تبلیغات
Computer Book - مطالب ابر Security

Security+ Guide to Network Security Fundamentals, 3rd Edition

نوشته شده در تاریخ : شنبه 24 دی 1390   11:51 ب.ظ

215ac83875874706fea193a85879a76a5 Security+ Guide to Network Security Fundamentals, 3rd Edition

Security + Guide to Network  Security Fundamentals, 3rd Edition
Course Technology | 2008 | ISBN: 1428340661 | 640 pages | PDF | 10,6 MB

Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam

This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Fundamentals، guide، network، Security،

CBT Nuggets Check Point Security CCSE R70

نوشته شده در تاریخ : سه شنبه 13 دی 1390   09:27 ب.ظ

نوع مطلب :فیلم های آموزشی ،امنیت ،

 CBT Nuggets Check Point Security CCSE R70

CBT Nuggets Check Point Security CCSE R70 | ISO | 811.66 MB
Genre: Video Training

 Systems administrators, Security Managers or Network Engineers with experience supporting Check Point security deployments will love this series.Bobby Meador shows you everything you need to know as you deploy high availability management servers; cluster firewalls to provide redundancy and disaster recovery; and implement SSL & IPSEC VPN technologies.

This training maps to the Check Point CCSE exam.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: CBT، CHECK، NUGGETS، POINT، Security،

Android Forensics: Investigation, Analysis and Mobile Security for Google Android

نوشته شده در تاریخ : جمعه 25 آذر 1390   05:42 ب.ظ

 Android Forensics: Investigation, Analysis and Mobile Security for Google Android
Andrew Hoog, “Android Forensics: Investigation, Analysis and Mobile Security for Google Android”
S..gr..s | 2011-06-29 | ISBN: 1597496510 | 432 pages | PDF | 39 MB

Android is now the world’s most popular mobile device platform and still growing at an astonishing rate. Android Forensics provides a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus on this book.

-Learn techniques to forensically acquire Android devices
-Includes information about Android applications needed for forensics investigations
-Entire chapter focused on Android Device, Data and App Security, which can assist not only forensic investigators but also for app developers and IT security managers


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: android، google، Mobile، Security،

AppDev Java EE Programming Servlets JSP Security And JavaServer Faces

نوشته شده در تاریخ : جمعه 13 آبان 1390   11:52 ق.ظ

 AppDev Java EE Programming Servlets JSP Security And JavaServer Faces
AppDev Java EE Programming Servlets JSP Security And JavaServer Faces | 1.34 GB
Video: wmv3 (yuv420p) .WMV | 10hours | Resolution: 640×480 | Audio: wma2, 44100 Hz, mono, 48 kb/s
Genre: eLearning | Language: English

This course increases the skills of the Java EE developers learning about Servlets and JavaServer Pages (JSP) using Eclipse. You will learn about servlet filters, event listeners, custom tags, and JSP tags. You will also take a look at more advanced Java EE programming concepts like security, annotations, and JavaServer Faces.Prerequisites: This course is intended for Java programmers who build server-side web applications in leveraging Eclipse to streamline their development cycle. You should understand essential concepts of object-oriented programming and should be able to write simple Java programs with assistance.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: AppDev، ee، Java، JavaServer، JSP، Security،

James C Foster, “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Codin

نوشته شده در تاریخ : دوشنبه 25 مهر 1390   09:05 ب.ظ

نوع مطلب :امنیت ،

 James C Foster, Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding...
Publisher: Syngress | ISBN: 1597490059 | edition 2005 | PDF | 697 pages | 112,3 mb

The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.2. Sockets – The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same – communication over TCP and UDP, sockets are implemented differently in nearly ever language…


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security،

Secrets and Lies: Digital Security in a Networked World

نوشته شده در تاریخ : شنبه 9 مهر 1390   07:11 ب.ظ

نوع مطلب :شبکه ،امنیت ،

31389516431 Secrets and Lies: Digital Security in a Networked World

Book Description

Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network

Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، Secrets and Lies، امنیت و دروغ ها،

(Cryptography and Network Security: Principles and Practice (5th Edition

نوشته شده در تاریخ : یکشنبه 27 شهریور 1390   05:55 ب.ظ

نوع مطلب :امنیت ،شبکه ،

 Cryptography and Network Security: Principles and Practice (5th Edition)
Pren tice H all | 2010 | ISBN: 0136097049 | 744 pages | PDF | 8 MB

William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.

