Security + Guide to Network Security Fundamentals, 3rd Edition
Course Technology | 2008 | ISBN: 1428340661 | 640 pages | PDF | 10,6 MB
Now in its third edition, the best-selling SECURITY+ GUIDE TO NETWORK SECURITY FUNDAMENTALS provides the most up-to-date industry information, reflecting the changes in security that have occurred since the most recent CompTIA Security+ objectives were created. The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam
This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
برچسب ها: Fundamentals، guide، network، Security،
CBT Nuggets Check Point Security CCSE R70 | ISO | 811.66 MB
Genre: Video Training
Systems administrators, Security Managers or Network Engineers with experience supporting Check Point security deployments will love this series.Bobby Meador shows you everything you need to know as you deploy high availability management servers; cluster firewalls to provide redundancy and disaster recovery; and implement SSL & IPSEC VPN technologies.
This training maps to the Check Point CCSE exam.
برچسب ها: CBT، CHECK، NUGGETS، POINT، Security،
S..gr..s | 2011-06-29 | ISBN: 1597496510 | 432 pages | PDF | 39 MB
Android is now the world’s most popular mobile device platform and still growing at an astonishing rate. Android Forensics provides a thorough review of the Android platform, including the core hardware and software components, file systems and data structures, data security considerations, a detailed review of forensic acquisition techniques and strategies for the subsequent analysis required. A heavy emphasis on open source tools and step-by-step examples are a primary focus on this book.
-Learn techniques to forensically acquire Android devices
-Includes information about Android applications needed for forensics investigations
-Entire chapter focused on Android Device, Data and App Security, which can assist not only forensic investigators but also for app developers and IT security managers
برچسب ها: android، google، Mobile، Security،
Video: wmv3 (yuv420p) .WMV | 10hours | Resolution: 640×480 | Audio: wma2, 44100 Hz, mono, 48 kb/s
Genre: eLearning | Language: English
This course increases the skills of the Java EE developers learning about Servlets and JavaServer Pages (JSP) using Eclipse. You will learn about servlet filters, event listeners, custom tags, and JSP tags. You will also take a look at more advanced Java EE programming concepts like security, annotations, and JavaServer Faces.Prerequisites: This course is intended for Java programmers who build server-side web applications in leveraging Eclipse to streamline their development cycle. You should understand essential concepts of object-oriented programming and should be able to write simple Java programs with assistance.
برچسب ها: AppDev، ee، Java، JavaServer، JSP، Security،
James C Foster, “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Codin
نوع مطلب :امنیت ،
برچسب ها: Security،
Bestselling author Bruce Schneier offers his expert guidance on achieving security on a network
Internationally recognized computer security expert Bruce Schneier offers a practical, straightforward guide to achieving security throughout computer networks. Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. This practical guide provides readers with a better understanding of why protecting information is harder in the digital world, what they need to know to protect digital information, how to assess business and corporate security needs, and much more.
برچسب ها: Security، Secrets and Lies، امنیت و دروغ ها،
William Stallings’ Cryptography and Network Security: Principles and Practice, 5e is a practical survey of cryptography and network security with unmatched support for instructors and students.
In this age of universal electronic connectivity, viruses and hackers, electronic eavesdropping, and electronic fraud, security is paramount. This text provides a practical survey of both the principles and practice of cryptography and network security. First, the basic issues to be addressed by a network security capability are explored through a tutorial and survey of cryptography and network security technology. Then, the practice of network security is explored via practical applications that have been implemented and are in use today. An unparalleled support package for instructors and students ensures a successful teaching and learning experience.
برچسب ها: network، Security،
The practical guide to simulating, detecting, and responding tonetwork attacks
- Create step-by-step testing plans
- Learn to perform social engineering and host reconnaissance
- Evaluate session hijacking methods
- Exploit web server vulnerabilities
- Detect attempts to breach database security
- Use password crackers to obtain access information
- Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
- Scan and penetrate wireless networks
- Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
- Test UNIX, Microsoft, and Novell servers for vulnerabilities
- Learn the root cause of buffer overflows and how to prevent them
- Perform and prevent Denial of Service attacks
برچسب ها: cisco، IPS، Networking، Security،
نوع مطلب :امنیت ،
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester’s Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you’ve built your foundation for penetration testing, you’ll learn the Framework’s conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks
برچسب ها: Metasploit، Security، Testing،
The Art of Enterprise Information Architecture: A Systems-Based Approach for Unlocking Business Insight
Tomorrow’s winning “Intelligent Enterprises” will bring together far more diverse sources of data, analyze it in more powerful ways, and deliver immediate insight to decision-makers throughout the organization. Today, however, most companies fail to apply the information they already have, while struggling with the complexity and costs of their existing information environments.
