Skip to main content

Books in Security

571-580 of 613 results in All results

Hack Proofing Linux

  • 1st Edition
  • July 6, 2001
  • James Stanger + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 1 - 1
From the authors of the bestselling E-Mail Virus Protection Handbook!The Linux operating system continues to gain market share based largely on its reputation as being the most secure operating system available. The challenge faced by system administrators installing Linux is that it is secure only if installed and configured properly, constantly and meticulously updated, and carefully integrated with a wide variety of Open Source security tools. The fact that Linux source code is readily available to every hacker means that system administrators must continually learn security and anti-hacker techniques. Hack Proofing Linux will provide system administrators with all of the techniques necessary to properly configure and maintain Linux systems and counter malicious attacks. Linux operating systems and Open Source security tools are incredibly powerful, complex, and notoriously under-documented - this book addresses a real need Uses forensics-based analysis to give the reader an insight to the mind of a hacker

Hack Proofing Your Web Applications

  • 1st Edition
  • June 18, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 3 - 5
From the authors of the bestselling Hack Proofing Your Network!OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go.Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programsUnique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs

ASP Configuration Handbook

  • 1st Edition
  • June 8, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 5 9 3 - 6
Understanding ASPs: The new Internet business.Application Service Providers (ASPs) appeal to small businesses by offering a wide variety of web-hosted software programs including e-commerce, communications, project management, financial, word processing and human resourse applications. ASPs offer inexpensive use of software and the ability to share access among people in different locations. There is a huge buzz in the computing industry about ASPs and many ISPs (Internet Service Providers) are gearing up to become ASPs. These companies are in need of a guide - this is the first book to focus on how a company can become an ASP.ASP Configuration Handbook: A Guide for ISPs covers all the business issues surrounding the transformation of an Internet Service Provider to an Application Service Provider, as well as the technical issues associated with offering applications to customers.

Hack Proofing Your E-commerce Web Site

  • 1st Edition
  • May 15, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 8 1 0 - 4
From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks

Configuring ISA Server 2000

  • 1st Edition
  • May 11, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 7 - 3
Microsoft's flagship ISA Server delivers the Internet to your customers!As the demand for Internet connectivity reaches a fever pitch, system administrators are being challenged to connect more and more systems to the Internet without compromising security or network performance. ISA Server 2000 provides system administrators with a revolutionary management infrastructure that addresses the two greatest needs of Enterprise-wide Internet connectivity: Security and speed.Written by best-selling author of several MCSE 2000 study guides, this book will provide the system administrators with an in depth understanding of all the critiacl features of Microsoft's flag ship Internet Server. Configuring ISA Server 2000 shows network administrators how to connect a network to the Internet, maintain the connection, and troubleshoot remote users' hardware and software configuration problems.

Criminal Investigation

  • 2nd Edition
  • March 27, 2001
  • Michael F. Brown
  • English
  • Paperback
    9 7 8 - 0 - 7 5 0 6 - 7 3 5 2 - 5
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 0 3 4 1 - 7
This textbook provides students and law enforcement officers with the fundamentals of the criminal investigation process, from arrival on the scene to trial procedures. Written in a clear and simple style, Criminal Investigation: Law and Practice surpasses traditional texts by presenting a unique combination of legal, technical, and procedural aspects of the criminal investigation. The hands-on approach taken by the author helps to increase the learning experience.Criminal Investigation: Law and Practice, Second Edition, has been written to provide future law enforcement officers with a basic understanding of the investigative process. It merges two areas that are crucial to the successful completion of an investigation: the law, both criminal and procedural, and criminal investigative techniques. It is writen to provide the student investigator with the information needed to complete and investigation that can result in a successful prosecution.

Security Operations Management

  • 1st Edition
  • March 16, 2001
  • Robert McCrie
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 5 1 6 8 9 - 9
Security Operations Management takes concepts from business administration and criminal justice schools and incorporates them into the world of security management. It is comprehensive text focused on theoretical and research-oriented overviews of the core principles of security management. The book includes critical issues faced by real-life security practitioners and explores how they were resolved. The book is written for practitioners, students, and general managers who wish to understand and manage security operations more effectively. The book explains the difficult task of bringing order to the security department's responsibilities of protecting people, intellectual property, physical assets and opportunity. In addition, the book covers theoretical and practical management-oriented developments in the security field, including new business models and e-management strategies.

configuring exchange server 2000

  • 1st Edition
  • March 12, 2001
  • Syngress
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 5 - 9
E-mail configuration for the System Administrator.Windows 2000 users will find Configuring Exchange Server 2000 valuable for its coverage of all the popular e-mail clients, such as Outlook and Outlook Express. In addition, System and E-Mail Administrators will find the coverage of large system E-Mail Providers such as Exchange indispensable.Configuring Exchange Server 2000 focuses on e-mail configuration from the standpoint of the system administrator. It covers installation and management of all the major email programs, as well as covering mobile email, web-based email, email security and implementation of email within multinational companies.

Hospital and Healthcare Security

  • 4th Edition
  • February 28, 2001
  • Tony W York + 1 more
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 9 5 2 8 - 6
Hospital and Healthcare Security, Fourth edition, is a complete resource for healthcare protection planning and programming. The book offers thorough and fully updated coverage of the primary health and security issues hospitals and healthcare agencies face including infant protection and security, animal and research laboratory security, hospital watch programs, and the relationship between hospital security and law enforcement.Written primarily for use by the healthcare protection administrator, it also serves as a reference for any hospital security officer, supervisor or administrator. This book presents a complex and diverse security focus in a readable and understandable format.

Configuring Cisco AVVID

  • 1st Edition
  • February 8, 2001
  • Wayne Lawson
  • English
  • eBook
    9 7 8 - 0 - 0 8 - 0 4 7 6 7 3 - 5
What is AVVID?Previously called Configuring Cisco Communications Networks (CCN), Architecture for Voice, Video, and Integrated Data (AVVID) is the latest development from Cisco Systems that will soon redefine the way businesses communicate. AVVID allows businesses to transmit voice, data, and video over one combined architecture, whereas in the past, three separate systems were required. Configuring Cisco AVVID will be the first book to discuss the components of the AVVID architecture and will be timed to release with the launch of the technology in early 2000.A practical guide to the AVVID technology this book will include an introduction to AVVID, and its software, hardware, network architecture, installation, operation and configuration. Topics include CallManager, Cisco Gateways, and IPCC (Cisco IP Contact Center).