Skip to main content

Books in Multimedia

21-30 of 63 results in All results

Firewalls

  • 1st Edition
  • December 6, 2004
  • John Vacca + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 1 3 2 - 5
In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement firewall-to-firewall virtual private networks (VPNs). You will learn how to build a firewall to protect your network; provide access to HTTP and FTP services on the Internet, and implement publicly accessible servers without compromising security. Furthermore, throughout the book, extensive hands-on examples provide you with practical experience in establishing security with firewalls. Examples include, but are not limited to: Installing and configuring Check Point FireWall-1; scanning to validate configuration using ISS Internet Scanner; configuring the firewall to support simple and complex Web services; setting up a packet filtering router; enhancing firewall configurations to support split-DNS; authenticating remote users; and protecting browsers and servers with a proxy-based firewall.

Wireless Hacking: Projects for Wi-Fi Enthusiasts

  • 1st Edition
  • October 29, 2004
  • Lee Barken
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 7 8 - 4
Sales of wireless LANs to home users and small businesses will soar this year, with products using IEEE 802.11 (Wi-Fi) technology leading the way, according to a report by Cahners research. Worldwide, consumers will buy 7.3 million wireless LAN nodes--which include client and network hub devices--up from about 4 million last year. This third book in the "HACKING" series from Syngress is written by the SoCalFreeNet Wireless Users Group and will cover 802.11a/b/g (“Wi-Fi”) projects teaching these millions of Wi-Fi users how to "mod" and "hack" Wi-Fi access points, network cards, and antennas to run various Linux distributions and create robust Wi-Fi networks.Cahners predicts that wireless LANs next year will gain on Ethernet as the most popular home network technology. Consumers will hook up 10.9 million Ethernet nodes and 7.3 million wireless out of a total of 14.4 million home LAN nodes shipped. This book will show Wi-Fi enthusiasts and consumers of Wi-Fi LANs who want to modify their Wi-Fi hardware how to build and deploy “homebrew” Wi-Fi networks, both large and small.

Nessus Network Auditing

  • 1st Edition
  • October 14, 2004
  • Jay Beale + 3 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 6 2 - 0
This book focuses on installing, configuring and optimizing Nessus, which is a remote security scanner for Linux, BSD, Solaris, and other Unices. It is plug-in-based, has a GTK interface, and performs over 1200 remote security checks. It allows for reports to be generated in HTML, XML, LaTeX, and ASCII text, and suggests solutions for security problems. As with many open source programs, Nessus is incredibly popular, incredibly powerful, and incredibly under-documented. There are many Web sites (including nessus.org) where thousands of users congregate to share tips, tricks, and hints, yet no single, comprehensive resource exists. This book, written by Nessus lead developers, will document all facets of deploying Nessus on a production network.

The Mezonic Agenda: Hacking the Presidency

  • 1st Edition
  • September 23, 2004
  • Herbert Thomson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 4 0 - 8
The Mezonic Agenda deals with some of the most pressing topics in technology and computer security today including: reverse engineering, cryptography, buffer overflows, and steganography. The book tells the tale of criminal hackers attempting to compromise the results of a presidential election for their own gain. The accompanying CD contains real, working versions of all the applications described in the fictional narrative of the book. Computer users, programmers, IT professionals, and policy makers need to be made aware of the risks involved with deploying new technologies and see how attackers can leverage these technologies for their own purposes. While the story in The Mezonic Agenda is fictional, the technologies, exploits, and hacking techniques are all very real.

