Description : The tenth anniversary edition of the world's bestselling computer security book! The original Hacking Exposed authors rejoin forces on this new edition to offer completely up-to-date coverage of today's most devastating hacks and how to prevent them. Using their proven methodology, the authors reveal how to locate and patch system vulnerabilities. The book includes new coverage of ISO images, wireless and RFID attacks, Web 2.0 vulnerabilities, anonymous hacking tools, Ubuntu, Windows Server 2008, mobile devices, and more. Hacking Exposed 6 applies the authors' internationally renowned computer security methodologies, technical rigor, and "from-the-trenches" experience to make computer technology usage and deployments safer and more secure for businesses and consumers. "A cross between a spy novel and a tech manual." --Mark A. Kellner, Washington Times "The seminal book on white-hat hacking and countermeasures . . . Should be required reading for anyone with a server or a network to secure." --Bill Machrone, PC Magazine "A must-read for anyone in security . . . One of the best security books available." --Tony Bradley, CISSP, About.com
Description : Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide Second Edition Foundation learning for the CCNA Security IINS 640-554 exam Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is a Cisco-authorized, self-paced learning tool for CCNA® Security 640-554 foundation learning. This book provides you with the knowledge needed to secure Cisco® networks. By reading this book, you will gain a thorough understanding of how to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats. This book focuses on using Cisco IOS routers to protect the network by capitalizing on their advanced features as a perimeter router, firewall, intrusion prevention system, and site-to-site VPN device. The book also covers the use of Cisco Catalyst switches for basic network security, the Cisco Secure Access Control System (ACS), and the Cisco Adaptive Security Appliance (ASA). You learn how to perform basic tasks to secure a small branch office network using Cisco IOS security features available through web-based GUIs (Cisco Configuration Professional) and the CLI on Cisco routers, switches, and ASAs. Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book. Implementing Cisco IOS Network Security (IINS) Foundation Learning Guide, Second Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining. -- Develop a comprehensive network security policy to counter threats against information security -- Secure borderless networks -- Learn how to use Cisco IOS Network Foundation Protection (NFP) and Cisco Configuration Professional (CCP) -- Securely implement the management and reporting features of Cisco IOS devices -- Deploy Cisco Catalyst Switch security features -- Understand IPv6 security features -- Plan threat control strategies -- Filter traffic with access control lists -- Configure ASA and Cisco IOS zone-based firewalls -- Implement intrusion prevention systems (IPS) and network address translation (NAT) -- Secure connectivity with site-to-site IPsec VPNs and remote access VPNs This volume is in the Foundation Learning Guide Series offered by Cisco Press®. These guides are developed together with Cisco as the only authorized, self-paced learning tools that help networking professionals build their understanding of networking concepts and prepare for Cisco certification exams. Category: Cisco Certification Covers: CCNA Security IINS exam 640-554
Description : Updated annually to keep up with the increasingly fast pace of change in the field, the Information Security Management Handbook is the single most comprehensive and up-to-date resource on information security (IS) and assurance. Facilitating the up-to-date understanding required of all IS professionals, the Information Security Management Handbook, Sixth Edition, Volume 5 reflects the latest issues in information security and the CISSP® Common Body of Knowledge (CBK®). This edition updates the benchmark Volume 1 with a wealth of new information to help IS professionals address the challenges created by complex technologies and escalating threats to information security. Topics covered include chapters related to access control, physical security, cryptography, application security, operations security, and business continuity and disaster recovery planning. The updated edition of this bestselling reference provides cutting-edge reporting on mobile device security, adaptive threat defense, Web 2.0, virtualization, data leakage, governance, and compliance. Also available in a fully searchable CD-ROM format, it supplies you with the tools and understanding to stay one step ahead of evolving threats and ever-changing standards and regulations.
