Logo

Network Security

e-books in Network Security category

Book cover: Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office ,
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
(9055 views)
Book cover: Ethical HackingEthical Hacking
,
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.
(7204 views)
Book cover: OpenSSHOpenSSH
- Wikibooks ,
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(8261 views)

Book cover: Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by - Puget Sound Software ,
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(14370 views)
Book cover: Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign ,
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(11403 views)
Book cover: Firewalls CompleteFirewalls Complete
by - Mcgraw-Hill ,
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(12823 views)
Book cover: A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by - Microsoft Press ,
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(12721 views)
Book cover: Nmap Network ScanningNmap Network Scanning
by - Nmap Project ,
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(18874 views)
Book cover: Snort CookbookSnort Cookbook
by - O'Reilly Media ,
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(11275 views)
Book cover: Network Security ToolsNetwork Security Tools
by - O'Reilly Media, Inc. ,
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.
(15810 views)
Book cover: Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by - Addison-Wesley ,
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(15733 views)
Book cover: Intrusion Detection with SNORTIntrusion Detection with SNORT
by - Prentice Hall PTR ,
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(15873 views)
Book cover: Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by - Microsoft Press ,
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(17113 views)
Book cover: Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by - Prentice Hall PTR ,
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(16948 views)
Book cover: Forensic DiscoveryForensic Discovery
by - Addison-Wesley Professional ,
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(18401 views)
Book cover: Understanding OSIUnderstanding OSI
by - Prentice Hall ,
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(20732 views)