QuickTime Toolkit Volume One

  • 1st Edition
  • July 9, 2004
  • Tim Monroe
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 4 0 1 7 - 7
"When QuickTime application developers get stuck, one of the first places they look for help is example code from Tim Monroe. Finally, Tim's well-crafted examples and clear descriptions are available in book form—a must-have for anyone writing applications that import, export, display, or interact with QuickTime movies." —Matthew Peterson; University of California, Berkeley; the M.I.N.D. Institute; and author of Interactive QuickTimeQuickTime Toolkit Volume One is a programmer’s introduction to QuickTime, the elegant and potent media engine used by many of Apple's industry-leading services and products (such as the iTunes music store, iMovie, and Final Cut Pro) and also used by a large number of third-party applications. This hands-on guide shows you how to harness the powerful capabilities of QuickTime for your own projects. The articles collected here from the author's highly regarded column in MacTech Magazine are packed with accessible code examples to get you quickly started developing applications that can display and create state-of-the-art digital content. This book begins by showing how to open and display QuickTime movies in a Macintosh or Windows application and progresses step by step to show you how to control movie playback and how to import and transform movies and images. QuickTime Toolkit also shows how to create movies with video data, text, time codes, sprites, and wired (interactive) elements.Part of the official QuickTime Developer Series, publishing the finest books on QuickTime in cooperation with Apple.

The Best Damn Windows Server 2003 Book Period

  • 1st Edition
  • June 18, 2004
  • Debra Littlejohn Shinder + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 0 7 - 0
In keeping with past trends, full migration to this latest Microsoft Server Operating System will begin in earnest 12 months after its release, in mid-to-late 2004. This book will hit the market just as large enterprises begin the process of moving from Windows 2000 Server to Windows Server 2003. The title says everything you need to know about this book. No other book on the market combines this breadth and depth of coverage with the kind of product expertise and quality standard expected from Syngress. Every aspect of Planning, Installing, Configuring and Troubleshooting a Windows Server 2003 network is distilled and documented, with plenty of examples and illustrations. An unlike its competition, this is a book that was written from the ground up for Windows Server 2003.

IT Ethics Handbook:

  • 1st Edition
  • June 11, 2004
  • Stephen Northcutt + 2 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 8 2 - 1
The target audience for this book is any IT professional responsible for designing, configuring, deploying or managing information systems. This audience understands that the purpose of ethics in information security is not just morally important; it equals the survival of their business. A perfect example of this is Enron. Enron's ultimate failure due to a glitch in the ethics systems of the business created the most infamous example of an ethics corporate breakdown resulting in disaster. Ethics is no longer a matter of morals anymore when it comes to information security; it is also a matter of success or failure for big business.

Snort 2.1 Intrusion Detection, Second Edition

  • 1st Edition
  • June 6, 2004
  • Brian Caswell + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 0 9 9 - 2
Called "the leader in the Snort IDS book arms race" by Richard Bejtlich, top Amazon reviewer, this brand-new edition of the best-selling Snort book covers all the latest features of a major upgrade to the product and includes a bonus DVD with Snort 2.1 and other utilities.Written by the same lead engineers of the Snort Development team, this will be the first book available on the major upgrade from Snort 2 to Snort 2.1 (in this community, major upgrades are noted by .x and not by full number upgrades as in 2.0 to 3.0). Readers will be given invaluable insight into the code base of Snort, and in depth tutorials of complex installation, configuration, and troubleshooting scenarios. Snort has three primary uses: as a straight packet sniffer, a packet logger, or as a full-blown network intrusion detection system. It can perform protocol analysis, content searching/matching and can be used to detect a variety of attacks and probes. Snort uses a flexible rules language to describe traffic that it should collect or pass, a detection engine that utilizes a modular plug-in architecture, and a real-time alerting capability. A CD containing the latest version of Snort as well as other up-to-date Open Source security utilities will accompany the book.Snort is a powerful Network Intrusion Detection System that can provide enterprise wide sensors to protect your computer assets from both internal and external attack.

Managing and Securing a Cisco Structured Wireless-Aware Network

  • 1st Edition
  • April 13, 2004
  • David Wall
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 0 3 - 3
Managing and Securing a Cisco Structured Wireless-Aware Network is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, Managing and Securing a Cisco Structured Wireless-Aware Network also includes coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE).

Ethereal Packet Sniffing

  • 1st Edition
  • February 23, 2004
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 6 6 - 4
This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal. Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance.