security etiketine sahip kayıtlar gösteriliyor. Tüm kayıtları göster
security etiketine sahip kayıtlar gösteriliyor. Tüm kayıtları göster

30 Ekim 2008 Perşembe

The Shellcoder's Handbook: Discovering and Exploiting Security Holes

Product Description

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application
New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista
Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored
The companion Web site features downloadable code files


Product Details
Paperback: 718 pages
Publisher: Wiley; 2 edition (August 20, 2007)
Language: English
ISBN-10: 047008023X
ISBN-13: 978-0470080238
Product Dimensions: 9.1 x 7.4 x 1.6 inches
http://rapidshare.com/files/62844460/Wiley.The.Shellcoders.Handbook.2nd.Edition.with.SOURCE.CODE.047008023X.zip

Cisco Router Firewall Security

Product Description

Harden perimeter routers with Cisco firewall functionality and features to ensure network security
Detect and prevent denial of service (DoS) attacks with TCP Intercept, Context-Based Access Control (CBAC), and rate-limiting techniques
Use Network-Based Application Recognition (NBAR) to detect and filter unwanted and malicious traffic
Use router authentication to prevent spoofing and routing attacks
Activate basic Cisco IOS filtering features like standard, extended, timed, lock-and-key, and reflexive ACLs to block various types of security threats and attacks, such as spoofing, DoS, Trojan horses, and worms
Use black hole routing, policy routing, and Reverse Path Forwarding (RPF) to protect against spoofing attacks
Apply stateful filtering of traffic with CBAC, including dynamic port mapping
Use Authentication Proxy (AP) for user authentication
Perform address translation with NAT, PAT, load distribution, and other methods
Implement stateful NAT (SNAT) for redundancy
Use Intrusion Detection System (IDS) to protect against basic types of attacks
Obtain how-to instructions on basic logging and learn to easily interpret results
Apply IPSec to provide secure connectivity for site-to-site and remote access connections
Read about many, many more features of the IOS firewall for mastery of router security
The Cisco IOS firewall offers you the feature-rich functionality that you've come to expect from best-of-breed firewalls: address translation, authentication, encryption, stateful filtering, failover, URL content filtering, ACLs, NBAR, and many others. Cisco Router Firewall Security teaches you how to use the Cisco IOS firewall to enhance the security of your perimeter routers and, along the way, take advantage of the flexibility and scalability that is part of the Cisco IOS Software package.
Each chapter in Cisco Router Firewall Security addresses an important component of perimeter router security. Author Richard Deal explains the advantages and disadvantages of all key security features to help you understand when they should be used and includes examples from his personal consulting experience to illustrate critical issues and security pitfalls. A detailed case study is included at the end of the book, which illustrates best practices and specific information on how to implement Cisco router security features.
Whether you are looking to learn about firewall security or seeking how-to techniques to enhance security in your Cisco routers, Cisco Router Firewall Security is your complete reference for securing the perimeter of your network.
This book is part of the Networking Technology Series from Cisco Press, which offers networking professionals valuable information for constructing efficient networks, understanding new technologies, and building successful careers.


Product Details
Paperback: 912 pages
Publisher: Cisco Press (August 20, 2004)
Language: English
ISBN-10: 1587051753
ISBN-13: 978-1587051753
Product Dimensions: 9.1 x 7.4 x 2.1 inches
http://ifile.it/3jnu9v

13 Ekim 2008 Pazartesi

RFID Security and Privacy: Concepts, Protocols, and Architectures

Product Description

The vision of a world in which privacy persists and security is ensured but the full potential of the technology is nevertheless tapped guides this work. It is argued that security and privacy can be ensured using technical safeguards if the whole RFID system is designed properly. The challenge is immense since many constraints exist for providing security and privacy in RFID systems: technically and economically but also ethically and socially. Not only security and privacy needs to be provided but the solutions also need to be inexpensive, practical, reliable, scalable, flexible, inter-organizational, and lasting


After analyzing the problem area in detail, this work introduces a number of new concepts and protocols that provide security and ensure privacy in RFID systems by technical means. The classic RFID model is extended and considerations in new directions are taken. This leads to innovative solutions with advantageous characteristics. Finally, a comprehensive framework including required protocols for operation is proposed. It can be used within a global scope, supports inter-organizational cooperation and data sharing, and adheres to all the architectural guidelines derived in this work. Security and privacy is provided by technical means in an economic manner. Altogether, the goal of building scalable and efficient RFID systems on a global, inter-organizational scale without neglecting security and privacy has been achieved well

Product Details
Hardcover: 270 pages
Publisher: Springer; 1 edition (May 29, 2008)
Language: English
ISBN-10: 3540790756
ISBN-13: 978-3540790754
Product Dimensions: 9.3 x 6.3 x 0.9 inche

http://www.megaupload.com/?d=I8QR26Z0

12 Ekim 2008 Pazar

Implementing Email and Security Tokens: Current Standards, Tools, and Practices

Editorial Reviews

Product Description
It's your job to make email safe.

Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.

Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys From the Back CoverIt's your job to make email safe.

Where do you start?
In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the person charged with implementing that email security strategy, this book is for you. Backed with case studies, it offers the nuts-and-bolts information you need to understand your options, select products that meet your needs, and lock down your company's electronic communication systems.
Review how email operates and where vulnerabilities lie
Learn the basics of cryptography and how to use it against invaders
Understand PKI (public key infrastructure), who should be trusted to perform specific tasks, how PKI architecture works, and how certificates function
Identify ways to protect your passwords, message headers, and commands, as well as the content of your email messages
Look at the different types of devices (or "tokens") that can be used to store and protect private keys


Product Details
Hardcover: 296 pages
Publisher: Wiley (May 12, 2008)
Language: English
ISBN-10: 0470254637
ISBN-13: 978-0470254639
Product Dimensions: 9.2 x 7.4 x 0.9 inches




http://rapidshare.com/files/140598370/Wiley.Implementing.Email.and.Security.Tokens.May.2008.eBook-BBL.rar

11 Ekim 2008 Cumartesi

Security in Distributed, Grid, Mobile, and Pervasive Computing

Product Description
Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol.
After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field

Product Details
Hardcover: 440 pages
Publisher: Auerbach Publications; 1 edition (April 17, 2007)
Language: English
ISBN-10: 0849379210
ISBN-13: 978-0849379215
Product Dimensions: 9.3 x 6.2 x 1.1 inches

http://rapidshare.com/files/59496136/Auerbach_.Security.in.Distributed.Grid.Mobile_2007_.BBL._0849379210_.pdf.7z

http://rapidshare.com/files/59371247/0849379210.rar