digital photos. Test Driving Linux: From Windows to Linux in 60 Seconds provides both home and business users with a hassle-free way to investigate this operating system before they purchase and install a complete Linux distribution.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 702 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.1
    Keywords: Linux ; Application software ; Development ; Electronic books ; local
    Abstract: "The first edition of this book has always been kept within arm's reach of my desk due to the wonderful explanations of all areas of the Linux userspace API. This second edition greatly overshadows the first one, and will replace it." --Greg Kroah-Hartman, Linux kernel programmer Develop Software that Leverages the Full Power of Today's Linux Linux Application Development, Second Edition, is the definitive reference for Linux programmers at all levels of experience, including C programmers moving from other operating systems. Building on their widely praised first edition, leading Linux programmers Michael Johnson and Erik Troan systematically present the key APIs and techniques you need to create robust, secure, efficient software or to port existing code to Linux. This book has been fully updated for the Linux 2.6 kernel, GNU C library version 2.3, the latest POSIX standards, and the Single Unix Specification, Issue 6. Its deep coverage of Linux-specific extensions and features helps you take advantage of the full power of contemporary Linux. Along the way, the authors share insights, tips, and tricks for developers working with any recent Linux distribution, and virtually any version of Unix. Topics include Developing in Linux: understanding the operating system, licensing, and documentation The development environment: compilers, linker and loader, and unique debugging tools System programming: process models, file handling, signal processing, directory operations, and job control Terminals, sockets, timers, virtual consoles, and the Linux console Development libraries: string matching, terminal handling, command-line parsing, authentication, and more Hundreds of downloadable code samples New to this edition The GNU C library (glibc), underlying standards, and test macros Writing secure Linux programs, system daemons, and utilities Significantly expanded coverage of memory debugging, including Valgrind and mpr Greatly improved coverage of regular expressions IPv6 networking coverage, including new system library interfaces for using IPv6 and IPv4 interchangeably Coverage of strace, ltrace, real-time signals, poll and epoll system calls, popt library improvements, Pluggable Authentication Modules (PAM), qdbm, and much more Improved index and glossary, plus line-numbered code examples
    Note: Includes bibliographical references (p. 679-682) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 454 p. , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: An introduction to the key tools and technologies used to secure network access Examine common security vulnerabilities and the defenses used to protect network resources Learn about cryptography, including modern-day techniques like 3DES, RSA, hashing, and the use of certificates Learn how to design, adopt, and enforce security policies Evaluate the nuances of secure network design Secure HTTP traffic by hardening operating systems, servers, and browsers Protect routers through administrative access policies and services Understand what firewalls do and how to implement them to maximum effect Inspect and monitor network activity with IDS Utilize VPNs for secure remote access Learn about PKI technologies Examine secure wireless design techniques Use logging and auditing tools, such as syslog, SNMP, RMON, and SAA, to manage network traffic Companies have long been struggling with threats from the hacking community. Keeping pace with the rapid evolution of security technology and the growing complexity of threats is a challenge even in the best of times. The increased focus on security has sent IT managers and engineers scrambling to acquire the proper expertise to implement complex, multilayered solutions. Network Security Fundamentals introduces the topic of network security in an easy-to-understand and comprehensive manner. This book is designed to provide a fundamental understanding of the various components of a network security architecture and to demonstrate how each component can be implemented to achieve best results. The book uses straightforward language to introduce topics and to show the features, mechanics, and functionality of various network security devices. A series of case studies helps illuminate concepts and shows how you can apply the concepts to solve real-world problems. Divided into four parts, Network Security Fundamentals takes you on a tour of all the essential technologies and modern defenses at your disposal to help you maintain network uptime and data integrity. Part I covers the basics, introducing terms and concepts and laying the foundation of a solid security structure. The discussion focuses on weaknesses and vulnerabilities along with an overview of the traditional defenses used to thwart attacks. Part II examines two components of security-cryptography and security policies. Part III looks at the various security components. Separate chapters cover web security, router security, firewalls, intrusion detectio...
    Note: Includes bibliographical references (p. [427]-430) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 734 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Security professionals and administrators now have access to one of the most valuable resources for learning best practices for network perimeter security. Inside Network Perimeter Security, Second Edition is your guide to preventing network intrusions and defending against any intrusions that do manage to slip through your perimeter. This acclaimed resource has been updated to reflect changes in the security landscape, both in terms of vulnerabilities and defensive tools. Coverage also includes intrusion prevention systems and wireless security. You will work your way through fortifying the perimeter, designing a secure network, and maintaining and monitoring the security of the network. Additionally, discussion of tools such as firewalls, virtual private networks, routers and intrusion detection systems make Inside Network Perimeter Security, Second Edition a valuable resource for both security professionals and GIAC Certified Firewall Analyst certification exam candidates.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    Language: English
    Pages: xviii, 645 p. , ill. ; , 23 cm
    Edition: 2nd ed.
    Keywords: UNIX Shells ; Computer networks ; Security measures ; Data encryption (Computer science) ; Electronic books ; local
    Abstract: Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide . This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.
    Note: "Covers SSH-2 protocol"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Sebastopol, Calif. ; : O'Reilly Media | Boston, MA :Safari,
    Language: English
    Pages: xiii, 324 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include: Writing your own network sniffers and packet injection tools Writing plugins for Nessus, Ettercap, and Nikto Developing exploits for Metasploit Code analysis for web applications Writing kernel modules for security applications, and understanding rootkits While many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions--without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.
    Note: "Writing, hacking, and modifying security tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 478 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux's unparalleled functionality and adaptability have made it the main alternative to Unix and Microsoft Windows operating systems. And with good reason. System administrators realize that this robust alternative can greatly improve their operating system's reliability and save them money, too. Linux systems are even less vulnerable to attacks by computer viruses and worms. Not surprisingly, businesses, government agencies, schools, and a wealth of other institutions are all looking to Linux to replace the Windows desktop for these same benefits. Linux in a Windows World takes an in-depth look at exactly how Linux can be brought into an organization that's currently based on Microsoft Windows systems. Featuring a litany of insider tips and techniques, Linux in a Windows World dispenses all the practical advice you need to migrate to this revolutionary open source software. Author Roderick W. Smith, himself a renowned system administrator and Linux convert, understands that the skills required to install, deploy, and maintain Linux are not easy to find. That's why he has tapped the absolute best source of information available: the Linux server experts who have made it their life's work to build and manage the Linux system. The latest in O'Reilly's line of bestselling Linux titles, Linux in a Windows World is an invaluable companion for any system administrator interested in integrating Linux into their Windows environment.
    Note: "A system administrator's guide to hetrogeneous networking"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 238 p. , ill. ; , 24 cm
    Keywords: Linux ; Computer security ; Electronic books ; local
    Abstract: The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxiv, 798 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: "The book you are about to read will arm you with the knowledge you need to defend your network from attackers-both the obvious and the not so obvious.... If you are new to network security, don't put this book back on the shelf! This is a great book for beginners and I wish I had access to it many years ago. If you've learned the basics of TCP/IP protocols and run an open source or commercial IDS, you may be asking 'What's next?' If so, this book is for you." -Ron Gula, founder and CTO, Tenable Network Security, from the Foreword "Richard Bejtlich has a good perspective on Internet security-one that is orderly and practical at the same time. He keeps readers grounded and addresses the fundamentals in an accessible way." -Marcus Ranum, TruSecure "This book is not about security or network monitoring: It's about both, and in reality these are two aspects of the same problem. You can easily find people who are security experts or network monitors, but this book explains how to master both topics." -Luca Deri, ntop.org "This book will enable security professionals of all skill sets to improve their understanding of what it takes to set up, maintain, and utilize a successful network intrusion detection strategy." -Kirby Kuehl, Cisco Systems Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen? Network security monitoring (NSM) equips security staff to deal with the inevitable consequences of too few resources and too many responsibilities. NSM collects the data needed to generate better assessment, detection, and response processes-resulting in decreased impact from unauthorized activities. In The Tao of Network Security Monitoring , Richard Bejtlich explores the products, people, and processes that implement the NSM model. By focusing on case studies and the application of open source tools, he helps you gain hands-on knowledge of how to better defend networks and how to mitigate damage from security incidents. Inside, you will find in-depth information on the following areas. The NSM operational framework and deployment considerations. How to use a variety of open-source tools-including Sguil, Argus, and Ethereal-to mine network traffic for full content, session, statistical, and ale...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 381 p. , ill. ; , 23 cm
    Keywords: Computer networks ; Security measures ; Computer security ; Computer security ; United States ; Management ; Data protection ; Data protection ; Management ; Electronic books ; local
    Abstract: Understand the total cost of ownership and return on investment for network security solutions Understand what motivates hackers and how to classify threats Learn how to recognize common vulnerabilities and common types of attacks Examine modern day security systems, devices, and mitigation techniques Integrate policies and personnel with security equipment to effectively lessen security risks Analyze the greater implications of security breaches facing corporations and executives today Understand the governance aspects of network security to help implement a climate of change throughout your organization Learn how to qualify your organization's aversion to risk Quantify the hard costs of attacks versus the cost of security technology investment to determine ROI Learn the essential elements of security policy development and how to continually assess security needs and vulnerabilities The Business Case for Network Security: Advocacy, Governance, and ROI addresses the needs of networking professionals and business executives who seek to assess their organization's risks and objectively quantify both costs and cost savings related to network security technology investments. This book covers the latest topics in network attacks and security. It includes a detailed security-minded examination of return on investment (ROI) and associated financial methodologies that yield both objective and subjective data. The book also introduces and explores the concept of return on prevention (ROP) and discusses the greater implications currently facing corporations, including governance and the fundamental importance of security, for senior executives and the board. Making technical issues accessible, this book presents an overview of security technologies that uses a holistic and objective model to quantify issues such as ROI, total cost of ownership (TCO), and risk tolerance. This book explores capital expenditures and fixed and variable costs, such as maintenance and upgrades, to determine a realistic TCO figure, which in turn is used as the foundation in calculating ROI. The importance of security policies addressing such issues as Internet usage, remote-access usage, and incident reporting is also discussed, acknowledging that the most comprehensive security equipment will not protect an organization if it is poorly configured, implemented, or used. Quick reference sheets and worksheets, included in the appendixes, provide technology reviews and allow fin...
    Note: "Understand the total cost of ownership and return on investment for network security solutions"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 234 , ill. ; , 24 cm
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval cities, they've adopted a siege mentality, building walls to keep the bad guys out. It makes for a secure perimeter, but hampers the flow of commerce. Fortunately, some corporations are beginning to rethink how they provide security, so that interactions with customers, employees, partners, and suppliers will be richer and more flexible. Digital Identity explains how to go about it. This book details an important concept known as "identity management architecture" (IMA): a method to provide ample protection while giving good guys access to vital information and systems. In today's service-oriented economy, digital identity is everything. IMA is a coherent, enterprise-wide set of standards, policies, certifications and management activities that enable companies like yours to manage digital identity effectively--not just as a security check, but as a way to extend services and pinpoint the needs of customers. Author Phil Windley likens IMA to good city planning. Cities define uses and design standards to ensure that buildings and city services are consistent and workable. Within that context, individual buildings--or system architectures--function as part of the overall plan. With Windley's experience as VP of product development for ExciteHome.com and CIO of Governor Michael Leavitt's administration in Utah, he provides a rich, real-world view of the concepts, issues, and technologies behind identity management architecture. How does digital identity increase business opportunity? Windley's favorite example is the ATM machine. With ATMs, banks can now offer around-the-clock service, serve more customers simultaneously, and do it in a variety of new locations. This fascinating book shows CIOs, other IT professionals, product managers, and programmers how security planning can support business goals and opportunities, rather than holding them at bay.
    Note: "Unmasking Identity Management Architecture (IMA)". - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 350 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Electronic data processing ; Distributed processing ; High performance computing ; Operating systems (Computers) ; Parallel processing (Electronic computers) ; Electronic books ; local
    Abstract: To the outside world, a "supercomputer" appears to be a single system. In fact, it's a cluster of computers that share a local area network and have the ability to work together on a single problem as a team. Many businesses used to consider supercomputing beyond the reach of their budgets, but new Linux applications have made high-performance clusters more affordable than ever. These days, the promise of low-cost supercomputing is one of the main reasons many businesses choose Linux over other operating systems.This new guide covers everything a newcomer to clustering will need to plan, build, and deploy a high-performance Linux cluster. The book focuses on clustering for high-performance computation, although much of its information also applies to clustering for high-availability (failover and disaster recovery). The book discusses the key tools you'll need to get started, including good practices to use while exploring the tools and growing a system. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Then, you'll learn about software options that can save you hours--or even weeks--of deployment time.Since a wide variety of options exist in each area of clustering software, the author discusses the pros and cons of the major free software projects and chooses those that are most likely to be helpful to new cluster administrators and programmers. A few of the projects introduced in the book include: MPI, the most popular programming library for clusters. This book offers simple but realistic introductory examples along with some pointers for advanced use. OSCAR and Rocks, two comprehensive installation and administrative systems openMosix (a convenient tool for distributing jobs), Linux kernel extensions that migrate processes transparently for load balancing PVFS, one of the parallel filesystems that make clustering I/O easier C3, a set of commands for administering multiple systems Ganglia, OpenPBS, and cloning tools (Kickstart, SIS and G4U) are also covered. The book looks at cluster installation packages (OSCAR & Rocks) and then considers the core packages individually for greater depth or for folks wishing to do a custom installation. Guidelines for debugging, profiling, performance tuning, and managing jobs from multiple users round out this immensely useful book.
