Skip to main content

Syngress

  • Mission Critical Internet Security

    • 1st Edition
    • January 4, 2001
    • Syngress
    • English
    Increase Security on an IP NetworkContinuing the "Mission Critical" series, this book provides crucial coverage of network security topics that IT professionals can't afford to be without. In the past year several Internet retailers, including Amazon.com have been hacked into and put out of service. Even large-scale enterprise networks where security is at a supposed high-level are at risk. Because of the increase in network attacks, the need for information on network security is at an all-time high.Mission Critical(tm) Internetworking Security focuses on Internet Protocol, or IP security. IP technologies are the foundation of the Internet and understanding their associated security risks is key for IT professionals. This book shows readers how to increase security on IP networks and what to do when security is threatened.
  • Configuring Citrix Metaframe for Windows 2000 Terminal Services

    • 1st Edition
    • December 6, 2000
    • Melissa Craft
    • English
    Configuring Citrix Metaframe for Windows 2000 Terminal Services describes all the means in using both Microsoft Windows 2000 Terminal Services and Citrix MetaFrame in an environment. The book specifically covers ways on designing the infrastructure, implementing the plan, troubleshooting the deployment, and configuring servers and clients. The text also explains the process of deploying applications over the Internet, monitoring end users, and securing applications and data. The book also directs how to improve applications' performance with thin clients.
  • Managing Cisco Network Security

    • 1st Edition
    • November 27, 2000
    • Florent Parent
    • English
  • Building Cisco Remote Access Networks

    • 1st Edition
    • November 15, 2000
    • Wayne Lawson
    • English
    An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.
  • E-Mail Virus Protection Handbook

    Protect Your E-mail from Trojan Horses, Viruses, and Mobile Code Attacks
    • 1st Edition
    • November 6, 2000
    • Syngress
    • English
    The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.
  • Building CISCO Networks for Windows 2000

    • 1st Edition
    • October 17, 2000
    • Syngress
    • English
    Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.
  • Mission Critical Windows 2000 Server Administration

    • 1st Edition
    • September 27, 2000
    • Syngress
    • English
    Announcing the "Mission Critical" series from Syngress Media - providing crucial coverage of the topics necessary for IT professionals to perform and succeed on the job. Mission Critical Windows 2000 Server Administration cuts to the chase and provides system administrators with the most important features of the operating system. There's no "hand-holding", no basic definitions of functions, no step-by-step guidelines - just high-level coverage of the critical components of Windows 2000 that system administrators must know.
  • Hack Proofing Your Network

    • 1st Edition
    • July 25, 2000
    • Ryan Russell
    • English
  • DBAs Guide to Databases Under Linux

    • 1st Edition
    • April 26, 2000
    • Syngress
    • English
    In an effort to increase its marketshare and threat to Windows NT, Oracle8 was ported to Linux in late 1998, opening the popular database to an additional 10 million Linux users worldwide. The availability of Oracle8 enables current Linux users to deploy enterprise-class applications at low cost and provides an alternative to Microsoft Windows NT. This book covers that marriage of the most popular database and the fastest growing operating system.
  • Troubleshooting Windows 2000 TCP/IP

    • 1st Edition
    • March 28, 2000
    • Syngress
    • English
    TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is "supposed" to work is not enough for today's network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP network. This book focuses specifically on identifying problem areas, including identifying and correcting protocol errors, DNS route problems, application faults and slow response times.Syngress have sold over 700,000 Microsoft and Cisco certification guides in the last two years. Most of the administrators buying these will be interested in this book.