Skip to main content

Books in Social sciences and humanities

    • Open Source Fuzzing Tools

      • 1st Edition
      • Noam Rathaus + 1 more
      • English
      Fuzzing is often described as a “black box” software testing technique. It works by automatically feeding a program multiple input iterations in an attempt to trigger an internal error indicative of a bug, and potentially crash it. Such program errors and crashes are indicative of the existence of a security vulnerability, which can later be researched and fixed.Fuzz testing is now making a transition from a hacker-grown tool to a commercial-grade product. There are many different types of applications that can be fuzzed, many different ways they can be fuzzed, and a variety of different problems that can be uncovered. There are also problems that arise during fuzzing; when is enough enough? These issues and many others are fully explored.
    • Web Application Vulnerabilities

      Detect, Exploit, Prevent
      • 1st Edition
      • Steven Palmer
      • English
      In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
    • How to Cheat at Deploying and Securing RFID

      • 1st Edition
      • Frank Thornton + 1 more
      • English
      RFID is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ pass to dogs to beer kegs to library books. Major companies and countries around the world are adopting or considering whether to adopt RFID technologies. Visa and Wells Fargo are currently running tests with RFID, airports around the world are using RFID to track cargo and run customs departments, universities such as Slippery Rock are providing RFID-enabled cell phones for students to use for campus charges. According to the July 9 CNET article, RFID Tags: Big Brother in Small Packages?, "You should become familiar with RFID technology because you'll be hearing much more about it soon. Retailers adore the concept, and CNET News.com's own Alorie Gilbert wrote last week about how Wal-Mart and the U.K.-based grocery chain Tesco are starting to install "smart shelves" with networked RFID readers. In what will become the largest test of the technology, consumer goods giant Gillette recently said it would purchase 500 million RFID tags from Alien Technology of Morgan Hill, CA." For security professionals needing to get up and running fast with the topic of RFID, this How to Cheat approach to the topic is the perfect "just what you need to know" book!
    • Sarbanes-Oxley IT Compliance Using Open Source Tools

      • 2nd Edition
      • Christian B Lahti + 1 more
      • English
      The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal securities laws in the United States since the New Deal. It came in the wake of a series of corporate financial scandals, including those affecting Enron, Arthur Andersen, and WorldCom. The law is named after Senator Paul Sarbanes and Representative Michael G. Oxley. It was approved by the House by a vote of 423-3 and by the Senate 99-0. This book illustrates the many Open Source cost-saving opportunities that public companies can explore in their IT enterprise to meet mandatory compliance requirements of the Sarbanes-Oxley act. This book will also demonstrate by example and technical reference both the infrastructure components for Open Source that can be made compliant, and the Open Source tools that can aid in the journey of compliance. Although many books and reference material have been authored on the financial and business side of Sox compliance, very little material is available that directly address the information technology considerations, even less so on how Open Source fits into that discussion.The format of the book will begin each chapter with the IT business and executive considerations of Open Source and SOX compliance. The remaining chapter verbiage will include specific examinations of Open Source applications and tools which relate to the given subject matter.
    • The Best Damn IT Security Management Book Period

      • 1st Edition
      • Susan Snedaker + 1 more
      • English
      The security field evolves rapidly becoming broader and more complex each year. The common thread tying the field together is the discipline of management. The Best Damn Security Manager's Handbook Period has comprehensive coverage of all management issues facing IT and security professionals and is an ideal resource for those dealing with a changing daily workload.Coverage includes Business Continuity, Disaster Recovery, Risk Assessment, Protection Assets, Project Management, Security Operations, and Security Management, and Security Design & Integration.Compiled from the best of the Syngress and Butterworth Heinemann libraries and authored by business continuity expert Susan Snedaker, this volume is an indispensable addition to a serious security professional's toolkit.
    • Handbook of Econometrics

      • 1st Edition
      • Volume 6A
      • James J. Heckman + 1 more
      • English
      As conceived by the founders of the Econometric Society, econometrics is a field that uses economic theory and statistical methods to address empirical problems in economics. It is a tool for empirical discovery and policy analysis. The chapters in this volume embody this vision and either implement it directly or provide the tools for doing so. This vision is not shared by those who view econometrics as a branch of statistics rather than as a distinct field of knowledge that designs methods of inference from data based on models of human choice behavior and social interactions. All of the essays in this volume and its companion volume 6B offer guidance to the practitioner on how to apply the methods they discuss to interpret economic data. The authors of the chapters are all leading scholars in the fields they survey and extend.
    • Perl Scripting for Windows Security

      Live Response, Forensic Analysis, and Monitoring
      • 1st Edition
      • Harlan Carvey
      • English
      I decided to write this book for a couple of reasons. One was that I’ve now written a couple of books that have to do with incident response and forensic analysis on Windows systems, and I used a lot of Perl in both books. Okay…I’ll come clean…I used nothing but Perl in both books! What I’ve seen as a result of this is that many readers want to use the tools, but don’t know how…they simply aren’t familiar with Perl, with interpreted (or scripting) languages in general, and may not be entirely comfortable with running tools at the command line. This book is intended for anyone who has an interest in useful Perl scripting, in particular on the Windows platform, for the purpose of incident response, and forensic analysis, and application monitoring. While a thorough grounding in scripting languages (or in Perl specifically) is not required, it helpful in fully and more completely understanding the material and code presented in this book. This book contains information that is useful to consultants who perform incident response and computer forensics, specifically as those activities pertain to MS Windows systems (Windows 2000, XP, 2003, and some Vista). My hope is that not only will consultants (such as myself) find this material valuable, but so will system administrators, law enforcement officers, and students in undergraduate and graduate programs focusing on computer forensics.
    • Fire Debris Analysis

      • 1st Edition
      • Eric Stauffer + 2 more
      • English
      The study of fire debris analysis is vital to the function of all fire investigations, and, as such, Fire Debris Analysis is an essential resource for fire investigators. The present methods of analysis include the use of gas chromatography and gas chromatography-mass spectrometry, techniques which are well established and used by crime laboratories throughout the world. However, despite their universality, this is the first comprehensive resource that addresses their application to fire debris analysis.Fire Debris Analysis covers topics such as the physics and chemistry of fire and liquid fuels, the interpretation of data obtained from fire debris, and the future of the subject. Its cutting-edge material and experienced author team distinguishes this book as a quality reference that should be on the shelves of all crime laboratories.
    • Forensic Art Essentials

      A Manual for Law Enforcement Artists
      • 1st Edition
      • Lois Gibson
      • English
      Forensic Art Essentials teaches artists to extract information from a witness or victim about a face they have seen, and produce an image good enough to lead detectives to the criminal being described. After reading this book, anyone with adequate drawing skills will be able to learn the tools necessary to develop his or her skills as a forensic artist. Instruction focuses on an explanation of techniques for various scenarios and includes the use of case studies of special situations and how they should be handled. The book covers skull reconstructions of unidentified murder victims and age progressions to aid in the apprehension of known fugitives. It also provides step-by-step illustrations of how to reconstruct a face from a skull, and offers solutions to a multitude of common problems that occur in the field. With 500 full-color illustrations, this book is an essential tool for any forensic artist.
    • Juniper(r) Networks Secure Access SSL VPN Configuration Guide

      • 1st Edition
      • Rob Cameron + 1 more
      • English
      Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. As a system administrator or security professional, this comprehensive configuration guide will allow you to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access, for employees, partners, and customers from a single platform.