Skip to main content

Books in Computer security

381-390 of 403 results in All results

ASP Configuration Handbook

  • 1st Edition
  • June 8, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 5 9 3 - 6
Understanding ASPs: The new Internet business.Application Service Providers (ASPs) appeal to small businesses by offering a wide variety of web-hosted software programs including e-commerce, communications, project management, financial, word processing and human resourse applications. ASPs offer inexpensive use of software and the ability to share access among people in different locations. There is a huge buzz in the computing industry about ASPs and many ISPs (Internet Service Providers) are gearing up to become ASPs. These companies are in need of a guide - this is the first book to focus on how a company can become an ASP.ASP Configuration Handbook: A Guide for ISPs covers all the business issues surrounding the transformation of an Internet Service Provider to an Application Service Provider, as well as the technical issues associated with offering applications to customers.

Hack Proofing Your E-commerce Web Site

  • 1st Edition
  • May 15, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 0 - 4
From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks

Configuring ISA Server 2000

  • 1st Edition
  • May 11, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 7 - 3
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators with an in depth understanding of all the critiacl features of Microsoft's flag ship Internet Server. Configuring ISA Server 2000 shows network administrators how to connect a network to the Internet, maintain the connection, and troubleshoot remote users' hardware and software configuration problems.

configuring exchange server 2000

  • 1st Edition
  • March 12, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 5 - 9
E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email security and implementation of email within multinational companies.

Configuring Cisco AVVID

  • 1st Edition
  • February 8, 2001
  • Wayne Lawson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 3 - 5
What is AVVID?Previously called Configuring Cisco Communications Networks (CCN), Architecture for Voice, Video, and Integrated Data (AVVID) is the latest development from Cisco Systems that will soon redefine the way businesses communicate. AVVID allows businesses to transmit voice, data, and video over one combined architecture, whereas in the past, three separate systems were required. Configuring Cisco AVVID will be the first book to discuss the components of the AVVID architecture and will be timed to release with the launch of the technology in early 2000.A practical guide to the AVVID technology this book will include an introduction to AVVID, and its software, hardware, network architecture, installation, operation and configuration. Topics include CallManager, Cisco Gateways, and IPCC (Cisco IP Contact Center).

Designing SQL Server 2000 Databases

  • 1st Edition
  • January 23, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 1 9 - 0
The Microsoft .NET initiative is the future of e-commerce - making it possible for organisations to build a secure, reliable e-commerce infrastructure. This is the first book to outline the capabilities of SQL Server 2000, one of the key components of .NET. SQL Server 2000 introduces powerful new data mining functionality designed specifically to capture and process customer profiles and to predict future buying patterns on e-commerce sites.Designing SQL Server 2000 Databases addresses the needs of IT professionals migrating from the popular SQL 7 databases to the new SQL 2000, as well as those who are starting from scratch.

Building Cisco Remote Access Networks

  • 1st Edition
  • November 15, 2000
  • Wayne Lawson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 1 4 - 8
An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.

E-Mail Virus Protection Handbook

  • 1st Edition
  • November 6, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 7 5 3 - 4
The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer.

Building CISCO Networks for Windows 2000

  • 1st Edition
  • October 17, 2000
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 1 3 - 1
Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.