In this book, a team of IBM’s leading information management experts guide you on a journey that will take you from where you are today toward becoming an “Intelligent Enterprise.”
Drawing on their extensive experience working with enterprise clients, the authors present a new, information-centric approach to architecture and powerful new models that will benefit any organization. Using these strategies and models, companies can systematically unlock the business value of information by delivering actionable, real-time information in context to enable better decision-making throughout the enterprise–from the “shop floor” to the “top floor.”
برچسب ها: academy، advanced، Architecture، Business، Cloud، Data، Experience، guide، IBM، Management، Marketing، master، new، Performance، Security، Service، Software، Unlock، Unlocking، web،
In October 2000, the US National Institute of Standards and Technology selected the block cipher Rijndael as the AdvancedEncryption Standard (AES). AES is expected to gradually replace the present Data Encryption Standard (DES) as the most widely applied data encryption technology.|This book by the designers of the block cipher presents Rijndael from scratch. The underlying mathematics and the wide trail strategy as the basic design idea are explained in detail and the basics of differential and linear cryptanalysis are reworked. Subsequent chapters review all known attacks against the Rijndael structure and deal with implementation and optimization issues. Finally, other ciphers related to Rijndael are presented.|This volume is THE authoritative guide to the Rijndael algorithm and AES. Professionals, researchers, and students active or interested in data encryption will find it a valuable source of information and reference.
برچسب ها: Algorithm، Encryption، Secure، Security،
Prepare for the CEH certification exam with this official review guide and learn how to identify security risks to networks and computers. This easy-to-use guide is organized by exam objectives for quick review so you’ll be able to get the serious preparation you need for the challenging Certified Ethical Hacker certification exam 312-50. As the only review guide officially endorsed by EC-Council, this concise book covers all of the exam objectives and includes a CD with a host of additional study tools.
برچسب ها: Security، hacking، CEH،
CCNP Security SECURE 642-637 Official Cert Guide, focuses specifically on the objectives for the CCNP Security SECURE exam. Senior networking consultants Sean Wilkins and Trey Franklin share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.
برچسب ها: VPN، Security، cisco، CCNP،
Once you move beyond connecting to a simple home Wi-Fi network or using 3G data, you’ll want to read networking expert Glenn Fleishman’s discussion of how to integrate your iPad into more-complex networks and keep its data safe from prying eyes. Along with offering advice about Wi-Fi and 3G connections, Glenn explains how to protect your data in transit, and how to set up Bluetooth for various types of connections, including an iPhonepersonal hotspot, a wireless keyboard, and peer-to-peer pairing.
برچسب ها: Security، Take Contro، Networking، Ipad،
Beginning Database Design: From Novice to Professional, 2 edition جمعه 3 شهریور 1391
Fundamentals of Robotic Mechanical Systems: Theory, Methods, and Algorithms - 3rd edition جمعه 3 شهریور 1391
Ian H. Witten, “Data Mining: Practical Machine Learning Tools and Techniques” جمعه 3 شهریور 1391
Algorithms and Computation جمعه 3 شهریور 1391
Oracle Business Intelligence Enterprise Edition 11g: A Hands-On Tutorial شنبه 28 مرداد 1391
IBM Cognos Business Intelligence 10.1 Dashboarding Cookbook شنبه 28 مرداد 1391
Windows Phone 7.5: Building Location-aware Applications شنبه 28 مرداد 1391
Mastering Prezi for Business Presentations شنبه 28 مرداد 1391
Node Cookbook شنبه 28 مرداد 1391
Oracle Database XE 11gR2 Jump Start Guide پنجشنبه 26 مرداد 1391
Business Intelligence Cookbook: A Project Lifecycle Approach Using Oracle Technology پنجشنبه 26 مرداد 1391
Joomla! Search Engine Optimization پنجشنبه 26 مرداد 1391
Drupal 7 Cookbook پنجشنبه 26 مرداد 1391
لیست آخرین پستها