by Dan Farmer, Wietse Venema
Publisher: Addison-Wesley Professional 2005
Number of pages: 240
The premise of the book is that forensic information can be found everywhere you look. With this guiding principle in mind we develop tools to collect information from obvious and not so obvious sources, we walk through analyses of real intrusions in detail, and we discuss the limitations of our approach. The target audience of the book is anyone who wants to deepen their understanding of how computer systems work, as well as anyone who is likely to become involved with the technical aspects of computer intrusion or system analysis. These are not only system administrators, incident responders, other computer security professionals, or forensic analysts, but also anyone who is concerned about the impact of computer forensics on privacy.
Home page url
Download or read it online for free here:
by Marcus Goncalves - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
by Microsoft Corporation - Microsoft Press
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
by William R. Cheswick, Steven M. Bellovin - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.