Skip to main content

Books in Computer security

371-380 of 403 results in All results

Hack Proofing Windows 2000 Server

  • 1st Edition
  • November 1, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 4 - 2
The complete, authoritative guide to protecting your Windows 2000 Network"Essential reading for your IT security organization." -Deena Joyce, Director of Information Technology and Network Security, Casino Magic Pick up a newspaper or watch the evening news and you will find a major news story involving a breech of network security. Windows 2000, as the premier network platform, has many important security features but they are difficult to configure and manage. Hack Proofing Windows 2000 Server has totally up-to-date coverage of Service Pack 2 (SP2), Kerberos and Public Key Infrastructure and also addresses newer topics such as Virtual Private Networks (VPNs), remote access and web site security. The book also has complete coverage of Internet Information Server (IIS) release 5.

Hack Proofing Sun Solaris 8

  • 1st Edition
  • October 31, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 2 - 8
The only way to stop a hacker is to think like one! Sun Microsystem's venerable and well-respected operating system Solaris is currently in version 8, and runs on both Intel and Sun Hardware. Solaris is one of the most comprehensive and popular UNIX operating systems available. Hundreds of thousands of business enterprises, both small and large, depend on Sun Solaris to keep their business alive - but have they protected themselves against hackers? Hack Proofing Sun Solaris 8 is the latest addition to the popular Hack Proofing series from Syngress Publishing. Providing hands-on information written by both security professionals and self-proclaimed hackers, this book will give system administrators the edge they need to fortify their Sun Solaris operating system against the never-ending threat of hackers.

Handbook of Computer Crime Investigation

  • 1st Edition
  • October 22, 2001
  • Eoghan Casey
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 1 6 3 1 0 3 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 8 9 0 - 5
Following on the success of his introductory text, Digital Evidence and Computer Crime, Eoghan Casey brings together a few top experts to create the first detailed guide for professionals who are already familiar with digital evidence. The Handbook of Computer Crime Investigation helps readers master the forensic analysis of computer systems with a three-part approach covering tools, technology, and case studies. The Tools section provides the details on leading software programs, with each chapter written by that product's creator. The section ends with an objective comparison of the strengths and limitations of each tool. The main Technology section provides the technical "how to" information for collecting and analyzing digital evidence in common situations, starting with computers, moving on to networks, and culminating with embedded systems. The Case Examples section gives readers a sense of the technical, legal, and practical challenges that arise in real computer investigations.

Windows 2000 Active Directory

  • 2nd Edition
  • September 24, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 7 4 - 6
Updated coverage of the most confusing Windows 2000 component in this new edition of a Syngress bestseller.Active Directory Services dramatically changes the way IT professionals design, plan, configure and administer their Windows NT networks. The primary benefits of Active Directory Services are its extensibility, scalability, and ease of management as compared to prior generations of Windows NT. Systems Engineers will probably spend much of their time over the next several years planning for and deploying Active Directory Services in many different environments. Windows 2000 Active Directory, Second Edition gives IT professionals a head start; it provides updated coverage of everything they will need to succeed.

VB.Net Web Developer's Guide

  • 1st Edition
  • September 4, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 8 1 5 9 - 3
Visual Basic has long been the language of choice when designing Windows-based applications and the Web. Touted as both the most popular and productive computing language, Visual Basic has amassed quite a following of devoted programmers, and is a sought after programming skill. With the introduction of .NET Enterprise, Microsoft launch VB.NET, offering a streamlined, simplified version of Visual Basic language. With increased power, scalability, functionality and reliability, VB.NET is positioned to be the most productive tool in a programmer's toolbox. VB.NET Developer's Guide is written for previous Visual Basic Programmers looking to harness the power of the new features and functionality incorporated in Visual Basic.NET.

Configuring Windows 2000 without Active Directory

  • 1st Edition
  • September 4, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 2 - 8
Eliminate the hassles of Active Directory - install Windows 2000 without it! Windows 2000 is undoubtedly a great product. In one year after its release, Microsoft have sold have sold 10 million licenses. System administrators are praising its impressive abilities to coordinate Internet, intranet, extranets, and management applications creating a complete technical infrastructure. However, there has been a noticeable amount of organizations that are avoiding one of the most talked about features of Windows 2000 - Active Directory. The industry buzz is that Active Directory (although a great product) is a burden to implement and install and is not compatible with non Windows products like Solaris, NetWare and Linux. Configuring Windows 2000 WITHOUT Active Directory is a complete guide to installation and configuration of Windows 2000 (without Active Directory) for system administrators and network consultants. This book details not only the new features and functions of Windows 2000 but also how to integrate several features with existing Windows NT4 domains. The book does not cover the Active Directory function of Windows 2000.

Palm OS Web Application Developers Guide

  • 1st Edition
  • July 22, 2001
  • Ben Combee + 3 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 9 8 8 - 0
With an 80% hand-held device market-share, the Palm Organizer is the platform of choice for Mobile Internet application developers.With its decision to license the Palm OS to rival device manufacturers such as Sony, Motorola, and Handspring, Palm has further strengthened its claim as the industry standard for Mobile Computing architecture. Palm OS Web Application Developers Guide provides step-by-step instructions on how to migrate existing HTML to the Palm platform. The book will be useful for webmasters looking to convert current web pages. It is also ideal for C and Java programmers interested in building more dynamic applications from the ground up.

Designing A Wireless Network

  • 1st Edition
  • July 22, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 1 6 - 9
Business is on the move - mobile computing must keep up!Innovative technology is making the communication between computers a cordless affair. Mobile computing with laptops, hand helds and mobile phones is increasing the demand for reliable and secure wireless networks. Network engineers and consultants need to create and build cutting-edge wireless networks in both the small business and multi-million dollar corporations.Designing Wireless Networks provides the necessary information on how to design and implement a wireless network. Beginning with detailed descriptions of the various implementations and architectures of wireless technologies and moving to the step-by-step instructions on how to install and deploy a fixed wireless network; this book will teach users with no previous wireless networking experience how to design and build their own wireless network based on the best practices of the Enhanced Services from Lucent Technologies.

Hack Proofing Linux

  • 1st Edition
  • July 6, 2001
  • James Stanger + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 1 - 1
From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker

Hack Proofing Your Web Applications

  • 1st Edition
  • June 18, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 3 - 5
From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programsUnique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs