Либрус
 
Сделать стартовой
Добавить в избранное
Обратная связь
Карта сайта
Зеркало сайта
Новости RSS 2.0
ПОСТУПЛЕНИЯ 
«    Февраль 2020    »
ПнВтСрЧтПтСбВс
 12
3456789
10111213141516
17181920212223
242526272829 
РУБРИКАТОР 
Открыть | Закрыть

ПОПУЛЯРНОЕ  
АРХИВЫ   
Август 2016 (216)
Июль 2016 (456)
Июнь 2016 (321)
Май 2016 (398)
Апрель 2016 (433)
Март 2016 (554)


  CD and DVD Forensics
 Категория: «Syngress», Безопасность, взлом
   
 
CD and DVD Forensics
Автор: Paul Crowley
Издательство: Syngress
Год издания: 2007
isbn: 1-59749-128-4
Количество страниц: 321
Язык: english
Формат: PDF

CD and DVD Forensics takes the reader through all facets of handling, examining, and processing CD and DVD evidence for computer forensics. At a time when data forensics is becoming a major part of law enforcement and prosecution in the public sector, as well as corporate and system security and integrity in the private sector, the interest in this subject has just begun to blossom. CD and DVD Forensics is a how-to book that gives the reader tools to open CDs and DVDs in an effort to identify evidence of a crime. These tools can be applied in both the public and private sectors. Armed with this information, readers in law enforcement and corporate security and private investigators will be more effective in performing their evidence-related tasks.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 1024  Подробнее и с комментариями (1)
  Essential Computer Security
 Категория: Безопасность, взлом, «Syngress»
   
 
Essential Computer Security
Автор: Tony Bradley
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-114-4
Количество страниц: 321
Язык: english
Формат: PDF

This book is not intended to be comprehensive.There are hundreds of books on the shelf covering all areas of computer and network security.You can find many books that cover general information security in a much deeper and technical sense than this book will.There are also books that cover specific areas of security, such as encryption, firewalls, backup and recovery, and so on, in much more depth and detail than this book.
 
  • 0
Опубликовал: flashsoft | 6-12-2006, 00:00 | Просмотров: 846  Подробнее и с комментариями (0)
  Virtualization with Microsoft Virtual Server 2005
 Категория: Windows, «Syngress»
   
 
Virtualization with Microsoft Virtual Server 2005
Автор: David Rule Jr., Ken Majors, Matthijs ten Seldam
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-106-3
Количество страниц: 481
Язык: русский
Формат: PDF

A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of Ownership of their physical infrastructure. Combining software applications onto a single server, even if those applications are from the same software vendor, can be dangerous and problems hard to troubleshoot. Virtual Server allows you to consolidate 15 to 20 or even more servers onto a single physical server reducing hardware, electrical, cooling, and administrative costs. These virtual servers run completely independent of each other so if one crashes the other are not affected. Planning and implementing a server consolidation is a complex process. This book details the requirements for such a project, includes sample forms and templates, and delivers several physical to virtual migration strategies which will save both time and costs.
 
  • 0
Опубликовал: flashsoft | 15-11-2006, 00:00 | Просмотров: 834  Подробнее и с комментариями (0)
  Security Log Management - Identifying Patterns in the Chaos
 Категория: Безопасность, взлом, «Syngress»
   
 
Security Log Management - Identifying Patterns in the Chaos
Автор: Jacob Babbin, Dave Kleiman, Everett F. Carter Jr
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-042-3
Количество страниц: 352
Язык: русский
Формат: PDF

As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network's overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.
 
  • 0
Опубликовал: flashsoft | 15-11-2006, 00:00 | Просмотров: 945  Подробнее и с комментариями (0)
  Combating Spyware in the Enterprise
 Категория: Безопасность, взлом, «Syngress»
   
 
Combating Spyware in the Enterprise
Автор: Paul Piccard, Jeremy Faircloth
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-064-4
Количество страниц: 406
Язык: english
Формат: PDF

Combating Spyware in the Enterprise is the first book published on defending enterprise networks from increasingly sophisticated and malicious spyware. System administrators and security professionals responsible for administering and securing networks ranging in size from SOHO networks up the largest, enterprise networks will learn to use a combination of free and commercial anti-spyware software, firewalls, intrusion detection systems, intrusion prevention systems, and host integrity monitoring applications to prevent the installation of spyware, and to limit the damage caused by spyware that does in fact infiltrate their network. Combating Spyware in the Enterprise begins by examining the various types of insidious spyware and adware currently propagating across the internet and infiltrating enterprise networks. This section closely examines spyware's ongoing transformation from nuisance to malicious, sophisticated attack vector. Next, the book uncovers spyware's intricate economy and network of malicious hackers and criminals. Forensic investigations presented in this section of the book reveal how increasingly sophisticated spyware can compromise enterprise networks via trojans, keystroke loggers, system monitoring, distributed denial of service attacks, backdoors, viruses, and worms. After close examination of these attack vectors, the book begins to detail both manual and automated techniques for scanning your network for the presence of spyware, and customizing your IDS and IPS to detect spyware. From here, the book goes on to detail how to prevent spyware from being initially installed to mitigating the damage inflicted by spyware should your network become infected. Techniques discussed in this section include slowing the exposure rate; web filtering; using FireFox, MacOSX, or Linux; patching and updating, machine restrictions, shielding, deploying anti-spyware, and re-imaging. The book concludes with an analysis of the future of spyware and what the security community must accomplish to win the ware against spyware
 
  • 0
Опубликовал: flashsoft | 13-11-2006, 00:00 | Просмотров: 815  Подробнее и с комментариями (0)
  How to Cheat at Securing a Wireless Network
 Категория: Безопасность, взлом, «Syngress»
   