    Note: "A comprehensive getting started guide"--Cover. - Includes bibliographical references (p. 329-337) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxix, 412 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer hackers ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Stories about hacking, stolen credit card numbers, computer viruses, and identity theft are all around us, but what do they really mean to us? The goal of this book, quite simply, is to help educate people on the issues with high-tech crimes. High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front demystifies the risks and realities of high-tech crimes. Demystifying these crimes and raising the awareness of users of technology will make people smarter and safer, and that will make all of us safer in the long run. Steven Branigan shares the inside details of real cases he worked on in his various roles in law-enforcement, information technology, and security. The result is a comprehensive, accessible look at how digital crimes are discovered, what techniques the criminals use and why, and (in some cases) how they can be brought to justice. Inside, you'll find extensive information on Actual hacker investigations, including the harm caused and how the criminals were tracked and caught The ins and outs of identity theft, a rapidly growing crime with potential for serious damage Using the criminology and psychology of hackers to detect and deter attacks The risks associated with various technologies Do's and don'ts for high-tech criminal investigations This easily understandable book will take you beyond hearing about high-tech crimes to actually understanding how and why they happen-and what can be done to protect yourself. "Most books on this topic impart knowledge in the form of techniques and methods. This book differs in that it imparts Steven Branigan's experience in the field, and real case studies in which problems are framed and effective solutions are crafted. In this respect this book imparts not only knowledge, but Steve's experience and wisdom as well." -Mike Tarrani, Independent Consultant "Steven Branigan provides a gripping account of what's involved in investigating computer crime. I strongly recommend this book to any security practitioner or anyone with an interest in computer security." -Michael Nickle, Lead Consultant, VeriSign "Being on the inside of several high-tech busts has given Steven Branigan the ability to make this book intriguing enough to keep high-tech types interested, while also doing a superb job of demystifying these real-life cases in a way that anyone can read and enjoy." -David Kensiski, Director of Operations, InfiniRoute Networks "The modern high-tech industry brought new things to our lives. B...
    Note: Includes bibliographical references (p. [389]-395) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxii, 372 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer crimes ; Prevention ; Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. Inside, you'll find comprehensive information on the following topics How denial-of-service attacks are waged How to improve your network's resilience to denial-of-service attacks What to do when you are involved in a denial-of-service attack The laws that apply to these attacks and their implications How often denial-of-service attacks occur, how strong they are, and the kinds of damage they can cause Real examples of denial-of-service attacks as experienced by the attacker, victim, and unwitting accomplices The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.
    Note: Includes bibliographical references (p. 335-350) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 1090 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best just became BETTER! Completely revised to meet all your Red Hat Linux needs! Fedora Core and Red Hat Enterprise Linux are advanced operating systems. You need a book that's just as advanced. This book explains Linux clearly and effectively--with a focus on the features you care about, including system security, Internet server setup, and sharing files and printers with Windows systems. Best-selling Linux author Mark Sobell starts at the beginning and walks you through everything that matters, from installing Fedora Core using the included CDs to GNOME, KDE, Samba 3, sendmail, Apache, DNS, NIS, and iptables. Along the way, you learn the "hows" and the "whys." Whether you are a user, an administrator, or a programmer, this book gives you all you need and more. Mark Sobell knows every Linux nook and cranny, has taught hundreds of thousands of readers, and never forgets what it's like to be new to Linux. Don't settle for yesterday's Linux book...get the ONLY book that meets today's challenges and tomorrow's! Compared with the other Linux books out there, A Practical Guide to Red Hat® Linux®, Second Edition, delivers... The full Fedora Core operating system on 4 CDs (not the truncated "Publisher's Edition") AND complete coverage of Fedora Core and the 2.6 Linux kernel, PLUS coverage of Red Hat Enterprise Linux Deeper coverage of GNOME and KDE, including customization More practical coverage of file sharing with Samba, NFS, and FTP Easier-to-follow coverage of Internet server configuration including Apache, sendmail, NFS, and DNS More up-to-date coverage of security, including SELinux (Security Enhanced Linux), OpenSSH, and firewall setup using iptables Better coverage of "meat-and-potatoes" system/network administration tasks A more practical introduction to writing bash shell scripts More complete coverage of configuring local and network printers using CUPS And much more...including a 500+ word glossary and a comprehensive index to help you find what you need fast! Includes 4 CDs! Get the full version of Red Hat's Fedora Core 2 release!
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: 360 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The fastest route to true Linux mastery! You know your way around Windows (or maybe a Mac, or even UNIX). Now, you're ready for Linux. And you don't have a minute to waste. Welcome. This book's for you . Janet Valade has spent thirteen years helping new users master Linux and related technologies. She knows the "magic words" that'll help you get the job done, fast. (And she knows exactly how to keep you out of trouble, too!) You'll learn Linux through dozens of focused, bite-size examples, each one carefully designed to build on what you've learned before. Need specific solutions? This book's carefully crafted, high-efficiency format delivers them... instantly . Working on Fedora? Mandrake? SuSE? No matter. This book is for you. No other introduction to Linux covers this much, this well, this quickly. Dig in, get started, get results! All you need to succeed with Linux- without the hassles! Choose the best Linux distribution for your personal or business needs Get Linux installed quickly and running reliably Handle your day-to-day tasks and efficiently manage your files Master KDE, GNOME, and the Linux command line Write documents and build spreadsheets with OpenOffice.org Set up Web access, email, and instant messaging Work with powerful Linux multimedia and graphics software Find, install, and run new Linux software Set up your printer to work with Linux Supercharge Linux with shell scripts and customized configuration files Includes concise Linux command reference and quick guide to building powerful Regular Expressions Spring Into ... is a new series of fast-paced tutorials from Addison-Wesley Professional Publishers. Each book in the series is designed to bring you up-to-speed quickly. Complex technologies are reduced to their core components, and each component is treated with remarkable efficiency in one- or two-page spreads. Just the information you need to begin working... now! And because the books are example-rich and easy to navigate, you'll find that they make great on-the-job references after you've mastered the basics. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xvii, 352 p. , ill. ; , 23 cm. +
    DDC: 005.446
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Enter your Linux Desktop Garage Don't just survive with Linux: thrive Find tools & info to do practically everything , such as: Ripping your CDs (&DVDs) De-Spam-ifying your email Capturing, editing, organizing your digital photos Chatting with your Linux-deficient IM pals Tracking your contacts, appointments, life Transforming Firefox into easy blogware Finding great substitutes for your Windows apps Diving into a veritable plethora of games Where you get the truth (unvarnished) Where you get productive (quick) Where Linux is fun (honest) Your guide: Susan Matteson , real user, real expert She reveals the fun stuff (from MP3s to desktop wallpaper) Demystifies the essentials (from file management to passwords) Simplifies the tasks they said were easy, but weren't (until now) Where there's even more (plenty) Step-by-step instructions for both Mandrake & Fedora Linux Zero-hassle tips for managing & personalizing your PC Gnoppix Linux on CD-ROM (run Linux without touching Windows) © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xii, 369 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Linux ; Firewalls (Computer security) ; Electronic books ; local
    Abstract: Covers Red Hat and SUSE When something goes wrong with your Linux firewall, you need to fix it-right now. You don't have time for endless newsgroup searches, confusing man pages, emails to the developers... it's an emergency! One book brings together all the step-by-step solutions and proven problem-solving techniques you'll need when the time comes: Troubleshooting Linux® Firewalls . Authors Michael Shinn and Scott Shinn are among the world's leading firewall experts; they've even been hired to protect computer security at the White House. In this book, they cover every area where Linux firewalls can go wrong: rules and filtering problems, Layer 2/3/4 issues, trouble with individual services, DNS/DHCP failures, even misconfigured VPNs. They also present an easy, start-to-finish troubleshooting methodology that'll help you identify even the newest or most obscure firewall problem fast-and solve it! Inside, you will find in-depth information on the following areas: What you must know about iptables and netfilter to troubleshoot and avoid problems Using loggers, sniffers, and other tools to diagnose even the most obscure firewall problems Making sure your firewall rules work the way they're supposed to Resolving problems with Network Address Translation and IP Forwarding Troubleshooting SMTP, Apache, Squid, NFS, FTP, instant messaging, and other Web-based services Finding and fixing common problems with IPsec VPN configuration Making your firewalls more failure-resistant: recommendations from the experts If you depend on a Linux firewall, what will you do if it goes down? With Troubleshooting Linux® Firewalls , you can be confident that the solutions are right at hand-so you can sleep at night! © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Praise for Mark Sobell's Books "I keep searching for books that collect everything you want to know about a subject in one place, and keep getting disappointed. Usually the books leave out some important topic, while others go too deep in some areas and must skim lightly over the others. A Practical Guide to Red Hat® Linux® is one of those rare books that actually pulls it off. Mark G. Sobell has created a single reference for Red Hat Linux that cannot be beat! This marvelous text (with a 4-CD set of Linux Fedora Core 2 included) is well worth the price. This is as close to an 'everything you ever needed to know' book that I've seen. It's just that good and rates 5 out of 5." -Ray Lodato, Slashdot contributor "Mark Sobell has written a book as approachable as it is authoritative." -Jeffrey Bianchine, Advocate, Author, Journalist "Excellent reference book, well suited for the sysadmin of a linux cluster, or the owner of a PC contemplating installing a recent stable linux. Don't be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs." -Wes Boudville, Inventor " A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you Mark Sobell." -C. Pozrikidis, University of California at San Diego "This book presents the best overview of the Linux operating system that I have found. . . . It should be very helpful and understandable no matter what the reader's background is: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready." -Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group FRUUG, Boulder, Colorado "Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There's no other book that discusses so many different topics and in such depth." -Eugenia Loli-Queru, Editor in Chief, OSNews.com The Most Useful Linux Tutorial and Reference Ever, with Hundreds of High-Quality Examples Covering Every Linux Distribution! To be truly productive with Linux, you need to thoroughly mast...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    Online Resource
    Online Resource
    Boston : Addison Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 665 p. , ill. ; , 24 cm. +
    Keywords: Linux ; Business ; Data processing ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Switch your business to Linux: proven techniques for working IT Professionals This is the complete technical resource for migrating your business desktops to Linux, administering them efficiently, and using them to drive cost savings throughout your organization. Respected Linux Journal columnist Marcel Gagné walks you step-by-step through planning and managing the transition, getting users up and running, and keeping them happy. Gagné covers hardware, productivity applications, messaging, coexistence with Windows environments, support, and much more. This is also the first book with in-depth coverage of using Linux Terminal Server Project (LTSP) thin clients to dramatically reduce the cost and complexity of computing. Deploy Linux with your existing PCs, printers, and IT/network infrastructure Centrally manage users and security through Webmin's convenient Web interface Deliver reliable email services with Postfix, or integrate Linux mail clients with Microsoft Exchange servers Configure Windows file sharing with Samba, and Linux file sharing with NFS Secure network communications with Linux firewalls and OpenSSH Plan and deploy LTSP thin clients and diskless workstations and the server support for them Provide LDAP directory services to all your clients Support users by "remote control"-without leaving your desk From network security to spam reduction, automated backup/restore to collaboration groupware, Gagné offers specific solutions and proven techniques for leveraging the full power of Linux in your business. Say goodbye to the expense, hassle, and insecurity of Windows desktops! Say hello to business computing the way it's supposed to be-with Linux! About the Author Marcel Gagné is best known as the author of the Linux Journal's "Cooking with Linux" series, winner of the Readers' Choice award for favorite column for three straight years. He has written two highly acclaimed Addison-Wesley books: Moving to Linux and Linux System Administration: A User's Guide. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR ; | Boston, MA :Safari,
    Language: English
    Pages: xxiv, 353 p. , ill. ; , 24 cm
    DDC: 005.432
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The first comprehensive, expert guide for end-to-end Linux application optimization Learn to choose the right tools-and use them together to solve real problems in real production environments Superior application performance is more crucial than ever-and in today's complex production environments, it's tougher to ensure, too. If you use Linux, you have extraordinary advantages: complete source code access, plus an exceptional array of optimization tools. But the tools are scattered across the Internet. Many are poorly documented. And few experts know how to use them together to solve real problems. Now, one of those experts has written the definitive Linux tuning primer for every professional: Optimizing Linux® Performance. Renowned Linux benchmarking specialist Phillip Ezolt introduces each of today's most important Linux optimization tools, showing how they fit into a proven methodology for perfecting overall application performance. Using realistic examples, Ezolt shows developers how to pinpoint exact lines of source code that are impacting performance. He teaches sysadmins and application developers how to rapidly drill down to specific bottlenecks, so they can implement solutions more quickly. You'll discover how to: Identify bottlenecks even if you're not familiar with the underlying system Find and choose the right performance tools for any problem Recognize the meaning of the events you're measuring Optimize system CPU, user CPU, memory, network I/O, and disk I/O-and understand their interrelationships Fix CPU-bound, latency-sensitive, and I/O-bound applications, through case studies you can easily adapt to your own environment Install and use oprofile, the advanced systemwide profiler for Linux systems If you're new to tuning, Ezolt gives you a clear and practical introduction to all the principles and strategies you'll need. If you're migrating to Linux, you'll quickly master Linux equivalents to the tools and techniques you already know. Whatever your background or environment, this book can help you improve the performance of all your Linux applications-increasingbusiness value and user satisfaction at the same time. © Copyright Pearson Education. All rights reserved.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxxviii, 651 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "Where has this book been all my professional life? It is about time someone wrote this book. The author covers many basic, practical issues that other authors omit in a format that makes for a great troubleshooting reference and for casual perusing. There are a lot of books available that give a broad overview of system and network administration, and there are a lot of detailed books on each specific topic covered in this book, but I don't know of any other place where I can get so much useful, practical information on such a wide range of topics in such a concise and readable form. I will highly recommend it to my friends and colleagues who are trying to manage their own systems. I am anxious to show it to our instructors who teach data communications and networks as a possible text or lab manual." -Ron McCarty, instructor and program chair, Computer Science, Penn State Erie "This book takes a very unique approach and is very flexible. It offers a great deal to the home user, students, small businesses-all the way to any Linux sys admin that needs a handy reference. I found it very refreshing in terms of style, stated goals, presentation, ease of use, direction, and the "present and future" value of the content. In other words the author is very current and knowledgeable. I would recommend this book to every level from programmer to manager." -Joe Brazeal, Information Technician III, Southwest Power Pool "This book is an excellent resource for new Linux administrators. I was impressed with the comprehensive set of 35 topic chapters, making this book a very useful reference. I know of no other work like this." -George Vish II, Linux curriculum program manager and senior education consultant, Hewlett-Packard Education "I would recommend this book to novice Linux users and administrators. It covers a lot of topics, and makes it easy for readers to follow along." -Bret Strong, education consultant, Hewlett-Packard Company "Linux Quick Fix Notebook is a well-written guide to designing, installing, and maintaining Linux servers. Many Linux reference texts are just simple rewrites of Linux ¨man¨ and ¨info¨ pages, but this book addresses the real issues that systems administrators encounter when working with Linux. The author provides a pedagogical guide to learning Linux server administration. In addition, the book includes step-by-step information so that users can quickly take advantage of the best that open source software has to offer today. I...
