Zen and the Art of Information Security
Posted By : denyed |
Date : 02 May 2022 08:53 |
Comments : 2
Ira Winkler, «Zen and the Art of Information Security»
Syngress Publishing | ISBN 1597491683 | 2022-03-01 | PDF | 5 Mb | 224 pages
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable taking very simple actions to secure themselves.
Cisco: A Beginner's Guide, Fourth Edition
Posted By : pariman |
Date : 01 May 2022 16:43 |
Comments : 6
Toby Velte, Anthony Velte, "Cisco: A Beginner's Guide, Fourth Edition"
McGraw-Hill Osborne Media | ISBN 0072263830 | November 17, 2021 | PDF | 696 pages | 28.6MB
You generally can't pick up knowledge of Cisco products casually, the way you can learn about Microsoft Windows, Unix, and other products that are more generally accessible. For this reason, Cisco: A Beginner's Guide performs a valuable service. It introduces internetworking novices to the language and fact base that underlie routers, switches, network protocols, and the rest of the Internet's infrastructure. True enough, no book can teach you everything you need to know about a subject as complex as internetworking, but this one does a great job of giving you the background you need to perform well in a class or do hands-on experiments intelligently.
Security for Wireless Ad Hoc Networks
Posted By : pariman |
Date : 01 May 2022 16:28 |
Comments : 2
Farooq Anjum, Petros Mouchtaris, "Security for Wireless Ad Hoc Networks"
Wiley-Interscience | ISBN 0471756881 | February 16, 2022 | PDF | 247 pages | 3.3MB
This book addresses the problems and brings solutions to the security issues of ad-hoc networks. Topics included are threat attacks and vulnerabilities, basic cryptography mechanisms, authentication, secure routing, firewalls, security policy management, and future developments. An Instructor Support FTP site is available from the Wiley editorial board.
Computer Privacy Annoyances
Posted By : rissvann |
Date : 29 Apr 2022 17:39 |
Comments : 2
Computer Privacy Annoyances | By Dan Tynan
Publisher: O'Reilly | Pub Date: July 2005 | ISBN: 0-596-00775-2 | Pages: 190 | 5.5 MB
From the moment you're born, you enter the data stream-from birth certificates to medical records to what you bought on Amazon last week. As your dossier grows, so do the threats, from identity thieves to government snoops to companies who want to sell you something. Computer Privacy Annoyances shows you how to regain control of your life. You'll learn how to keep private information private, stop nosy bosses, get off that incredibly annoying mailing list, and more. Unless you know what data is available about you and how to protect it, you're a sitting duck. Computer Privacy Annoyances is your guide to a safer, saner, and more private life
Snort Intrusion Detection and Prevention Toolkit
Posted By : ertugrul ergun |
Date : 23 Apr 2022 15:45 |
Comments : 1
B.Caswell, J.Beale, A.Baker, "Snort Intrusion Detection and Prevention Toolkit (Jay Beale's Open Source Security)"
Syngress Publishing | ISBN / ASIN:1597490997 | 2007 | 750 pages | PDF | 7.2MB
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team. This book covers everything from packet inspection to optimizing Snort for speed to using the most advanced features of Snort to defend even the largest and most congested enterprise networks. Leading Snort experts Brian Caswell, Andrew Baker, and Jay Beale analyze traffic from real attacks to demonstrate the best practices for implementing the most powerful Snort features.
PC Magazine Windows Vista Security Solutions
Posted By : pariman |
Date : 19 Apr 2022 05:21 |
Comments : 2
Dan DiNicolo, "PC Magazine Windows Vista Security Solutions"
Wiley | ISBN 0470046562 | January 23, 2022 | PDF | 338 pages | 20.4MB
Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills
Posted By : pariman |
Date : 16 Apr 2022 22:43 |
Comments : 0
Michael Gregg, David Miller, "Security Administrator Street Smarts: A Real World Guide to CompTIA Security+ Skills"
Sybex | ISBN 0470102586 | February 5, 2022 | PDF | 424 pages | 7MB
Hit the ground running with the street-smart training you'll find in this practical book. Using a "year in the life" approach, it gives you an inside look at the common responsibilities of security administrators, with key information organized around the actual day-to-day tasks, scenarios, and challenges you'll face in the field.
