TCP/IP Essentials

A Lab-Based Approach

Author: Shivendra S. Panwar

Publisher: Cambridge University Press

ISBN: 9780521601245

Category: Computers

Page: 262

View: 7610

Release On

A hands-on textbook on TCP/IP technologies, showing how the protocols are implemented in practice.



Hack Attacks Revealed

A Complete Reference for UNIX, Windows, and Linux with Custom Security Toolkit

Author: John Chirillo

Publisher: Wiley

ISBN: 9780471232827

Category: Computers

Page: 928

View: 4836

Release On

The much-anticipated second edition of the bestselling book that details network security through the hacker's eye Since the first edition of Hack Attacks Revealed was published, many new attacks have been made on all operating systems, including UNIX, Windows XP, Mac OS, and Linux, and on firewalls, proxies, and gateways. Security expert John Chirillo is ready to tackle these attacks with you again. He has packed the Second Edition of his all-in-one reference with forty percent new material. In this fascinating new edition, you'll discover: * The hacker's perspective on security holes in UNIX, Linux, and Windows networks * Over 170 new vulnerabilities and exploits * Advanced discovery techniques * A crash course in C for compiling hacker tools and vulnerability scanners * The top seventy-five hack attacks for UNIX and Windows * Malicious code coverage of Myparty, Goner, Sircam, BadTrans, Nimda, Code Red I/II, and many more * TigerSuite Professional 3.5 (full suite single license)

Protect your information with intrusion detection

Author: A. Lukatsky

Publisher: БХВ-Петербург

ISBN: 1931769117

Category: Computers

Page: 700

View: 4082

Release On

This comprehensive reference provides a detailed overview of intrusion detection systems (IDS) offering the latest technology in information protection. Introducing network administrators to the problem of intrusion detection, it includes the principles of system technology and an in-depth classification in IDS. Topics covered include information gathering and exploitation, searching for vulnerabilities, distributed attack tools, remote and local penetrations, and password crackers, sniffers, and firewalls. Examples of actual information system break-ins provide practical reference.

Norton All-In-One Desk Reference For Dummies

Author: Kate J. Chase

Publisher: For Dummies

ISBN: 9780764579936

Category: Computers

Page: 664

View: 2173

Release On

What do you do when your PC is threatening to go on strike, your inbox is groaning with spam, and you have a sneaking suspicion you shouldn’t have opened that e-mail attachment with the funny name? First, you give thanks for a fellow named Norton. Then you open Norton All-in-One Desk Reference For Dummies. This handy one-stop reference guide is made up of nine self-contained minibooks, each covering one of the popular Norton PC tools that make your computing life easier and safer. They include: Norton Essentials Norton Suites Norton Utilities Norton GoBack and Ghost Norton AntiSpam Norton AntiVirus Internet Control Tools Norton PartitionMagic Norton CleanSweep Designed so it’s easy to find what you need to know, Norton All-in-One Desk Reference For Dummies helps you understand what each tool does and how to use it. You can diagnose what’s wrong, take the appropriate steps to fix it, and even prevent a lot of problems from tormenting you in the future. Discover how to: Find out what’s in the Norton package you have, and whether it still meets your needs Give your PC a quick check-up with Norton Utilities Choose the right tool to solve the problem at hand Defragment your hard drive and rev up your computer with SpeedDisk Identify and recover files you’ve accidentally deleted Rescue your system from disaster with GoBack or Ghost Set your antivirus shield to repel intruders, and root out spyware and adware Build a personal firewall, protect your kids with parental controls, and make your inbox off-limits for spammers Sweep your drives clean of program leftovers, clean out your caches, and ditch stale cookies If you’ve discovered that having a whole box of tools isn’t much help if you don’t know how to use them, Norton All-in-One Desk Reference For Dummies is just what the doctor ordered. With these handy minibooks on call, you can handle lots of basic PC first aid and maintenance on your own and feel good about doing it.

Securing and Controlling Cisco Routers

Author: Peter T. Davis

Publisher: CRC Press

ISBN: 9781420031454

Category: Computers

Page: 736

View: 3794

Release On

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA). The text then addresses standard, extended, time-based, dynamic, and reflexive access lists, as well as context-based control and Cisco Encryption Technology. At the end of most chapters, readers will find the unique opportunity to practice what they have learned. Readers will be able to log on to a real router, practice commands, and gather information as shown in the chapter. To further round out this understanding of routers, Securing and Controlling Cisco Routers reviews Trojan Ports and Services and provides additional resources such as Web sites, mailing lists, bibliographies, glossaries, acronyms, and abbreviations.



Applications for distributed systems and network management

Author: Kornel Terplan,Jill Huntington-Lee

Publisher: Van Nostrand Reinhold Company

ISBN: N.A

Category: Computers

Page: 390

View: 4414

Release On

An essential guide that explains what is required and what solutions are available for managing distributed computer systems, particularly client/server architectures. The book covers proprietary solutions--including IBM NetView products, Hewlett-Packard's HP Open View, NetExpert, SunConnect SunNet Manager, and others--describing what the typical management problems are and how to solve them.

Effective management of local area networks

functions, instruments, and people

Author: Kornel Terplan

Publisher: McGraw-Hill Companies

ISBN: N.A

Category: Computers

Page: 376

View: 2760

Release On

The perfect how-to guide to building and managing a seamless computer network operating within today's multi-vendor environment. Page-after-page of tested procedures for planning, designing, tuning, and improving data, voice, and hypermedia networks. Numerous flowcharts, checklists, and decision-making tips are provided to give managers fast answers for troubleshooting the full range of LAN administration problems.

网络安全与电子商务

Author: 赵泉

Publisher: 清华大学出版社有限公司

ISBN: 9787302109389

Category:

Page: 254

View: 2424

Release On

21世纪高职高专规划教材电子商务专业系列

Intelligent Software Systems Development

An IS Manager's Guide

Author: Paul Harmon,Curtis Hall

Publisher: John Wiley & Sons Incorporated

ISBN: N.A

Category: Computers

Page: 472

View: 6986

Release On

An information systems manager's guide to making smart software choices includes valuable advice on selecting and developing software systems. Original.




Library Journal

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Libraries

Page: N.A

View: 4266

Release On

Includes, beginning Sept. 15, 1954 (and on the 15th of each month, Sept.-May) a special section: School library journal, ISSN 0000-0035, (called Junior libraries, 1954-May 1961). Also issued separately.

Net Spy

Author: Michael Wolff

Publisher: Madison Books

ISBN: 9780679770299

Category: Computers

Page: 185

View: 8132

Release On

Explains how to use the Internet to locate individuals and organizations, check backgrounds, spy on competition, and protect one's privacy


黑客攻防对策

Author: 秘密客

Publisher: 清华大学出版社有限公司

ISBN: 9787900637499

Category:

Page: 322

View: 2611

Release On

本书通过介绍黑客可能采取的进攻手段——电子邮件、网络网页、工具程序、木马程序等,详细分析了黑客进攻的方法和防范对策。