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: p. cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Learn Linux kernel programming, hands-on : a uniquely effective top-down approach The Linux ® Kernel Primer is the definitive guide to Linux kernel programming. The authors' unique top-down approach makes kernel programming easier to understand by systematically tracing functionality from user space into the kernel and carefully associating kernel internals with user-level programming fundamentals. Their approach helps you build on what you already know about Linux, gaining a deep understanding of how the kernel works and how its elements fit together. One step at a time, the authors introduce all the tools and assembly language programming techniques required to understand kernel code and control its behavior. They compare x86 and PowerPC implementations side-by-side, illuminating cryptic functionality through carefully-annotated source code examples and realistic projects. The Linux ® Kernel Primer is the first book to offer in-depth coverage of the rapidly growing PowerPC Linux development platform, and the only book to thoroughly discuss kernel configuration with the Linux build system. Coverage includes Data structures x86 and PPC assembly language Viewing kernel internals Linux process model User and kernel space Interrupts and exceptions Memory allocation and tracking Tracing subsystem behavior I/O interactions Filesystems and file operations Scheduling and synchronization Kernel boot process Kernel build system Configuration options Device drivers And more... If you know C, this book teaches you all the skills and techniques you need to succeed with Linux kernel programming. Whether you're a systems programmer, software engineer, systems analyst, test professional, open source project contributor, or simply a Linux enthusiast, you'll find it indispensable. © Copyright Pearson Education. All rights reserved.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams Pub. | Boston, MA :Safari,
    Language: English
    Pages: xi, 705 p. , ill. ; , 23 cm. +
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Join an estimated 85% of the U.S. Linux market in using Red Hat's Linux distributions by learning it from a Fedora authority. Sams Teach Yourself Red Hat Fedora 4 All in One is a starter kit that will help you install, configure, and use Red Hat's Fedora 4 distribution and desktop applications. The easy-to-understand, step-by-step instructions will also show you how to: Use the OpenOffice.org productivity suite and other leading applications. Troubleshoot hardware issues and install new components. Set up a small Linux-based network to share files and resources. Also included is a DVD, which will provide you with the complete Fedora Core Linux distribution, OpenOffice.org desktop suite, and the leading applications for e-mail, Web browsing, and graphics. Find out how you can safely and reliably use Linux and Linux-based applications to accomplish your day-to-day work in the office and at home with Sams Teach Yourself Red Hat Fedora 4 All in One .
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xvi, 412 p. ; , 23 cm
    DDC: 005.4/32
    Keywords: Linux ; UNIX Shells ; Electronic books ; local
    Abstract: According to IDC, over 170,000 new servers were shipped in the first quarter of 2003. That also means that there were potentially more than 170,000 people like you charged with administering these systems without the proper knowledge or training to do so. Linux Shell Scripting with Bash will help you learn to not only get your system up and running quickly by employing the Bash shell, but it will also show you professional scripting solutions through the use of structured programming and standard Linux development tools. The book focuses on the Linux environment, which the shell relies on to function, and the robust Linux tool set, making this book ideal for learning shell scripting. Real-world scripts are included that are readable, extendable and easy to debug. This book is an asset to any Linux user.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 269 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Keywords: Snort (Computer file) ; Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: Intrusion detection is not for the faint at heart. But, if you are a network administrator chances are you're under increasing pressure to ensure that mission-critical systems are safe--in fact impenetrable--from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders.Designing a reliable way to detect intruders before they get in is a vital but daunting challenge. Because of this, a plethora of complex, sophisticated, and pricy software solutions are now available. In terms of raw power and features, SNORT, the most commonly used Open Source Intrusion Detection System, (IDS) has begun to eclipse many expensive proprietary IDSes. In terms of documentation or ease of use, however, SNORT can seem overwhelming. Which output plugin to use? How do you to email alerts to yourself? Most importantly, how do you sort through the immense amount of information Snort makes available to you?Many intrusion detection books are long on theory but short on specifics and practical examples. Not Managing Security with Snort and IDS Tools . This new book is a thorough, exceptionally practical guide to managing network security using Snort 2.1 (the latest release) and dozens of other high-quality open source other open source intrusion detection programs. Managing Security with Snort and IDS Tools covers reliable methods for detecting network intruders, from using simple packet sniffers to more sophisticated IDS (Intrusion Detection Systems) applications and the GUI interfaces for managing them. A comprehensive but concise guide for monitoring illegal entry attempts, this invaluable new book explains how to shut down and secure workstations, servers, firewalls, routers, sensors and other network devices.Step-by-step instructions are provided to quickly get up and running with Snort. Each chapter includes links for the programs discussed, and additional links at the end of the book give administrators access to numerous web sites for additional information and instructional material that will satisfy even the most serious security enthusiasts. Managing Security with Snort and IDS Tools maps out a proactive--and effective--approach to keeping your systems safe from attack.
    Note: "Intrusion detection with open source tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 349 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: "Ajay and Scott take an interesting approach in filling Defend I.T. with case studies and using them to demonstrate important security principles. This approach works well and is particularly valuable in the security space, where companies and consultants are often hesitant to discuss true security incidents for potential embarrassment and confidentiality reasons. Defend I.T. is full of engaging stories and is a good read." --Fyodor, author of the Nmap Security Scanner and Insecure.Org " Defend I.T. answers reader demand for scenario-driven examples. Security professionals will be able to look at these case studies and relate them to their own experiences. That sets this book apart." --Lance Hayden, Cisco Systems "This is an exciting book! It's like reading several mysteries at once from different viewpoints, with the added benefit of learning forensic procedures along the way. Readers will benefit from the procedures, and the entertaining presentation is a real plus." --Elizabeth Zinkann, Equilink Consulting The battle between IT professionals and those who use the Internet for destructive purposes is raging--and there is no end in sight. Reports of computer crime and incidents from the CERT Coordination Center at Carnegie Mellon University more than double each year and are expected to rise. Meanwhile, viruses and worms continue to take down organizations for days. Defend I.T.: Security by Example draws on detailed war stories to identify what was done right and what was done wrong in actual computer-security attacks, giving you the opportunity to benefit from real experiences. Approaches to securing systems and networks vary widely from industry to industry and organization to organization. By examining a variety of real-life incidents companies are too embarrassed to publicly share, the authors explain what could have been done differently to avoid the losses incurred--whether creating a different process for incident response or having better security countermeasures in place to begin with. Inside, you'll find in-depth case studies in a variety of categories: Basic Hacking: Blackhat bootcamp, including mapping a network, exploiting vulnerable architecture, and launching denial-of-service attacks Current Methods: The latest in malicious deeds, including attacks on wireless networks, viruses and worms, and compromised Web servers Additional Items on the Plate: Often overlooked security measures such as developing a security policy, intrusio...
    Note: Includes bibliographical references (p. 321-326) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xviii, 727 p. , ill. ; , 24 cm. +
    DDC: 005.4/3
    Keywords: Linux ; Virtual computer systems ; Virtual storage (Computer science) ; Electronic books ; local
    Abstract: Finally, a comprehensive guide to the Linux VM! VM's behavior affects every Linux kernel subsystem and dramatically impacts overall performance. But until now, there was only one way to understand VM: study the poorly documented source one line at a time. Now there's an easier, faster alternative. This book describes VM in unprecedented detail, presenting both theoretical foundations and a line-by-line source code commentary. It systematically covers everything from physical memory description to out-of-memory management. Coverage includes: Linux VM 2.4 architecture in depth-with diagrams and call graphs Physical memory description, page tables, address spaces, and memory allocation High memory, swapping, shared memory, and much more Expert guidance for analyzing the code of any open source project New Linux 2.6 kernel features in every chapter Well organized and superbly written, Understanding the Linux Virtual Memory Manager will be indispensable to every kernel programmer and researcher. CD-ROM INCLUDED Complete VM Learning Lab! Contains the author's new toolkit for exploring VM, including a browsable version of kernel source, CodeViz call graph generator; and VMRegress for analyzing and benchmarking VM. Also includes all code commentary in HTML, PDF, and plain text formats.
    Note: Includes bibliographical references (p. 707-709) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxix, 739 p. , ill. ; , 24 cm
    Series Statement: Networking technology series
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert guidance on designing secure networks Understand security best practices and how to take advantage of the networking gear you already have Review designs for campus, edge, and teleworker networks of varying sizes Learn design considerations for device hardening, Layer 2 and Layer 3 security issues, denial of service, IPsec VPNs, and network identity Understand security design considerations for common applications such as DNS, mail, and web Identify the key security roles and placement issues for network security elements such as firewalls, intrusion detection systems, VPN gateways, content filtering, as well as for traditional network infrastructure devices such as routers and switches Learn 10 critical steps to designing a security system for your network Examine secure network management designs that allow your management communications to be secure while still maintaining maximum utility Try your hand at security design with three included case studies Benefit from the experience of the principal architect of the original Cisco Systems SAFE Security Blueprint Written by the principal architect of the original Cisco Systems SAFE Security Blueprint, Network Security Architectures is your comprehensive how-to guide to designing and implementing a secure network. Whether your background is security or networking, you can use this book to learn how to bridge the gap between a highly available, efficient network and one that strives to maximize security. The included secure network design techniques focus on making network and security technologies work together as a unified system rather than as isolated systems deployed in an ad-hoc way. Beginning where other security books leave off, Network Security Architectures shows you how the various technologies that make up a security system can be used together to improve your network's security. The technologies and best practices you'll find within are not restricted to a single vendor but broadly apply to virtually any network system. This book discusses the whys and hows of security, from threats and counter measures to how to set up your security policy to mesh with your network architecture. After learning detailed security best practices covering everything from Layer 2 security to e-commerce design, you'll see how to apply the best practices to your network and learn to design your own security system to incorporate the requirements of your security policy. You'll review detailed desig...
    Note: Includes "Glossary of terms" (p. [673]-677). - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    Online Resource
    Online Resource
    Indianapolis, IN : Novell Press | Boston, MA :Safari,
    Language: English
    Pages: xiv, 490 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic data processing personnel ; Certification ; Operating systems (Computers) ; Certification ; Study guides ; Electronic books ; local
    Abstract: This official Novell Press Study Guide is your key to reviewing the fundamentals of installing, running, and administering SUSE LINUX so that you can pass Novell Practicum: 050-069, Novell's Certified Linux Professional exam, and become a Novell CLP. Expert trainer and curriculum developer Emmett Dulaney brings you the practical knowledge, tested techniques, real-world scenarios, and hands-on lab exercises you need to help you get the CLP certification from Novell.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall | Boston, MA :Safari,
    Language: English
    Pages: xvi, 792 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: I am more than satisfied (actually impressed) with how much system administration is possible from Webmin. Comprehensive and convenient, just about any administration I've done is covered here, along with several areas that I've hesitated to explore. --Karel Baloun, Sr. Software Engineer, Looksmart, Ltd. Easy, browser-based Linux/UNIX administration with Webmin--step by step Webmin gives you an easy, browser-based solution for virtually any day-to-day Linux/UNIX administration task. Now, there's a definitive Webmin guide for every beginning-to-intermediate sysadmin. Written by Webmin's primary developer, Managing Linux Systems with Webmin delivers authoritative, step-by-step coverage of the latest version of Webmin, from basic installation to centrally managing multiple servers. Coverage includes: How Webmin works--and how to install and secure it Using Webmin to configure basic system services, including filesystems, users/groups, and printing Configuring Apache, Sendmail, Squid, Samba, MySQL, PostgreSQL, FTP services, and more Cluster modules: configuring multiple systems from one master server Webmin modules: configuring Webmin itself Full API documentation and instructions for writing your own Webmin modules and themes Jamie Cameron walks you through more than 50 essential Webmin tasks--offering all the background you need, step-by-step instructions, extensive screen captures, and listings of the underlying configuration files that are being modified. Whether you're new to Linux/UNIX system administration or you simply want an alternative to the command line, Managing Linux Systems with Webmin will be an indispensable resource.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xx, 252 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Biometric identification ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: The complete guide to implementing biometric security solutions for your network Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by the government and the private sector. As with any new technology, the next evolution of network security has long languished in the realm of science fiction and spy novels. It is now ready to step into the reality of practical application. In Biometrics for Network Security , biometrics security expert Paul Reid covers a variety of biometric options, ranging from fingerprint identification to voice verification to hand, face, and eye scanning. Approaching the subject from a practitioner's point of view, Reid describes guidelines, applications, and procedures for implementing biometric solutions for your network security systems. Coverage includes: An introduction to authentication technologies and biometrics Dealing with privacy issues Biometric technologies, including finger, hand geometry, handwriting, iris, retina, voice, and face Security concerns related to biometrics, including attempts to spoof or fake results Deployment of biometric security systems, including vendor selection and roll out procedures Real-life case studies For security, system, and network administrators and managers, as well as anyone who is interested in the application of cutting-edge biometric technology, Biometrics for Network Security will prove an indispensable addition to your library!
    Note: Includes bibliographical references (p. 239-241) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxxvii, 828 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Understand how Cisco IDS can be used to protect, monitor, and enforce physical security policies Review techniques applicable to both network- and host-based platforms Review the security wheel concepts and apply security to AVVID using the SAFE Blueprint Install and configure the Cisco IDS to monitor your network for malicious activity Understand Cisco Threat Response (CTR) benefits and how it operates Apply alarm signatures and gain the proficiency to create your own custom signatures Deploy Cisco IDS effectively in your network using sensor and management platforms Get inside the Cisco Security Agent (CSA) architecture In addition to firewalls and other security appliances intended to limit outsider access to a network, intrusion detection and targeted countermeasures are a critical component of a complete network security plan. The Cisco Intrusion Detection Sensors and Management options work as a united system to provide detection, notification, and aggressive lockdown to malicious network breaches. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS), Second Edition , offers in-depth configuration and deployment information for the reliable and intensive intrusion detection solutions from Cisco Systems. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is a Cisco authorized, self-paced learning tool that helps you gain mastery over the use of both the host-based and network-based IDS options (as well as the Cisco Threat Response functionality) by presenting a consolidated all-inclusive reference on all of the current Cisco IDS sensor platforms and management platforms. Chapter overviews bring you quickly up to speed and help you get to work right away. Configuration examples are designed to show you how to make the most of your IDS system, and unique chapter-ending review questions test your knowledge. Whether you are seeking a reference guide to working with the CIDS sensor and management platforms or a study guide for the 642-531 exam, CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, supports your effective use of the Cisco IDS. CCSP Self-Study: Cisco Secure Intrusion Detection System (CSIDS) , Second Edition, is part of a recommended learning path from Cisco Systems that can include simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, an...