 
How to Cheat at Securing a Wireless Network
Автор: Chris Hurley, Jan Kanclirz Jr.
Издательство: Syngress
Год издания: 2006
isbn: 1597490873
Количество страниц: 479
Язык: english
Формат: PDF

Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors: Denial of service (DoS) and other network layer attacks; Unauthorized access across the perimeter and within the organization Application layer intrusions and attacks, both from within and outside the network Extended connectivity through remote access and extranets; An increase in unmanaged or ill-managed endpoint devices; New applications like VoIP, instant messaging, and peer-to-peer. This book provides the busy network administrator with best-practice solutions address these threats and to maintain a secure and accessible wireless network. The book endorses the principle that the best strategy is to deploy multiple layers of security, each reinforcing the other. Yet it never strays from its emphasis on the practical; that any tool or methodology that is deployed must work reliably, allow sufficient access, and require a minimal amount of maintenance
 
  • 0
Опубликовал: flashsoft | 1-11-2006, 00:00 | Просмотров: 993  Подробнее и с комментариями (0)
  Video Conferencing over IP. Configure, Secure and Troubleshoot
 Категория: Компьютерные сети, «Syngress»
   
 
Video Conferencing over IP. Configure, Secure and Troubleshoot
Автор: Michael Gough
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-063-6
Количество страниц: 338
Язык: english
Формат: PDF

Until recently, the reality of video conferencing didn't live up to the marketing hype. That's all changed. The network infrastructure and broadband capacity is now in place to deliver clear, real time video and voice feeds between multiple points of contacts, with market leaders such as Cisco and Microsoft continuing to invest heavily in development. In addition, newcomers Skype and Google are poised to launch services and products targeting this market. Video Conferencing over IP is the perfect guide to getting up and running with video teleconferencing for small to medium size enterprises. Topic coverage includes how to determine bandwidth needs; configure network routers, gateways, firewalls and switches; and configure, secure and troubleshoot your deployment. Major software solutions from Microsoft, Yahoo, AOL, VidiTel, iVisit, Vibe Phone and Skype are also covered
 
  • 0
Опубликовал: flashsoft | 18-10-2006, 00:00 | Просмотров: 808  Подробнее и с комментариями (0)
  Winternals. Defragmentation Recovery and Administration Field Guide
 Категория: «Syngress», «Syngress»
   
 
Winternals. Defragmentation Recovery and Administration Field Guide
Автор: Lawrence Abrams, Daniel Covell
Издательство: Syngress
Год издания: 2006
isbn: 1-59749-079-2
Количество страниц: 506
Язык: english
Формат: PDF

It was then that I purchased my Winternals Administrator's Pak. It contained BlueSave Version 1.01, ERD Commander Professional Version 1.06, Monitoring Tools (Filemon and Regmon) Enterprise Editions Version 1.0, NTFSDOS Professional Version 3.03, NTRecover Version 1.0, and Remote Recover Version 1.01. We had a Windows NT 4 server in the dead zone. I spent a few hours reading over the ERD and Remote Recover user guides, created a "client floppy," and began my quest. Thank goodness that version of ERD had the ability to access NT-defined fault-tolerant drives. Within a few hours we had recovered the system and were back up and running. With that success, I thought back on hundreds of earlier incidents that made me wish I had purchased Winternals sooner. We have come a long way since then; the Winternals team has improved upon and added many tools and features to the Administrator's Pak utilities. One thing remains constant-in the Microsoft administrator's world, Winternals is a lifesaver
 
  • 0
Опубликовал: flashsoft | 18-10-2006, 00:00 | Просмотров: 770  Подробнее и с комментариями (0)
  VB.NET Developer’s Guide
 Категория: Basic, VB, «Syngress»
   
 
VB.NET Developer’s Guide
Издательство: Syngress
Год издания: 2001
isbn: 1-928994-48-2
Количество страниц: 786
Язык: english
Формат: PDF

The introduction of VB.NET has sent many Visual Basic gurus back to the drawing board! VB.NET introduces a new set of standards, protocols, and syntax that previous users of Visual Basic will need to learn to regain their guru status and be positioned to create enterprise-critical applications. VB.NET Developer's Guide will help you master VB.NET!
 
  • 0
Опубликовал: flashsoft | 10-09-2006, 00:00 | Просмотров: 920  Подробнее и с комментариями (0)
  Sniffer Pro Network Optimization and Troubleshooting Handbook
 Категория: Компьютерные сети, «Syngress»
   
 
Sniffer Pro Network Optimization and Troubleshooting Handbook
Издательство: Syngress
Год издания: 2002
isbn: 1-931836-57-4
Количество страниц: 678
Язык: english
Формат: PDF

Sniffer Pro Network Optimization & Troubleshooting Handbook introduces the reader to the suite of Sniffer Solutions from Network Associates and focuses mainly on Sniffer Pro LAN Network Analyzer. This book will begin with a description of the basic features of Sniffer Pro LAN and then move readers through the tips and tools available for gathering data, analyzing, troubleshooting, resolving, and securing problems on their networks. There are many titles devoted to the analysis and troubleshooting of computer networks, however, there is no other book that offers complete coverage of Sniffer.
 
  • 0
Опубликовал: flashsoft | 23-08-2006, 00:00 | Просмотров: 912  Подробнее и с комментариями (0)
  Главная страница | Регистрация | Новое на сайте | Статистика |
 
«Librus - Mountain of Knowledge»
«Либрус - гора знаний» 2004-2020
Design by Flashsoft © 2005-2020