Best Internet Links
Posted by :: Alex | Date :: Aug 20, 2021 19:05:00 | [ 34 comments ]
CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50
Posted By : pariman |
Date : 16 Apr 2022 22:38 |
Comments : 2
Kimberly Graves, "CEH: Official Certified Ethical Hacker Review Guide: Exam 312-50"
Sybex | ISBN 0782144373 | February 27, 2022 | PDF | 238 pages | 3.2MB
Learn how to identify security risks to networks and computers and get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. The only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
Mark Minasi and Byron Hynes, «Administering Windows Vista Security: The Big Surprises»
Posted By : Spymaker |
Date : 15 Apr 2022 08:46 |
Comments : 5
Mark Minasi and Byron Hynes, «Administering Windows Vista Security: The Big Surprises»
Publisher: Sybex | Dec 2006 | ISBN:9780470108321 | Pages: 288 | CHM | 8.5 MB
Get an early start on Windows Vista security and the technology shifts you'll need to know as a systems administrator. From leading Windows expert Mark Minasi comes this "just-in-time" book to get you there. This targeted, hands-on guide takes a rapid-fire approach to the biggest security changes and how they'll affect business as usual for those who must integrate and provide technical support for Windows Vista. You'll find practical instruction, tips, workarounds, and much more.
Encyclopedia of Cryptography and Security
Posted By : misterbean |
Date : 06 Apr 2022 11:41 |
Comments : 2
Encyclopedia of Cryptography and Security by Henk C.A. van Tilborg
Springer | ISBN: 038723473X | 2005 | 684 pages | PDF | 9 MB
Maximum Security: Fourth Edition
Posted By : TooT |
Date : 31 Mar 2022 20:18 |
Comments : 2
Maximum Security: Fourth Edition
Sams; 4th edition | ISBN-10: 0672324598 | 976 pages | December 16, 2021 | CHM
Security is an enormous task, the amount of information in this book, both written and referenced, is intimidating. Furthermore, the reality that it is necessary for your survival can raise your blood pressure and the number of hours you lay awake at night. Fortunately, it is not necessary to do it all at once and there are software tools that can make the scanning for security problems much easier.
Algebraic Aspects of the Advanced Encryption Standard
Posted By : Alexpal |
Date : 27 Mar 2022 01:01 |
Comments : 1
Algebraic Aspects of the Advanced Encryption Standard (Advances in Information Security) by Carlos Cid (Author), Sean Murphy (Author), Matthew Robshaw (Author)
Publisher: Springer; 1 edition (September 6, 2021) | ISBN-10: 0387243631 | PDF | 6 Mb | 164 pages
The Belgian block cipher Rijndael was chosen in 2000 by the U.S. government's National Institute of Standards and Technology (NIST) to be the successor to the Data Encryption Standard. Rijndael was subsequently standardized as the Advanced Encryption Standard (AES), which is potentially the world's most important block cipher. In 2002, some new analytical techniques were suggested that may have a dramatic effect on the security of the AES. Existing analytical techniques for block ciphers depend heavily on a statistical approach, whereas these new techniques are algebraic in nature.
Practical Hacking Techniques and Countermeasures
Posted By : pariman |
Date : 25 Mar 2022 19:29 |
Comments : 6
Mark D. Spivey, «Practical Hacking Techniques and Countermeasures»
AUERBACH | ISBN 0849370574 | November 2, 2021 | PDF | 737 pages | 70.2 MB
Practical Hacking Techniques and Countermeasures examines computer security from the hacker's perspective, demonstrating how a computer system can be successfully attacked and compromised. This book shows how an attack is conceptualized, formulated and performed. With the VMware Workstation software package available on the accompanying CD, it uses virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It offers examples of attacks on Windows and Linux. It also covers such topics as footprinting, scanning, sniffing, passwords, and other attack tools. This text provides valuable information for constructing a system to defend against attacks.
Cryptography in C and C++ by Michael Welschenbach, David Kramer
Posted By : webgurru |
Date : 25 Mar 2022 01:54 |
Comments : 4
Cryptography in C and C++ by Michael Welschenbach, David Kramer
Apress | 19 March, 2001 | ISBN: 189311595X | CHM | 432 pages | 3.57 MB
Cryptography in C and C++ mainly focuses on the practical aspects involved in implementing public key cryptography methods, such as the RSA algorithm that was recently released from patent protection. It also gives both a technical overview and an implementation of the Rijndael algorithm that was selected as the Advanced Encryption Standard by the U.S. government. Author Michael Welschenbach avoids complexities by explaining cryptography and its mathematical basis in terms a programmer can easily understand.
Encyclopedia of Cryptology (re-link)
Posted By : ertugrul ergun |
Date : 22 Mar 2022 03:54 |
Comments : 1
Encyclopedia of Cryptology by David E. Newton
ABC-Clio Inc | ISBN 0874367727 | 1997 Year | 330 Pages | CHM | 2,3 Mb
Grade 9 UpAA thorough introduction to the history of cryptology that explains the fundamental concepts of this science. Newton provides concise, easy-to-read definitions of terms, topics, and personalities pertinent to the history of encoded messages. Entries are arranged alphabetically and often include cross-references and suggestions for further reading. Black-and-white illustrations, photographs, and charts assist in the comprehension of terms. While there are many books aimed at certain aspects of this topic, none of them do as good a job of presenting a comprehensive yet accessible overview of secret-message writing throughout ancient and modern times.