    Note: Includes index. - Rev. ed. of: Cisco secure intrusion detection system. c2002
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 745 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: A practical guide to creating a secure network infrastructure Understand basic cryptography and security technologies Identify the threats and common attacks to a network infrastructure Learn how to create a security policy Find out how to recover from a security breach Study specific implementation scenarios for securing your network environment Learn about advances in security technologies Designing Network Security, Second Edition , is a practical guide designed to help you understand the fundamentals of securing your corporate network infrastructure. This book takes a comprehensive look at underlying security technologies, the process of creating a security policy, and the practical requirements necessary to implement a corporate security policy. You will gain a thorough understanding of basic cryptography, the most widely deployed security technologies, and key emerging security technologies. You will be able to guide the architecture and implementation of a security policy for a corporate environment by knowing possible threats and vulnerabilities and understanding the steps required to perform a risk management assessment. Through the use of specific configuration examples, you will learn about the features required in network infrastructure equipment to implement the given security policy, including securing the internal corporate infrastructure, Internet access, and the remote access environment. This new edition includes coverage of new security features including SSH on routers, switches, and the PIX(r) Firewall; enhancements to L2TP and IPSec; Cisco(r) LEAP for wireless networks; digital certificates; advanced AAA functionality; and Cisco Intrusion Detection System features and products. Additional practical examples include current security trends using VPN, wireless, and VoIP networking examples. This book is part of the Networking Technology Series from Cisco Press(r), which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    Online Resource
    Online Resource
    Sebastopol, CA ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 390 p. , ill. ; , 24 cm. +
    Edition: 1st ed.
    DDC: 005.446
    Keywords: Linux ; Java (Computer program language) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The Java Desktop System (TM), from Sun Microsystems, is a modern system for all kinds of users, novice through expert. As an unusually robust, well-integrated desktop system, it may become the first to fulfill the promise of mass adoption for open source. JDS brings Linux and other open source software up to a level of usability that makes them suitable for the enormous base of Personal Computer users including office workers, students, mobile and home users. It behaves pretty much the way a Windows or Mac user would expect, but with many more powerful features. JDS has seen widespread adoption in the United States, Britain, China, and elsewhere. This book is the ideal guide to JDS: it is clear and direct, but loaded with insights from authors who have spent time working with, supporting, and enhancing the system. Tom Adelstein is an award winning polymath system designer; Sam Hiser is a respected business consultant with an itch that led him to become the marketing project lead for OpenOffice.org. Both are advocates for open source and founders of the Open Government Interoperability Project, members of the Open Source Software Institute and contributors to the JDShelp.org project. This book carefully covers such housekeeping chores as setting up networking, updates, and backups. Then it enters into great depth concerning the key productivity tools every user needs: email, web browsing, instant messaging, word processing, spreadsheets, and slide presentations. A number of chapters and appendices concerning useful tools, including things you can add to your system, rounds out this remarkably useful book. It has plenty to offer the new user as well as the seasoned Linux professional.
    Note: "Linux for prime time with the Java Desktop System"--Cover. - CD-ROM contains Sun Microsystem's Java Desktop System. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 298 , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: To the uninitiated, the title may seem like an oxymoron: after all, aren't hacks what network security is supposed to prevent? But if you're network administrator, this book's title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters. Network Security Hacks is not a long-winded treatise on security theory. Instead, this information packed little book provides 100 quick, practical, and clever things to do to help make your Linux, UNIX, or Windows networks more secure today. This compendium of security hacks doesn't just cover securing TCP/IP-based services, but also provides intelligent host-based security techniques. Loaded with concise but powerful examples of applied encryption, intrusion detection, logging, trending, and incident response, Network Security Hacks will demonstrate effective methods for defending your servers and networks from a variety of devious and subtle attacks. Network Security Hacks show how to detect the presence (and track every keystroke) of network intruders, methods for protecting your network and data using strong encryption, and even techniques for laying traps for would-be system crackers. Important security tools are presented, as well as clever methods for using them to reveal real, timely, useful information about what is happening on your network. O'Reilly's Hacks Series reclaims the term "hacking" for the good guys--innovators who use their ingenuity to solve interesting problems, explore and experiment, unearth shortcuts, and create useful tools. Network Security Hacks lives up to reputation the Hacks series has earned by providing the "roll-up-your sleeves and get-it-done" hacks that most network security tomes don't offer. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Using just one of these amazing hacks will make this slim book's price seem like a remarkable deal. The other 99 make Network Security Hacks absolutely invaluable.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    Online Resource
    Online Resource
    Redmond, Wash. : Microsoft Press | Boston, MA :Safari,
    Language: English
    Pages: xxix, 553 p. , ill. ; , 23 cm. +
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Help beat the hackers at their own game! Discover how to take charge of system assets through hands-on vulnerability scanning, penetration testing, and other advanced testing techniques-straight from members of the Microsoft Security Team.
    Note: Includes bibliographical references (p. 515-526) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    Language: English
    Pages: xiv, 378 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Web services ; Web sites ; Security measures ; Electronic books ; local
    Abstract: Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certificate authority.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    Online Resource
    Online Resource
    Beijing ; : O'Reilly Media, Inc. | Boston, MA :Safari,
    Language: English
    Pages: xii, 297 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.26/8
    Keywords: Linux ; Operating systems (Computers) ; Wireless communication systems ; Electronic books ; local
    Abstract: In Linux Unwired , you'll learn the basics of wirelesscomputing, from the reasons why you'd want to go wireless in thefirst place, to setting up your wireless network or accessingwireless data services on the road. The book provides a completeintroduction to all the wireless technologies supported by Linux.You'll learn how to install and configure a variety of wirelesstechnologies to fit different scenarios, including an office orhome network and for use on the road. You'll also learn how to getWi-Fi running on a laptop, how to use Linux to create your ownaccess point, and how to deal with cellular networks, Bluetooth,and Infrared. Other topics covered in the book include: Connecting to wireless hotspots Cellular data plans you can use with Linux Wireless security, including WPA and 802.1x Finding and mapping Wi-Fi networks with kismet and gpsd Connecting Linux to your Palm or Pocket PC Sending text messages and faxes from Linux through yourcellular phone Linux Unwired is a one-stop wireless information source foron-the-go Linux users. Whether you're considering Wi-Fi as asupplement or alternative to cable and DSL, using Bluetooth tonetwork devices in your home or office,or want to use cellular dataplans for access to data nearly everywhere, this book will show youthe full-spectrum view of wireless capabilities of Linux, and howto take advantage of them.
    Note: "A complete guide to wireless configuration"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 531 , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle. Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability. Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall Professional Technical Reference | Boston, MA :Safari,
    Language: English
    Pages: xxxii, 687 p. , ill. ; , 24 cm
    DDC: 005.4/4682
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: "This is an excellent introduction to Linux programming. The topics are well chosen and lucidly presented. I learned things myself, especially about internationalization, and I've been at this for quite a while." -Chet Ramey, Coauthor and Maintainer of the Bash shell "This is a good introduction to Linux programming. Arnold's technique of showing how experienced programmers use the Linux programming interfaces is a nice touch, much more useful than the canned programming examples found in most books." -Ulrich Drepper, Project Lead, GNU C library "A gentle yet thorough introduction to the art of UNIX system programming, Linux Programming by Example uses code from a wide range of familiar programs to illustrate each concept it teaches. Readers will enjoy an interesting mix of in-depth API descriptions and portability guidelines, and will come away well prepared to begin reading and writing systems applications. Heartily recommended." -Jim Meyering, Coauthor and Maintainer of the GNU Core Utility Programs Learn Linux® programming, hands-on... from real source code This book teaches Linux programming in the most effective way possible: by showing and explaining well-written programs. Drawing from both V7 Unix® and current GNU source code, Arnold Robbins focuses on the fundamental system call APIs at the core of any significant program, presenting examples from programs that Linux/Unix users already use every day. Gradually, one step at a time, Robbins teaches both high-level principles and "under the hood" techniques. Along the way, he carefully addresses real-world issues like performance, portability, and robustness. Coverage includes: Memory management File I/O File metadata Processes Users and groups Sorting and searching Argument parsing Extended interfaces Signals Internationalization Debugging And more... Just learning to program? Switching from Windows®? Already developing with Linux but interested in exploring the system call interface further? No matter which, quickly and directly, this book will help you master the fundamentals needed to build serious Linux software. Companion Web Sites, authors.phptr.com/robbins and www.linux-by-example.com , include all code examples.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 647 p. , ill. ; , 23 cm
    Series Statement: Prentice Hall series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer crimes ; Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Reveals how attackers install malicious code and how they evade detection Shows how you can defeat their schemes and keep your computers and network safe! Details viruses, worms, backdoors, Trojan horses, RootKits, and other threats Explains how to handle today's threats, with an eye on handling the threats to come "This is a truly outstanding book-enormous technical wealth and beautifully written." -Warwick Ford "Ed does it again, piercing the veil of mystery surrounding many of the more technical aspects of computer security!" -Harlan Carvey, CISSP "This book is entertaining and informative, while justifiably scaring you. Luckily it also tells you how to protect yourself, but makes you realize it's going to be a permanent spy-vs-spy struggle." -Radia Perlman, Distinguished Engineer, Sun Microsystems Keep control of your systems out of the hands of unknown attackers Ignoring the threat of malware is one of the most reckless things you can do in today's increasingly hostile computing environment. Malware is malicious code planted on your computer, and it can give the attacker a truly alarming degree of control over your system, network, and data-all without your knowledge! Written for computer pros and savvy home users by computer security expert Edward Skoudis, Malware: Fighting Malicious Code covers everything you need to know about malware, and how to defeat it! This book devotes a full chapter to each type of malware-viruses, worms, malicious code delivered through Web browsers and e-mail clients, backdoors, Trojan horses, user-level RootKits, and kernel-level manipulation. You'll learn about the characteristics and methods of attack, evolutionary trends, and how to defend against each type of attack. Real-world examples of malware attacks help you translate thought into action, and a special defender's toolbox chapter shows how to build your own inexpensive code analysis lab to investigate new malware specimens on your own. Throughout, Skoudis' clear, engaging style makes the material approachable and enjoyable to learn. This book includes: Solutions and examples that cover both UNIX® and Windows® Practical, time-tested, real-world actions you can take to secure your systems Instructions for building your own inexpensive malware code analysis lab so you can get familiar with attack and defensive tools harmlessly! Malware: Fighting Malicious Code is intended for system administrators, network personnel, security personnel, savvy home compu...
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    Online Resource
    Online Resource
    Boston : Prentice Hall Professional Technical Reference, c2005 : [Verlag nicht ermittelbar] | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 567 p. , ill. ; , 24 cm
    DDC: 005.13/3
    Keywords: Linux ; Application software ; Development ; Java (Computer program language) ; Electronic books ; local
    Abstract: Linux is the fastest-growing Java development platform because it saves money and time by serving as a platform for both development and deployment. But developers face significant platform-specific challenges when managing and deploying Java applications in a controlled production environment. Written for Java and Linux developers alike, Java™ Application Development on Linux® is the hands-on guide to the full Java application development lifecycle on Linux. Determined to spare other developers hours of trial and error, Albing and Schwarz demonstrate the platform, tools, and application development by showing realistic, easy-to-follow examples. After a simple command-line application introduces basic tools, this program leads readers through business-logic object analysis, database design, Java servlet UIs, Java Server Pages (JSP) UIs, Swing GUIs, and Standard Widget Toolkit (SWT) GUIs. Scaling up to the enterprise level provides the opportunity to use both the JBoss Application Server and the Apache Geronimo Application Servers, and Enterprise JavaBeans (EJB). Readers learn how to Use development tools available on Linux, such as the GNU Compiler for Java (gcj), Ant, the NetBeans IDE, IBM's Eclipse Java IDE, JUnit, and SunONE Studio Develop business logic layers using Java DataBase Connectivity (JDBC) Add a Web interface using servlets and JSPs Add a GUI using Sun's Abstract Window Toolkit (AWT) and IBM's SWT Deploy EJBs in Linux The authors conclude by demonstrating how a hierarchy of budgets can be created, tracked, and shared with Concurrent Versions System (CVS). A companion Website includes all source code and a link to each tool described. Java™ Application Development on Linux® can propel you from a standing start to the full-speed development and deployment of Java applications on Linux.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 326 p. , ill. ; , 24 cm. +
    Edition: 4th ed.
    DDC: 005.4/32
    Keywords: Linux ; Electronic books ; local
    Abstract: The GNU/Linux® success story is well known. Firmly established as a high-performance operating system, its worldwide installations are increasing at phenomenal rates. Much of this success has been on the server side, but more and more PC users are turning to Linux on the desktop, as well. For those grounded in Microsoft Windows® or Apple Macintosh® graphical interfaces, the first look at a powerful Unix-style operating system can be daunting. This book provides a clear, no-nonsense introduction to the popular Red Hat® distribution of Linux. It takes you through installation and shows you the key parts of the system, always with an eye toward what can go wrong and what you need to know to get over the humps. Linux is known as a secure environment and a good platform to run a web server. These topics are among the many covered in this book. But did you know you can also burn CDs, sync a PalmPilot™, and edit slideshow presentations with powerful tools on Linux? Those topics are covered here, too. Red Hat currently provides two distributions, both documented in this book. The first is their commercial, subscription-based product, called Red Hat Enterprise Linux and also available through retail channels as Red Hat Professional Workstation. The second is the freely distributed Fedora distribution. The Publisher's Edition of Fedora is included in this book on two disks. New in this edition are installation instructions for Red Hat Enterprise Linux and Fedora, package updating for Red Hat Enterprise Linux and Fedora, information on the GRUB bootloader, and the CUPS printer system. Learning Red Hat Enterprise Linux and Fedora tells you how to: Prepare your system for installing Linux Install and configure Linux and the two popular desktop environments, GNOME and KDE. Run the most popular productivity tools on Linux: mailers, web browsers, OpenOffice, and Evolution. Obtain and set up software through the Red Hat Package Manager (RPM) Set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet. Use the system-administration tools included with Red Hat, GNOME, and KDE, including such valuable utilities as Samba file-sharing and the Apache web server. Understand and write shell scripts so you can peek under the hood and extend the power of Linux.