In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: network، Security،

Penetration Testing and Network Defense

نوشته شده در تاریخ : چهارشنبه 2 شهریور 1390   05:23 ب.ظ

نوع مطلب :امنیت ،شبکه ،

26511389672 Penetration Testing and Network Defense

Book Description

The practical guide to simulating, detecting, and responding to attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web  vulnerabilities
  • Detect attempts to breach database 
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems () and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: cisco، IPS، Networking، Security،

Metasploit: The Penetration Tester’s Guide

نوشته شده در تاریخ : یکشنبه 9 مرداد 1390   04:55 ب.ظ

نوع مطلب :امنیت ،

645682167130 Metasploit: The Penetration Tester’s Guide

Book Description

“The best guide to the  Framework.” —HD Moore, Founder of the  Project

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by  professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.

Once you’ve built your foundation for penetration , you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration  techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Metasploit، Security، Testing،

The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight

نوشته شده در تاریخ : شنبه 8 مرداد 1390   10:51 ب.ظ

نوع مطلب :Cloud ،شبکه ،توسعه وب ،

1132 The Art of Enterprise Information Architecture: A Systems Based Approach for Unlocking Business Insight

Book Description
 for the Intelligent Enterprise: Powerful  Ways to Maximize the Real-time Value of Information

Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of , analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.

In this book, a team of IBM’s leading information management experts  you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”

Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically  the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”

Coverage Includes


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: academy، advanced، Architecture، Business، Cloud، Data، Experience، guide، IBM، Management، Marketing، master، new، Performance، Security، Service، Software، Unlock، Unlocking، web،

The Design of Rijndael: AES – The Advanced Encryption Standard

نوشته شده در تاریخ : پنجشنبه 6 مرداد 1390   06:03 ب.ظ

1100 The Design of Rijndael: AES – The Advanced Encryption Standard

Book Description
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the Advanced Standard (AES). AES is expected to gradually replace the present Data  Standard (DES) as the most widely applied data  technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael  and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Algorithm، Encryption، Secure، Security،

CEH: Official Certified Ethical Hacker Review Guide (Exam 312-50)

نوشته شده در تاریخ : شنبه 1 مرداد 1390   01:58 ب.ظ

1639199973 CEH: Official Certified Ethical Hacker Review Guide (Exam 312 50)

Book Description

Prepare for the  certification exam with this official review guide and learn how to identify  risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، hacking، CEH،

CCNP Security Secure 642-637 Official Cert Guide

نوشته شده در تاریخ : شنبه 1 مرداد 1390   01:43 ب.ظ

64568216790 CCNP Security Secure 642 637 Official Cert Guide

Book Description

  SECURE 642-637 Official Cert Guide, focuses specifically on the objectives for the CCNP Security SECURE exam. Senior  consultants Sean Wilkins and Trey Franklin share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: VPN، Security، cisco، CCNP،

Take Control of iPad 2 Networking & Security

نوشته شده در تاریخ : جمعه 17 تیر 1390   03:06 ب.ظ

6456821675 Take Control of iPad 2 Networking & Security

Book Description

Once you move beyond connecting to a simple home Wi-Fi network or using  data, you’ll want to read  expert Glenn Fleishman’s discussion of how to integrate your  into more-complex networks and keep its data safe from prying eyes. Along with offering advice about Wi-Fi and 3G connections, Glenn explains how to protect your data in transit, and how to set up Bluetooth for various types of connections, including an personal hotspot, a wireless keyboard, and peer-to-peer pairing.


ادامه مطلب


نوشته شده توسط:محمد زحمتکش کناری


برچسب ها: Security، Take Contro، Networking، Ipad،