    Note: Originally published as: Learning Red Hat Linux. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    Language: English
    Pages: xxviii, 322 p. , ill. ; , 25 cm
    Edition: 2nd ed.
    DDC: 005.8
    Keywords: Business enterprises ; Computer networks ; Security measures ; Computer networks ; Security measures ; Public key infrastructure (Computer security) ; Electronic books ; local
    Abstract: PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic transactions, Understanding PKI, Second Edition , provides network and security architects with the tools they need to grasp each phase of the key/certificate life cycle, including generation, publication, deployment, and recovery.
    Note: Revised ed. of: Understanding public-key infrastructure. 1999. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 286 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 004.68
    Keywords: Computer networks ; Security measures ; Wireless communication systems ; Security measures ; Wireless communication systems ; Standards ; Electronic books ; local
    Abstract: It's an increasingly wired world, but many people are finding that the best way to get connected is to do away with wires entirely. From cable replacement to universal Internet connectivity, wireless technology is changing the way we connect to our machines and to each other. As with any new technology, buying your gear is only the first step. Understanding how to make the best use of it is another story. Wireless Hacks offers 100 industrial-strength tips about wireless networking, contributed by experts who apply what they know in the real world every day. Each Hack can be read in just a few minutes, but can save you hours of research. Inside, you will find a wealth of useful techniques for making the most out of wireless technology, including: Making sense of the alphabet soup of the 802.11 standards, and understanding which technology makes sense for your solving particular problem Using Bluetooth, mobile radios, mobile data networks, and other exotic methods to keep you connected, no matter where you are Practical methods for detecting, analyzing, and monitoring wireless networks Extending the range of your network, and making the best possible use of the available radio spectrum Designing and building your own antennas Engineering long distance network links that span several miles Understanding the security issues of wireless networking, and protecting yourself and your users from unauthorized access and eavesdropping Written for the intermediate to advanced wireless user, Wireless Hacks is full of direct, practical, ingenious solutions to real-world networking problems. Whether your wireless network needs to extend to the edge of your office or to the other end of town, this collection of non-obvious, "from the field" techniques will show you how to get the job done.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    Online Resource
    Online Resource
    Beijing ; Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 311 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Linux ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Computer security is an ongoing process, a relentless contest between system administrators and intruders. A good administrator needs to stay one step ahead of any adversaries, which often involves a continuing process of education. If you're grounded in the basics of security, however, you won't necessarily want a complete treatise on the subject each time you pick up a book. Sometimes you want to get straight to the point. That's exactly what the new Linux Security Cookbook does. Rather than provide a total security solution for Linux computers, the authors present a series of easy-to-follow recipes--short, focused pieces of code that administrators can use to improve security and perform common tasks securely.The Linux Security Cookbook includes real solutions to a wide range of targeted problems, such as sending encrypted email within Emacs, restricting access to network services at particular times of day, firewalling a webserver, preventing IP spoofing, setting up key-based SSH authentication, and much more. With over 150 ready-to-use scripts and configuration files, this unique book helps administrators secure their systems without having to look up specific syntax. The book begins with recipes devised to establish a secure system, then moves on to secure day-to-day practices, and concludes with techniques to help your system stay secure.Some of the "recipes" you'll find in this book are: Controlling access to your system from firewalls down to individual services, using iptables, ipchains, xinetd, inetd, and more Monitoring your network with tcpdump, dsniff, netstat, and other tools Protecting network connections with Secure Shell (SSH) and stunnel Safeguarding email sessions with Secure Sockets Layer (SSL) Encrypting files and email messages with GnuPG Probing your own security with password crackers, nmap, and handy scripts This cookbook's proven techniques are derived from hard-won experience. Whether you're responsible for security on a home Linux system or for a large corporation, or somewhere in between, you'll find valuable, to-the-point, practical recipes for dealing with everyday security issues. This book is a system saver.
    Note: "Security tools & techniques"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 765 p. , ill. ; , 24 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: To thoroughly understand what makes Linux tick and why it's so efficient, you need to delve deep into the heart of the operating system--into the Linux kernel itself. The kernel is Linux--in the case of the Linux operating system, it's the only bit of software to which the term "Linux" applies. The kernel handles all the requests or completed I/O operations and determines which programs will share its processing time, and in what order. Responsible for the sophisticated memory management of the whole system, the Linux kernel is the force behind the legendary Linux efficiency. The new edition of Understanding the Linux Kernel takes you on a guided tour through the most significant data structures, many algorithms, and programming tricks used in the kernel. Probing beyond the superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Relevant segments of code are dissected and discussed line by line. The book covers more than just the functioning of the code, it explains the theoretical underpinnings for why Linux does things the way it does. The new edition of the book has been updated to cover version 2.4 of the kernel, which is quite different from version 2.2: the virtual memory system is entirely new, support for multiprocessor systems is improved, and whole new classes of hardware devices have been added. The authors explore each new feature in detail. Other topics in the book include: Memory management including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem and the Second Extended Filesystem Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization in the kernel Interprocess Communication (IPC) Program execution Understanding the Linux Kernel , Second Edition will acquaint you with all the inner workings of Linux, but is more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. If knowledge is power, then this book will help you make the most of your Linux system.
    Note: "Linux 2.4"--p. ix. - Includes bibliographical references (p. 707-709) and indexes
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall/PTR | Boston, MA :Safari,
    Language: English
    Pages: xxviii, 430 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Leverage Linux on the mainframe for a true business advantage Covers zSeries and S/390 mainframes Contains over 100 pages of reference material Includes detailed examples and maximization techniques The complete mainframe guide to leveraging the power of Linux Linux on the Mainframe is the comprehensive guide to the fastest growing trend in IT. IBM's Linux experts present peerless instruction in the art of planning for and making the most of a Linux mainframe. This book's in-depth coverage includes virtualization, deployment, data management, debugging, security, systems management, application porting, and much more. Sample companies that demonstrate the strengths and potential shortcomings of Linux on the mainframe Complete business analysis, including Total Cost of Ownership, server consolidation techniques, and IT infrastructure simplification Examples of deploying middleware and other tools In-depth introductions to the latest trends, developments, and technologies related to Linux on the mainframe Background information on mainframes and Linux for the lay reader Key techniques for deploying Linux servers and building integrated server environments For anyone involved in the planning, deploying, management, or administration of a mainframe, Linux on the Mainframe is a vital resource.
    Note: Includes bibliographical references (p. 399-407) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    Language: English
    Pages: xxii, 294 p. , ill. ; , 24 cm. +
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Tools for high-efficiency Linux development in enterprise environments. Linux developers have access to an extraordinary array of GNU and open source tools. Now, two leading Linux developers show how to choose the best tools for your specific needs, and integrate them into a complete development environment that maximizes your effectiveness in any project-no matter how large or complex. This book's example-rich coverage includes: The Linux software development process: research, requirements, coding, debugging, deployment, maintenance, and beyond Choosing and implementing editors, compilers, assemblers, debuggers, version control systems, utilities, and more Using Linux Standard Base (LSB) to deliver applications that run reliably on a wide range of Linux systems Comparing Java development options for Linux platforms Using Linux in cross-platform and embedded development environments Whatever your environment, The Linux Development Platform will help you find, choose, configure, and maintain the right tools-and use them to deliver outstanding Linux software. CD-ROM INCLUDED The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment. Bruce Perens' Open Source Series is a definitive series of Linux and Open Source books by the world's leading Linux software developers, all edited by Bruce Perens, the former Debian GNU/Linux Project Leader who helped launch the Open Source movement.
    Note: "The accompanying CD-ROM contains all the open source software you need to build and customize your own Linux development environment"--Cover p. 4. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xv, 265 p. , ill. ; , 23 cm
    DDC: 005.4/4769
    Keywords: Linux ; Application software ; Development ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux Clustering: Building and Maintaining Linux Clusters provides Linux users with information about building their own Linux cluster from the ground up. It gives best practices, helpful hints, and guidelines about building one server or hundreds of servers at a level that administrators at any experience level can understand. From installation of the air conditioning and power in the data center, to alternative file systems to the final production run, this book provides you with everything that you need to know. Linux Clustering: Building and Maintaining Linux Clusters walks you through the initial design and selection of the best possible types of clusters, as well as covering monitoring tools and providing for disaster recovery. Not only does this book provide information on parallel and Beowulf type clusters, Charles Bookman goes into depth on high availability clusters, load balancing, and provides advice for writing your own distributing applications as well. Incorporating best practices and cutting-edge approaches, Bookman provides step-by-step and tried-and-true methods of bringing up a Linux cluster to production level.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    Online Resource
    Online Resource
    [United States?] : IBM, International Technical Support Organization | Boston, MA :Safari,
    Language: English
    Pages: xiv, 443 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/46
    Keywords: Linux ; Operating systems (Computers) ; Web servers ; Electronic books ; local
    Abstract: System installation and administration Application case studies Cluster management For customers interested in Linux who need powerful and reliable servers to support their applications, IBM eServer pSeries offers 64-bit POWER servers to match their requirements at lower costs. Unlike other servers supporting solely high performance Linux needs, IBM eServer pSeries provides leadership price/performance with high reliability and a roadmap to provide the customer with investment protection. This IBM Redbook provides information and guidelines for how to deploy Linux on IBM eServer pSeries clusters. Topics covered include: System installation System administration Linux for pSeries RAS and problem determination Getting started with GPFS Cluster Systems Management (CSM) High Performance Computing case studies Commercial application case studies This redbook also includes hints and tips that illustrate particular observations discovered during the residency. Additional reference materials and Web sites have been included as well, to provide the reader with other sources of information necessary to implement Linux on pSeries clusters.
    Note: "December 2003.". - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xx, 385 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Mac OS ; Computer networks ; Security measures ; Computer security ; Macintosh (Computer) ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Mac OS X now operates on a UNIX engine. As such it is much more powerful than previous operating systems. It is now a multitasking, multithreaded, multi-user, and multiprocessor system with enhanced interoperability with other systems. Along with that increased power comes increased security vulnerability. Part I introduces readers to the basics of OS X security. Part II addresses system security beginning at the client workstation level. This section addresses UNIX-specific information such as permissions, executables, and network protocols and the related security concerns. Part III covers network security. The chapters in this section will cover security for internet services, file sharing, and network protection systems. Part IV addresses enterprise security using a variety of tools (Kerberos, NetInfo, and Rendezvous) as well as workstation configurations to illustrate how OS X Server and OS X inter-operate. The final section addresses auditing and forensics and what to do when an OS X network is compromised. This section teaches readers to audit systems painlessly and effectively and how to investigate and handle incidents.
    Note: Includes bibliographical references (p. 361-369) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 928 p. , ill. ; , 23 cm
    Edition: 4th ed.
    Series Statement: In a nutshell
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux in a Nutshell , now in its fourth edition, has won awards in the Linux community as the most indispensable book about Linux. It is an essential desktop reference for the commands that users of Linux utilize every day, with the depth of information and the practical, succinct "In a Nutshell" format that made the previous editions so popular. Comprehensive but concise, Linux in a Nutshell covers all substantial user, programming, administration, and networking commands for the most common Linux distributions. It's several quick references rolled into one: sed, gawk, RCS, CVS, vi, Emacs, bash, tcsh, regular expressions, package management, bootloaders, and desktop environments are all covered in this clear, to-the-point volume, along with core command-line utilities. The fourth edition continues to track the major changes in bootloaders, the GNOME and KDE desktops, and general Unix commands. Several commands related to CDs and music reflect the evolution of multimedia on Linux. Coverage has been added for GRUB, which has become the default bootloader on several Linux distributions, and for vim, the popular and feature-loaded extension to vi. The addition of several new options to the iptables firewall command and new commands related to DNSSEC and ssh show the book's value as a security tool. With this book, you no longer have to grope through long manpages and info documents for the information you need; you'll find it here in clear language and an easy-to-read format. Contents include: Programming, system administration, networking, and user commands with complete lists of options GRUB, LILO, and Loadlin bootloaders Shell syntax and variables for the bash, csh, and tcsh shells Pattern matching Emacs, vi, and vim editing commands sed and gawk commands The GNOME and KDE desktops and the fvwm2 window manager Red Hat and Debian package managers
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvi, 319 p. ; , 24 cm. +
    Edition: 3rd ed.
    DDC: 005.368/2
    Keywords: Linux ; Electronic books ; local
    Abstract: The Linux success story is well known: firmly established as an operating system in widespread use, its worldwide installations are still increasing at phenomenal rates. Much of this success has been on the server side, but more and more PC users are turning to Linux on the desktop, as well. For those grounded in Microsoft Windows or older versions of Apple's Macintosh OS, the first look at Unix-style operating system can be daunting. Learning Red Hat Linux provides a clear, no-nonsense introduction to the popular Red Hat distribution of Linux. The third edition of Learning Red Hat Linux will ease into the world of Linux, guiding you through the process of installing and running Red Hat Linux on your PC. Written in a friendly, easy-to-understand style, this book contains all you need to get started, including the complete Red Hat 8.0 distribution on CDs. With new tutorials covering OpenOffice Tools and the desktop, this book is excellent for first-time Linux users who want to install the operating system on a new PC or convert an existing system to Linux. Highlights of the book include: Preparing your system for installing Linux Installing and configuring your Linux system and the two popular desktop environments, GNOME and KDE Linux fundamentals: understanding the basic concepts Using Linux productivity tools like Open Office Configuring and administering a multi-user Linux system Connecting to the Internet Burn CDs and sync a PalmPilot Setting up a networked workstation Setting up Internet services Understand and write shell scripts so you can peek under the hood and extend the power of Linux Since the release of its first edition, Learning Red Had Linux has guided many a PC user into the world of Linux. By the time you've finished this book, you'll have set your computer to create nicely formatted documents, spreadsheets or even graphically appealing presentations, integrated your computer into your local network, set up your e-mail, and even accessed the Internet using the ISP of your choice. You'll need nothing else to get started.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 25 cm
    Series Statement: Prentice Hall PTR series in computer networking and distributed systems
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Electronic books ; local
    Abstract: Enterprise security for real netadmins in the real worldThis book shows how to secure an enterprise network in the real world--when you're on the front lines, constantly under attack, and you don't always get the support you need. Symantec security engineer and former UUNet network architect Allan Liska addresses every facet of network security, from risk profiling through access control, Web/email security through day-to-day monitoring. He systematically identifies today's most widespread security mistakes and vulnerabilities--and offers realistic solutions you can begin implementing right away.Coverage Includes: Quantifying security risks and "selling" security throughout the organization Defining security models that reflect your company's philosophy Translating your security model into effective, enforceable policies Making your routers and switches your first lines of network defense Controlling access via authentication, authorization, and accounting Configuring secure VPNs and remote access Securing wireless LANs and WANs Establishing a DMZ between your network and the public Internet Securing Web/application servers, DNS servers, email servers, and file/print servers Implementing effective day-to-day network security administration, monitoring, and logging Responding to attacks: detect, isolate, halt, report, and prosecute Liska integrates these techniques in an end-to-end case study, showing you how to redesign an insecure enterprise network for maximum security--one step at a time.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxvi, 322 p. , ill. ; , 25 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Standards ; Electronic information resources ; Access control ; Electronic books ; local
    Abstract: TCPA: Building computing platforms upon a solid foundation of trust. As businesses stake their very existence on the Internet, PCs, PDAs, and other key computing platforms, the trustworthiness of these platforms has become a vital concern. In response, the Trusted Computing Platform Alliance (TCPA) has delivered a complete specification for building trusted computing platforms atop trusted hardware. In Trusted Computing Platforms , leaders of the initiative illuminate TCPA for every systems developer and decision-maker. They place TCPA in context, outlining its goals, techniques, and powerful implications for the future. What trusted computing platforms are, how they work, and what problems they will solve Transforming standard platforms into trusted platforms cost-effectively Scenarios for managers: TCPA applications in the security-focused business Protected storage: how TCPA can ensure the confidentiality of stored data Software integrity: ensuring that a system's software environment hasn't been tampered with Trust mechanisms in a trusted platform: functional descriptions, advantages, and overhead Trusted platforms in practice: TCPA for developers and technical professionals How trusted platforms can be used to protect user privacy The TCPA initiative: its history, status, and next steps forward Backed by an extraordinary range of industry leaders, TCPA offers the first complete, cost-effective, and globally applicable solution for trusted computing. Whether you develop new systems or apply them in business or government, you need to understand this technology-and with this book, you will.
    Note: Includes bibliographical references (p. 305-308) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    Online Resource
    Online Resource
    Indianapolis, Ind. : Cisco | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 774 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Examinations ; Study guides ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Expert solutions for securing network infrastructures and VPNs Build security into the network by defining zones, implementing secure routing protocol designs, and building safe LAN switching environments Understand the inner workings of the Cisco PIX Firewall and analyze in-depth Cisco PIX Firewall and Cisco IOS Firewall features and concepts Understand what VPNs are and how they are implemented with protocols such as GRE, L2TP, and IPSec Gain a packet-level understanding of the IPSec suite of protocols, its associated encryption and hashing functions, and authentication techniques Learn how network attacks can be categorized and how the Cisco IDS is designed and can be set upto protect against them Control network access by learning how AAA fits into the Cisco security model and by implementing RADIUS and TACACS+ protocols Provision service provider security using ACLs, NBAR, and CAR to identify and control attacks Identify and resolve common implementation failures by evaluating real-world troubleshooting scenarios As organizations increase their dependence on networks for core business processes and increase access to remote sites and mobile workers via virtual private networks (VPNs), network security becomes more and more critical. In today's networked era, information is an organization's most valuable resource. Lack of customer, partner, and employee access to e-commerce and data servers can impact both revenue and productivity. Even so, most networks do not have the proper degree of security. Network Security Principles and Practices provides an in-depth understanding of the policies, products, and expertise that brings organization to this extremely complex topic and boosts your confidence in the performance and integrity of your network systems and services. Written by a CCIE engineer who participated in the development of the CCIE Security exams, Network Security Principles and Practices is the first book that provides a comprehensive review of topics important to achieving CCIE Security certification. Network Security Principles and Practices is a comprehensive guide to network security threats and the policies and tools developed specifically to combat those threats. Taking a practical, applied approach to building security into networks, the book shows you how to build secure network architectures from the ground up. Security aspects of routing protocols, Layer 2 threats, and switch security features are all analyzed. A comprehe...
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 70
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xx, 340 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Computers ; Access control ; Electronic books ; local
    Abstract: With over 100,000 installations, the Snort open-source network instrusion detection system is combined with other free tools to deliver IDS defense to medium - to small-sized companies, changing the tradition of intrusion detection being affordable only for large companies with large budgets. Until now, Snort users had to rely on the official guide available on snort.org. That guide is aimed at relatively experience snort administrators and covers thousands of rules and known exploits. The lack of usable information made using Snort a frustrating experience. The average Snort user needs to learn how to actually get their systems up-and-running. Snort Intrusion Detection provides readers with practical guidance on how to put Snort to work. Opening with a primer to intrusion detection and Snort, the book takes the reader through planning an installation to building the server and sensor, tuning the system, implementing the system and analyzing traffic, writing rules, upgrading the system, and extending Snort.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 71
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 198 p. , ill. ; , 24 cm
    DDC: 005.4/465
    Keywords: Solaris (Computer file) ; UNIX Shells ; Computer networks ; Security measures ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems. Covers the new Solaris Secure Shell for all versions of Solaris. Shows how to secure remote logins, integrate Secure Shell into existing scripts and avoid common problems. Written by Jason Reid, a member of the Solaris System Test group at Sun Microsystems, Inc.
    Note: "Sun Microsystems Press, A Prentice Hall Title". - Includes bibliographical references (p. 185-190) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 72
    Online Resource
    Online Resource
    Beijing : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 693 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Microsoft .NET ; Electronic books ; local
    Abstract: With the spread of web-enabled desktop clients and web-server based applications, developers can no longer afford to treat security as an afterthought. It's one topic, in fact, that .NET forces you to address, since Microsoft has placed security-related features at the core of the .NET Framework. Yet, because a developer's carelessness or lack of experience can still allow a program to be used in an unintended way, Programming .NET Security shows you how the various tools will help you write secure applications.The book works as both a comprehensive tutorial and reference to security issues for .NET application development, and contains numerous practical examples in both the C# and VB.NET languages. With Programming .NET Security , you will learn to apply sound security principles to your application designs, and to understand the concepts of identity, authentication and authorization and how they apply to .NET security. This guide also teaches you to: use the .NET run-time security features and .NET security namespaces and types to implement best-practices in your applications, including evidence, permissions, code identity and security policy, and role based and Code Access Security (CAS) use the .NET cryptographic APIs , from hashing and common encryption algorithms to digital signatures and cryptographic keys, to protect your data. use COM+ component services in a secure manner If you program with ASP.NET will also learn how to apply security to your applications. And the book also shows you how to use the Windows Event Log Service to audit Windows security violations that may be a threat to your solution.Authors Adam Freeman and Allen Jones, early .NET adopters and long-time proponents of an "end-to-end" security model, based this book on their years of experience in applying security policies and developing products for NASDAQ, Sun Microsystems, Netscape, Microsoft, and others. With the .NET platform placing security at center stage, the better informed you are, the more secure your project will be.
    Note: "Writing secure applications using C# or Visual Basic .NET"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 73
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 253 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Kerberos, the single sign-on authentication system originally developed at MIT, deserves its name. It's a faithful watchdog that keeps intruders out of your networks. But it has been equally fierce to system administrators, for whom the complexity of Kerberos is legendary.Single sign-on is the holy grail of network administration, and Kerberos is the only game in town. Microsoft, by integrating Kerberos into Active Directory in Windows 2000 and 2003, has extended the reach of Kerberos to all networks large or small. Kerberos makes your network more secure and more convenient for users by providing a single authentication system that works across the entire network. One username; one password; one login is all you need.Fortunately, help for administrators is on the way. Kerberos: The Definitive Guide shows you how to implement Kerberos for secure authentication. In addition to covering the basic principles behind cryptographic authentication, it covers everything from basic installation to advanced topics like cross-realm authentication, defending against attacks on Kerberos, and troubleshooting.In addition to covering Microsoft's Active Directory implementation, Kerberos: The Definitive Guide covers both major implementations of Kerberos for Unix and Linux: MIT and Heimdal. It shows you how to set up Mac OS X as a Kerberos client. The book also covers both versions of the Kerberos protocol that are still in use: Kerberos 4 (now obsolete) and Kerberos 5, paying special attention to the integration between the different protocols, and between Unix and Windows implementations.If you've been avoiding Kerberos because it's confusing and poorly documented, it's time to get on board! This book shows you how to put Kerberos authentication to work on your Windows and Unix systems.
    Note: "Covers Unix and Windows"--Cover. - "Cross-platform authentication & single-sign-on"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 74
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xviii, 672 p. , ill. ; , 24 cm
    Edition: 4th ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: You're about to begin your first Linux installation. Or, you may have been using Linux for years and need to know more about adding a network printer or configuring for ADSL. Running Linux , now in its fourth edition, is the book you'll want to reach for. Widely recognized in the Linux community as the getting-started book that people need, it answers the questions and tackles configuration issues that frequently plague users, but are seldom addressed in other books. Running Linux has everything you'll need to understand, install, and start using Linux. The book doesn't draw the line at the OS, or the shell, or the GUI, or even at the point of essential applications. Rather, the authors, experienced Linux enthusiasts, have anticipated problem areas, selected stable and popular solutions, and provided clear discussions and instructions to ensure that you'll have a satisfying experience using Linux. The discussion is direct and complete enough to guide novice users while still providing the additional information experienced users will need to progress in their mastery of Linux. The fourth edition of Running Linux delves deeper into installation, configuring the windowing system, system administration, and networking. New topics include applications ready for prime time, basic security and firewalling, package management on Debian, sound configuration, ADSL, the GNOME desktop, the Postfix mail transfer agent, and the popular LAMP configuration that combines Apache, MySQL, and PHP. A solid foundation text for any Linux user, the book also includes additional resources for dealing with special requirements imposed by hardware, advanced applications, and emerging technologies. Whether you are using Linux on a home workstation or maintaining a network server, Running Linux will provide expert advice just when you need it.
    Note: Previous eds. entered under Walsh. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 75
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 945 p. , ill. ; , 23 cm. +
    Edition: 4th ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Electronic books ; local
    Abstract: Maximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in computer and network security and provides them with techniques to take steps to protect their systems.
    Note: Includes bibliographical references (p. [731]-759) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 76
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xvii, 221 p. , ill. ; , 23 cm
    Edition: 1st ed.
    Parallel Title: Erscheint auch als
    DDC: 005.4/476
    Keywords: Linux ; Client/server computing ; Electronic books ; local
    Abstract: A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux server requires understanding not only the hardware, but the ins and outs of the Linux operating system along with its supporting cast of utilities as well as layers of applications software. There's basic documentation online but there's a lot beyond the basics you have to know, and this only comes from people with hands-on, real-world experience. This kind of "know how" is what we sought to capture in Linux Server Hacks . Linux Server Hacks is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. Every hack can be read in just a few minutes but will save hours of searching for the right answer. Some of the hacks are subtle, many of them are non-obvious, and all of them demonstrate the power and flexibility of a Linux system. You'll find hacks devoted to tuning the Linux kernel to make your system run more efficiently, as well as using CVS or RCS to track the revision to system files. You'll learn alternative ways to do backups, how to use system monitoring tools to track system performance and a variety of secure networking solutions. Linux Server Hacks also helps you manage large-scale Web installations running Apache, MySQL, and other open source tools that are typically part of a Linux system.O'Reilly's new Hacks Series proudly reclaims the term "hacking" for the good guys. Hackers use their ingenuity to solve interesting problems. Rob Flickenger is an experienced system administrator, having managed the systems for O'Reilly Network for several years. (He's also into community wireless networking and he's written a book on that subject for O'Reilly.) Rob has also collected the best ideas and tools from a number of other highly skilled contributors.Written for users who already understand the basics, Linux Server Hacks is built upon the expertise of people who really know what they're doing.
    Note: "100 industrial-strength tips & tools"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 77
    Online Resource
    Online Resource
    Sebastopol, Calif. : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 176 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; IEEE 802.11 (Standard) ; Wireless communication systems ; Security measures ; Electronic books ; local
    Abstract: Mention wireless networks, and the question of security will soon follow. It's not surprising that in spite of compelling business arguments for going wireless, many companies are holding back because of security concerns. But, while it's true that wireless networks create security issues that don't exist in wired networks, the issues are not insurmountable. 802.11 Security shows how you can plan for and successfully contend with security obstacles in your wireless deployment. This authoritative book not only explains the security issues, but shows you how to design and build a your own secure wireless network. 802.11 Security covers the entire process of building secure 802.11-based wireless networks, in particular, the 802.11b ("Wi-Fi") specification. The authors provide detailed coverage of security issues unique to wireless networking, such as Wireless Access Points (WAP), bandwidth stealing, and the problematic Wired Equivalent Privacy component of 802.11. You'll learn how to configure a wireless client and to set up a WAP using either Linux or Free BSD. You'll also find thorough information on controlling network access and encrypting client traffic. Beginning with an introduction to 802.11b in general, the book gives you a broad basis in theory and practice of wireless security, dispelling some of the myths along the way. In doing so, they provide you with the technical grounding required to think about how the rest of the book applies to your specific needs and situations. Next, the book details the technical setup instructions needed for both the Linux and FreeBSD operating systems. Some of the topics covered include: Station Security for Linux, FreeBSD, Open BSD, Mac OS X and Windows Setting Up Access Point Security Gateway Security, including building Gateways, firewall Rules, Auditing, etc. Authentication and Encryption FreeBSD IPsec client and gateway configuration Linux IPsec client and gateway configuration 802.1x authentication 802.11 Security is a book whose time has come. If you are a network, security, or systems engineer, or anyone interested in deploying 802.11b-based systems, you'll want this book beside you every step of the way.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 78
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xlvii, 1565 p. , ill. ; , 24 cm. +
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: A Practical Guide to Red Hat® Linux® 8 provides everyone--new users to experienced programmers--with the knowledge and skills they need to master Linux. Written by best-selling author Mark Sobell, this book is a clear, thorough, and logically organized tutorial and reference. Part I is a comprehensive tutorial that introduces the basics of GNU/Linux. It explains how to use the basic utilities, the filesystem, and many features of the shell command interpreter. Illustrations and step-by-step examples demonstrate how each command works. Part II covers more advanced topics, such as graphical user interfaces (GUIs), networking, text editors, programming tools, system administration, the new features of Red Hat Linux version 8, and the three major shells, including shell scripts. Part III is a detailed reference to more than 85 GNU/Linux utilities. This authoritative guide includes: Instructions for users and administrators covering security and RH features, including Red Hat Network (RHN), Red Hat system administration tools, and Red Hat Package Manager (RPM). A full chapter on the use and customization of the Red Hat default GNOME 2 desktop manager and the new Metacity window manager A full chapter on how to use and customize the KDE 3 desktop environment Lucid descriptions of utilities illustrated by many practical examples Detailed coverage of the Linux programming environment and tools, including the C compiler, make, and source code management In-depth discussion of networking and the Internet, including types of networks, secure network utilities, and distributed computing An emphasis on security issues throughout, including highlighted warnings and a dedicated appendix Extensive information and full-length examples about using shells interactively and as programming tools, with chapters on the Bourne Again Shell (bash), the TC Shell (tcsh), and the Z Shell (zsh) Appendixes covering regular expressions, online resources, security, and POSIX standards A comprehensive glossary of more than five hundred words and phrases Helpful features such as tips, cautions, and security alerts supplement the lessons of the text. The companion Web site (http://www.sobell.com) provides useful links, downloadable examples and illustrations, answers to selected review exercises, additional exercises and programs, and updates to the book. The accompanying CD-ROMs contain Red Hat Linux version 8.0. 0201703130B11262002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 79
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xviii, 600 p. , ill. ; , 24 cm
    DDC: 005.2/82
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: The definitive guide to Linux processes and IPC for programmers and system administrators Pipes, message queues, semaphores, shared memory, RPC, sockets, the /proc filesystem, and much more In-depth coverage of multithreading with POSIX compliant LinuxThreads Contains dozens of detailedprogram examples (GNU C/C++ 2.96/Red Hat Linux 7.3 & 8.0) Raves for Gray's companion UNIX® volume! "Concepts I only vaguely understood now make complete sense to me! The sample code and exercises are so good,they seem to clamp down on the concepts like a vise grip..."-S. Lee Henry, Johns HopkinsUniversity The expert, example-rich guide to Linuxprocesses and IPC Serious Linux software developers need a sophisticated understanding of processes, system level programming andinterprocess communication techniques. Now, John Shapley Gray, author of the widely praised Interprocess Communicationin UNIX, Second Edition, zeroes in on the core techniques Linux uses to manage processes and IPC. With exceptionalprecision and great clarity, Gray explains what processes are, how they're generated, how they access their environments,how they communicate- and how to use them to build robust, high-performance systems . Includes extensive coverage of named/unnamed pipes, message queues, semaphores, and shared memory. Provides C++ classes for System V IPC facilities. Offers an in-depth introduction to socket-basedcommunication. Demystifies Linux's /proc file system. Illuminates the LinuxThreads POSIX threadimplementation and its use in multithreaded applications. Provides valuable tips and warnings, plus insight intokey differences amongst Linux and Unix implementations. Includes problem sets and illustrations designed toreinforce key concepts. Gray presents dozens of standalone program examples; all compiled with the GNU C/C++ compiler 2.96 & 3.2, and fullytested on PC platforms running Red Hat Linux 7.3 & 8.0. http://authors.phptr.com/gray/
    Note: Includes bibliographical references (p. 587-590) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 80
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xxii, 391 p. , ill. ; , 24 cm
    DDC: 005.4/32
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Linux® is being adopted by an increasing number of embedded systems developers, who have been won over by its sophisticated scheduling and networking, its cost-free license, its open development model, and the support offered by rich and powerful programming tools. While there is a great deal of hype surrounding the use of Linux in embedded systems, there is not a lot of practical information. Building Embedded Linux Systems is the first in-depth, hard-core guide to putting together an embedded system based on the Linux kernel. This indispensable book features arcane and previously undocumented procedures for: Building your own GNU development toolchain Using an efficient embedded development framework Selecting, configuring, building, and installing a target-specific kernel Creating a complete target root filesystem Setting up, manipulating, and using solid-state storage devices Installing and configuring a bootloader for the target Cross-compiling a slew of utilities and packages Debugging your embedded system using a plethora of tools and techniques Details are provided for various target architectures and hardware configurations, including a thorough review of Linux's support for embedded hardware. All explanations rely on the use of open source and free software packages. By presenting how to build the operating system components from pristine sources and how to find more documentation or help, this book greatly simplifies the task of keeping complete control over one's embedded operating system, whether it be for technical or sound financial reasons.Author Karim Yaghmour, a well-known designer and speaker who is responsible for the Linux Trace Toolkit, starts by discussing the strengths and weaknesses of Linux as an embedded operating system. Licensing issues are included, followed by a discussion of the basics of building embedded Linux systems. The configuration, setup, and use of over forty different open source and free software packages commonly used in embedded Linux systems are also covered. uClibc, BusyBox, U-Boot, OpenSSH, thttpd, tftp, strace, and gdb are among the packages discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 81
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxxi, 492 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Web sites ; Security measures ; Electronic books ; local
    Abstract: "Both novice and seasoned readers will come away with an increased understanding of how Web hacking occurs and enhanced skill at developing defenses against such Web attacks. Technologies covered include Web languages and protocols, Web and database servers, payment systems and shopping carts, and critical vulnerabilities associated with URLs. This book is a virtual battle plan that will help you identify and eliminate threats that could take your Web site off line..." --From the Foreword by William C. Boni, Chief Information Security Officer, Motorola "Just because you have a firewall and IDS sensor does not mean you aresecure; this book shows you why." --Lance Spitzner, Founder, The Honeynet Project Whether it's petty defacing or full-scale cyber robbery, hackers are moving to the Web along with everyone else. Organizations using Web-based business applications are increasingly at risk. Web Hacking: Attacks and Defense is a powerful guide to the latest information on Web attacks and defense. Security experts Stuart McClure (lead author of Hacking Exposed ), Saumil Shah, and Shreeraj Shah present a broad range of Web attacks and defense. Features include: Overview of the Web and what hackers go after Complete Web application security methodologies Detailed analysis of hack techniques Countermeasures What to do at development time to eliminate vulnerabilities New case studies and eye-opening attack scenarios Advanced Web hacking concepts, methodologies, and tools "How Do They Do It?" sections show how and why different attacks succeed, including: Cyber graffiti and Web site defacements e-Shoplifting Database access and Web applications Java™ application servers; how to harden your Java™ Web Server Impersonation and session hijacking Buffer overflows, the most wicked of attacks Automated attack tools and worms Appendices include a listing of Web and database ports, cheat sheets for remote command execution, and source code disclosure techniques. Web Hacking informs from the trenches. Experts show you how to connect the dots--how to put the stages of a Web hack together so you can best defend against them. Written for maximum brain absorption with unparalleled technical content and battle-tested analysis, Web Hacking will help you combat potentially costly security threats and attacks. 0201761769B07192002
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 82
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xvii, 328 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/4769
    Keywords: Linux ; Operating systems (Computers) ; Routers (Computer networks) ; Electronic books ; local
    Abstract: Linux Routing explains and demonstrates routing solutions for common network types, namely LANs, WANs, and VPNs, using various types of hardware, and then explores the inner workings of the daemons and commands used for routing in Linux. The second half of the book revolves around specialized issues. These include building micro-kernels that provide additional routing speed and security; how routing is handled in a list of popular Linux distributions; security issues; traffic monitoring and control; and finally a variety of hardware and software packages available to those running or wanting to run Linux routers. Whether you need routing for a small, subnetted network or a larger scale project, Linux Routing will help you to understand the complexities that come with setting up dynamic routing for complex network configurations on a Linux box. Along the way you'll learn about some of the more popular protocols available and when they are best used, how to configure key routing daemons and what else is available, and how to set up routing and related services in a wide variety of situations.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 83
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvii, 490 p. , ill. ; , 23 cm
    Edition: 3rd ed.
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 84
    Online Resource
    Online Resource
    Upper Saddle River, NJ : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xv, 600 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Microsoft Windows (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Configuring, programming, and administering mixed Linux/Windows environments Practical Linux/Windows network design and implementation Covers all key interoperability issues Internet/intranet, directory services, backup/restore, security, remote access, file/print, and much more Enterprises depend increasingly on both Linux and Windows technologies to maximize the performance and value of their IT infrastructures. Now one book presents all of today's best practices for managing Linux and Windows together. In Linux and Windows Interoperability Guide , leading consultants Ed Bradford and Lou Mauget deliver comprehensive guidance for the entire IT lifecycle: network planning, configuration, deployment, application development, scripting, system administration, optimization, and much more. Includes up-to-the-minute coverage of Windows XP and Windows 2000 Covers every key Windows/Linux interoperability issue Delivering Web, intranet, and other TCP/IP-based services Providing remote access and thin-client support Managing software and user interface compatibility Integrating and streamlining backup and restore Designing enterprise domains for maximum performance and security Integrating directory services to provide single-sign-on and easy management Providing robust file and print services Linux and Windows Interoperability Guide -it's your total solutions resource for maximizing the reliability, performance, and cost-effectiveness of any Linux/Windows environment.
    Note: "Configuring, programming, and administering mixed Linux/Windows environments"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 85
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiv, 367 p. , ill. ; , 24 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: OpenSSL ; Computer network protocols ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Most applications these days are at least somewhat network aware, but how do you protect those applications against common network security threats? Many developers are turning to OpenSSL, an open source version of SSL/TLS, which is the most widely used protocol for secure network communications.The OpenSSL library is seeing widespread adoption for web sites that require cryptographic functions to protect a broad range of sensitive information, such as credit card numbers and other financial transactions. The library is the only free, full-featured SSL implementation for C and C++, and it can be used programmatically or from the command line to secure most TCP-based network protocols. Network Security with OpenSSL enables developers to use this protocol much more effectively. Traditionally, getting something simple done in OpenSSL could easily take weeks. This concise book gives you the guidance you need to avoid pitfalls, while allowing you to take advantage of the library?s advanced features. And, instead of bogging you down in the technical details of how SSL works under the hood, this book provides only the information that is necessary to use OpenSSL safely and effectively. In step-by-step fashion, the book details the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges.As a system or network administrator, you will benefit from the thorough treatment of the OpenSSL command-line interface, as well as from step-by-step directions for obtaining certificates and setting up your own certification authority. As a developer, you will further benefit from the in-depth discussions and examples of how to use OpenSSL in your own programs. Although OpenSSL is written in C, information on how to use OpenSSL with Perl, Python and PHP is also included.OpenSSL may well answer your need to protect sensitive data. If that?s the case, Network Security with OpenSSL is the only guide available on the subject.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 86
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xiii, 173 p. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Routers (Computer networks) ; Electronic books ; local
    Abstract: As a network administrator, auditor or architect, you know the importance of securing your network and finding security solutions you can implement quickly. This succinct book departs from other security literature by focusing exclusively on ways to secure Cisco routers, rather than the entire network. The rational is simple: If the router protecting a network is exposed to hackers, then so is the network behind it. Hardening Cisco Routers is a reference for protecting the protectors. Included are the following topics: The importance of router security and where routers fit into an overall security plan Different router configurations for various versions of Cisco?s IOS Standard ways to access a Cisco router and the security implications of each Password and privilege levels in Cisco routers Authentication, Authorization, and Accounting (AAA) control Router warning banner use (as recommended by the FBI) Unnecessary protocols and services commonly run on Cisco routers SNMP security Anti-spoofing Protocol security for RIP, OSPF, EIGRP, NTP, and BGP Logging violations Incident response Physical security Written by Thomas Akin, an experienced Certified Information Systems Security Professional (CISSP) and Certified Cisco Academic Instructor (CCAI), the book is well organized, emphasizing practicality and a hands-on approach. At the end of each chapter, Akin includes a Checklist that summarizes the hardening techniques discussed in the chapter. The Checklists help you double-check the configurations you have been instructed to make, and serve as quick references for future security procedures.Concise and to the point, Hardening Cisco Routers supplies you with all the tools necessary to turn a potential vulnerability into a strength. In an area that is otherwise poorly documented, this is the one book that will help you make your Cisco routers rock solid.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 87
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xviii, 752 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Computer networks ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. Advanced Linux Networking is designed to help you achieve a higher level of competence. It focuses on powerful techniques and features of Linux networking and provides you with the know-how you need to improve server efficiency, enhance security, and adapt to new requirements. This book begins with a brief introduction to low-level configuration, including a guide to getting your network up and running. Part II outlines those servers and procedures most likely to be used by the computers on your local network: DHCP servers, Kerberos, Samba, time servers, and network backups, among others. Part III covers Internet servers: DNS, SMTP (sendmail, Postfix, and Exim), Apache, and FTP servers. Part IV examines network security, exploring such topics as using a chroot jail, iptables configuration, and VPNs. Wherever pertinent, the author addresses the differences between Caldera OpenLinux, Debian GNU/Linux, Mandrake, Red Hat, Slackware, SuSE, and TurboLinux. Specific topics covered include: Configuring small but potentially important servers quickly and easily Optimizing Linux network operation Using advanced system features effectively Using systems and software in alternative ways to reach your goals Avoiding possible damage to your system and violations of ISP policies Securing your system Advanced Linux Networking is the single-volume tutorial and reference for Linux networking that will help you achieve expert status. 0201774232B05172002
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 88
    Online Resource
    Online Resource
    Upper Saddle River, N.J. : Prentice Hall PTR | Boston, MA :Safari,
    Language: English
    Pages: xxi, 583 p. ; , 23 cm
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Completely updated with hundreds of new examples! The only Linux reference with examples for every command All-new chapters on the Apache Web server, tc shell, and Emacs editor Organized by task, so you can find it fast! The practical, handy desk reference for every Linux user-now completely updated! Linux Desk Reference, Second Edition packs information about every command Linux users need-organized for maximum value and convenience. Scott Hawkins has updated entries throughout the book, and added four new chapters-including all-new coverage of the tc shell, Emacs editor, and Apache Web server. This friendly reference is organized by task so you can find what you need even if you don't know what it's called! Unlike other Linux references, this one delivers practical examples for every command it contains-plus hundreds of invaluable tips, warnings, diagrams, and sample outputs. And if you're a Linux expert, you'll love the "roadmap-style" alphabetical fast-find reference section! No matter what you need to know about Linux, it's here... Files and the filesystem Sessions, users, and groups Networking I/O, devices, and disks Apache Web services Windows connectivity Security X Window System Printers and print queues Text editors-including vi and Emacs The Linux kernel Scripting Email Comparing and merging files Scheduling Archiving and compression Performance monitoring Startup/shutdown Daemons Shells-including bash and tc Pattern matching Processes Diagnostics Tuning NIS/NFS Development resources And more! Whether you're a sysadmin, developer, power user, or newbie, get the most convenient, up-to-date Linux reference you can buy: Linux Desk Reference, Second Edition ! Praise for the first edition "Hawkins provides a superior combination of explanations, descriptions, and examples. Every Linux user, whether novice or experienced administrator, will value the organization and contents of the Linux Desk Reference." - SysAdmin magazine (Sept. 2000)
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 89
    Language: English
    Pages: xiv, 699 p. , ill. ; , 23 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Internet ; Security measures ; Electronic books ; local
    Abstract: Privacy Defended: Protecting Yourself Online is a comprehensive book that melds detailed, how-to information on PC hardware and operating system security within the context of protecting one's privacy in a digital world. It is designed for individuals who are serious about their privacy and who also want an accessible, one-stop source of practical information. The book offers clear discussion of privacy issues as they affect everyday users of digital devices, covering all current and near-future devices and technologies that pose privacy risks to users.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 90
    Online Resource
    Online Resource
    Boston : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: viii, 419 p. , ill. ; , 24 cm
    Keywords: Linux ; Embedded computer systems ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Embedded Linux will help the user: select an Embedded Linux platform based on hardware requirements; build and boot a custom Linux kernel for the platform; remote debug programs running on the platform using GNU tools; connect data acquisition and control electronics/peripherals using the platform's serial, parallel, USB, I/O port and I2C interfaces; interface the peripherals to the kernel and applications using modules; collect, control, store and present data via open source protocols and applications; and analyze Embedded Linux vendor product offerings.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 91
    Online Resource
    Online Resource
    Beijing ; : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xv, 430 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Linux ; Client/server computing ; Computer networks ; Security measures ; Web servers ; Electronic books ; local
    Abstract: Linux consistently turns up high in the list of popular Internet servers, whether it's for the Web, anonymous FTP, or general services like DNS and routing mail. But security is uppermost on the mind of anyone providing such a service. Any server experiences casual probe attempts dozens of time a day, and serious break-in attempts with some frequency as well. As the cost of broadband and other high-speed Internet connectivity has gone down, and its availability has increased, more Linux users are providing or considering providing Internet services such as HTTP, Anonymous FTP, etc., to the world at large. At the same time, some important, powerful, and popular Open Source tools have emerged and rapidly matured--some of which rival expensive commercial equivalents--making Linux a particularly appropriate platform for providing secure Internet services. Building Secure Servers with Linux will help you master the principles of reliable system and network security by combining practical advice with a firm knowledge of the technical tools needed to ensure security. The book focuses on the most common use of Linux--as a hub offering services to an organization or the larger Internet--and shows readers how to harden their hosts against attacks. Author Mick Bauer, a security consultant, network architect, and lead author of the popular Paranoid Penguin column in Linux Journal, carefully outlines the security risks, defines precautions that can minimize those risks, and offers recipes for robust security. The book does not cover firewalls, but covers the more common situation where an organization protects its hub using other systems as firewalls, often proprietary firewalls. The book includes: Precise directions for securing common services, including the Web, mail, DNS, and file transfer. Ancillary tasks, such as hardening Linux, using SSH and certificates for tunneling, and using iptables for firewalling. Basic installation of intrusion detection tools. Writing for Linux users with little security expertise, the author explains security concepts and techniques in clear language, beginning with the fundamentals. Building Secure Servers with Linux provides a unique balance of "big picture" principles that transcend specific software packages and version numbers, and very clear procedures on securing some of those software packages. An all-inclusive resource for Linux users who wish to harden their systems, the book covers general security as well as k...
    Note: "Tools & best practices for bastion hosts"--Cover. - Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 92
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: xx, 346 p. , ill. ; , 24 cm. +
    Edition: 2nd ed.
    DDC: 005.4/32
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With roughly 20 million users worldwide, Linux is the most talked about success story of open source and free software. Even devotees of Microsoft Windows and Apple's Macintosh are attracted by the unsurpassed stability and flexibility of Linux, but learning a Unix-style operating system can be a daunting task. The second edition of Learning Red Hat Linux gives newcomers exactly what they need to get started. The book includes a complete Linux system CD-ROM from Red Hat Software, one of the most popular distributions of Linux in the U.S. Once it guides beginners through the process of installing and configuring this software, the book offers a thorough but gentle introduction to the basics of using Red Hat Linux. This new edition has been "upgraded" to cover installation and configuration of Red Hat version 7.2, with improved sections on how to use the GNOME and KDE desktop environments, and how to use the Red Hat Package Manager (RPM). Highlights of Learning Red Hat Linux include: How to prepare your system for installing Linux How to install and configure Linux How to install and configure the X Window System How to use X and the GNOME and KDE desktop environments How to obtain and set up Linux applications How to set up a Linux system for networking, either on your local area network (LAN), or via a dialup connection to the Internet How to install and configure Linux-based servers, including the Apache web server and Samba for integrated file and print services with Windows-based networks How to understand and write shell scripts to extend the power of Linux How to install, upgrade, and remove packages using RPM
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 93
    Online Resource
    Online Resource
    Boston, MA : Addison-Wesley | Boston, MA :Safari,
    Language: English
    Pages: xxiii, 532 p. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Computer security ; Data encryption (Computer science) ; XML (Document markup language) ; Electronic books ; local
    Abstract: Extensible Markup Language (XML) is the environment of choice for creating many of today's technologically sophisticated and security-sensitive Web applications. With Secure XML, developers now have the hands-on guide they need to combine a strong foundation in XML with proven, practical techniques for enabling the secure transmission of data across the Web. Broad-based and comprehensive, Secure XML fully documents every feature and issue involved with XML security. Opening with a complete introduction to XML, the book then provides detailed coverage of authentication, canonicalization, keying, encryption, algorithms, and more. Notes, background information, guidelines, and "soapbox," or heretical comments, expand on the book's practical focus throughout. In all, this book features the most comprehensive roadmap to digital security and XML encryption available. Topics covered in-depth include: XML basics-documents, namespaces, structures, DTDs and schemas, and stylesheets XPath, XPointer, and SOAP Digital cryptography basics--secret and public key ciphers, asymmetric keys, digital signatures, and certificates XML canonicalization, signatures, and authentication XML encryption Key management and combining encryption with signatures Cryptographic algorithms and noncryptographic algorithms Detailed and practical, this book provides reliable solutions for securing XML and for safeguarding information flow across today's sophisticated Web. 0201756056B06262002
    Note: Includes bibliographical references (p.495-506) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 94
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly | Boston, MA :Safari,
    Language: English
    Pages: vi, 137 p. ; , 18 cm
    Edition: 1st ed.
    DDC: 005.4/4765
    Keywords: Linux ; UNIX (Computer file) ; Operating systems (Computers) ; Electronic books ; local
    Abstract: If you're a Unix system administrator, then the information you need every day just to get your job done could fill a book--a very large book. But, practically speaking, you don't want to stop and thumb through a weighty volume each time a problem arises. Your answer is the Essential System Administration Pocket Reference , the only system administration reference that fits in your pocket. Concise and easy-to-use, this little book is the portable companion to the classic Essential System Administration by AEleen Frisch. The Essential System Administration Pocket Reference is a quick reference to all the fundamental and essential tasks required to run such divergent Unix systems as Solaris, Linux, AIX, BSD, SuSe, Red Hat, and more. Beginners and experienced administrators alike will quickly be able to apply its principles and advice to solve everyday problems. The book is divided into three parts: Commands, Syntax and Their Applications, Configuration Files and Formats, and Operating System Specific Information. The information in this book is a must-have for any administrator or user of a Unix system. O'Reilly's Pocket References have become a favorite among technology professionals everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point and need to get to a solution quickly, the new Essential System Administration Pocket Reference is the book you'll want to have.
    Note: "Commands and file formats"--Cover. - Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 95
    Language: English
    Pages: xviii, 384 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.8
    Keywords: Compuer crimes ; Investigation ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: This book teaches readers what they need to know to not only set up an incident response effort, but also how to improve existing incident response efforts. The book provides a comprehensive approach to incident response, covering everything necessary to deal with all phases of incident response effectively ¿ spanning from pre-incident conditions and considerations to the end of an incident. Although technical considerations, (e.g. the particular binaries in Unix and Linux and dynamically linked libraries in Windows NT and Windows 2000) that need to be inspected in case they are corrupted, the types of logging data available in major operating systems and how to interpret it to obtain information about incidents, how network attacks can be detected on the basis of information contained in packets, and so on ¿ the major focus of this book is on managerial and procedural matters. Incident Response advances the notion that without effective management, incident response cannot succeed.
    Note: Includes bibliographical references (p. 342-353) and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 96
    Online Resource
    Online Resource
    Sebastopol, CA : O'Reilly & Associates | Boston, MA :Safari,
    Language: English
    Pages: x, 260 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Cisco IOS ; Computer networks ; Access control ; Computer networks ; Security measures ; Electronic books ; local
    Abstract: Cisco routers are used widely both on the Internet and in corporate intranets. At the same time, the Cisco Internet Operating System (IOS) has grown to be very large and complex, and Cisco documentation fills several volumes. Cisco IOS Access Lists focuses on a critical aspect of the Cisco IOS--access lists. Access lists are central to the task of securing routers and networks, and administrators cannot implement access control policies or traffic routing policies without them. Access lists are used to specify both the targets of network policies and the policies themselves. They specify packet filtering for firewalls all over the Internet. Cisco IOS Access Lists covers three critical areas: Intranets. The book serves as an introduction and a reference for network engineers implementing routing policies within intranet networking. Firewalls. The book is a supplement and companion reference to books such as Brent Chapman's Building Internet Firewalls. Packet filtering is an integral part of many firewall architectures, and Cisco IOS Access Lists describes common packet filtering tasks and provides a "bag of tricks" for firewall implementers. The Internet. This book is also a guide to the complicated world of route maps. Route maps are an arcane BGP construct necessary to make high level routing work on the Internet. Cisco IOS Access Lists differs from other Cisco router titles in that it focuses on practical instructions for setting router access policies. The details of interfaces and routing protocol settings are not discussed.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 97
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders Pub. | Boston, MA :Safari,
    Language: English
    Pages: xvi, 797 p. , ill. ; , 24 cm
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: With in-depth complete coverage on the installation process, editing and typesetting, graphical user interfaces, programming system administration, and managing Internet sites, Inside Linux is the only book "smart users" new to Linux will need. Many of the users new to Linux have an understanding of computer technology and will be looking for just the right reference to fit their sophisticated needs. This book guides users to a high level of proficiency with all the flavors of Linux, and help them with crucial system administration chores. Inside Linux is different than other books available because it's a unique blend of a how-to and a reference guide.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 98
    Online Resource
    Online Resource
    Indianapolis, Ind. : New Riders | Boston, MA :Safari,
    Language: English
    Pages: xxvii, 192 p. , ill. ; , 23 cm
    Edition: 1st ed.
    DDC: 005.4/469
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; local
    Abstract: Embedded Linux provides the reader the information needed to design, develop, and debug an embedded Linux appliance. It explores why Linux is a great choice for an embedded application and what to look for when choosing hardware.
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 99
    Online Resource
    Online Resource
    Indianapolis, Ind. : Sams | Boston, MA :Safari,
    Language: English
    Pages: xv, 533 p. , ill. ; , 24 cm
    DDC: 005.2/768
    Keywords: Linux ; Client/server computing ; Computer networks ; Operating systems (Computers) ; TCP/IP (Computer network protocol) ; Electronic books ; local
    Abstract: This book teaches readers how to program Linux sockets, and gives them everything they need to know to make programs communicate effetively over networks. It presents a comprehensive discussion of all relevant topics including: writing programs compatible with both Internet Protocol version 4 (IPv4) and IPv6, raw sockets, User Datagram Protocol (UDP), broadcasting /multicasting, server internals, and more, plus a section covering Posix threads. It provides thorough coverage of programming with the TCP, UDP, and IP protocols, as well as lower-level raw sockets. The myriad of function calls, data structures, and options associated with the APIs are explained with well-chosen diagrams and tables. After reading this book, the reader will be able to: Differentiate basic datagrams vs. streaming sockets. Differentiate unicast, broadcast, and multicast sockets. Write socket-based network programs. Write portable code for various OS'. Implement client-server and peer communications Increase network throughput using "connectionless" communications Manage asynchronous I/O, I/O and multiple sockets. Use signals, threading and processes to manage socket connections. Understand new socket technologies like Mbone and 6bone. Understand Remote Procedure Calls and how to implement them. Understand the different socket addressing types.
    Note: Includes index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 100
    Online Resource
    Online Resource
    Indianapolis, IN : Cisco Press | Boston, MA :Safari,
    Language: English
    Pages: xxi, 499 p. , ill. ; , 24 cm
    DDC: 005.8
    Keywords: Computer networks ; Security measures ; Internet ; Security measures ; Electronic books ; local
    Abstract: Must-have security strategies using Cisco's complete solution to network security The only book to cover interoperability among the Cisco Secure product family to provide the holistic approach to Internet security The first book to provide Cisco proactive solutions to common Internet threats A source of industry-ready pre-built configurations for the Cisco Secure product range Cisco Secure Internet Security Solutions covers the basics of Internet security, and then concentrates on each member of the Cisco Secure product family, providing a detailed explanation with examples of the preferred configurations required for securing Internet connections. The Cisco Secure PIX Firewall is covered in depth from an architectural point of view, and a reference of the PIX commands explains their use in the real world. Although Cisco Secure Internet Security Solutions is primarily concerned with Internet security, the information inside is also applicable to many general network security scenarios
    Note: Includes bibliographical references and index
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...