Description : A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat
Description : Master the latest technology and developments from the field with the book specifically oriented to the needs of those learning information systems -- PRINCIPLES OF INFORMATION SECURITY, 6E. Taking a managerial approach, this bestseller emphasizes all aspects of information security, rather than just the technical control perspective. Readers gain a broad overview of the entire field of information security and related elements with the detail to ensure understanding. The book highlights terms used in the field and a history of the discipline as readers learn how to manage an information security program. This edition highlights the latest practices with fresh examples that explore the impact of emerging technologies, such as the Internet of Things, Cloud Computing, and DevOps. Updates address technical security controls, emerging legislative issues, digital forensics, and ethical issues in IS security, making this the ideal IS resource for business decision makers. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
Description : “A great American success story . . . an endearing and well-written book.”—The New York Times Book Review Colin Powell is the embodiment of the American dream. He was born in Harlem to immigrant parents from Jamaica. He knew the rough life of the streets. He overcame a barely average start at school. Then he joined the Army. The rest is history—Vietnam, the Pentagon, Panama, Desert Storm—but a history that until now has been known only on the surface. Here, for the first time, Colin Powell himself tells us how it happened, in a memoir distinguished by a heartfelt love of country and family, warm good humor, and a soldier's directness. My American Journey is the powerful story of a life well lived and well told. It is also a view from the mountaintop of the political landscape of America. At a time when Americans feel disenchanted with their leaders, General Powell's passionate views on family, personal responsibility, and, in his own words, "the greatness of America and the opportunities it offers" inspire hope and present a blueprint for the future. An utterly absorbing account, it is history with a vision. Praise for My American Journey “The stirring, only-in-America story of one determined man's journey from the South Bronx to directing the mightiest of military forces . . . Fascinating.”—The Washington Post Book World “Eloquent.”—Los Angeles Times Book Review “Profound and moving . . . Must reading for anyone who wants to reaffirm his faith in the promise of America.”—Jack Kemp, The Wall Street Journal “A book that is much like its subject—articulate, confident, impressive, but unpretentious and witty. . . . Whether you are a political junkie, a military buff, or just interested in a good story, My American Journey is a book well worth reading.”—San Diego Union Tribune “Colin Powell's candid, introspective autobiography is a joy for all with an appetite for well-written political and social commentary.”—The Detroit News
Description : This fully updated and revised third edition, presents a wide ranging, balanced account of the fundamental issues across the full spectrum of inference and decision-making. Much has happened in this field since the second edition was published: for example, Bayesian inferential procedures have not only gained acceptance but are often the preferred methodology. This book will be welcomed by both the student and practising statistician wishing to study at a fairly elementary level, the basic conceptual and interpretative distinctions between the different approaches, how they interrelate, what assumptions they are based on, and the practical implications of such distinctions. As in earlier editions, the material is set in a historical context to more powerfully illustrate the ideas and concepts. Includes fully updated and revised material from the successful second edition Recent changes in emphasis, principle and methodology are carefully explained and evaluated Discusses all recent major developments Particular attention is given to the nature and importance of basic concepts (probability, utility, likelihood etc) Includes extensive references and bibliography Written by a well-known and respected author, the essence of this successful book remains unchanged providing the reader with a thorough explanation of the many approaches to inference and decision making.
Description : The Internet has transformed the way people research, shop, conduct business, and communicate. But the Internet and technologies that enable online interaction and access to a variety of content can be a perilous place for minors 8-18. This book shares the risks of the Internet by detailing recent, real-world tragedies and revealing some of the secrets of online activities. Filled with practical advice and recommendations, it provides a pragmatic approach to help parents and teachers protect children against the threats of going online.
Description : In a groundbreaking, comprehensive history of the Army of Northern Virginia's retreat from Gettysburg in July 1863, Kent Masterson Brown draws on previously untapped sources to chronicle the massive effort of General Robert E. Lee and his command as they sought to move people, equipment, and scavenged supplies through hostile territory and plan the army's next moves. Brown reveals that even though the battle of Gettysburg was a defeat for the Army of Northern Virginia, Lee's successful retreat maintained the balance of power in the eastern theater and left his army with enough forage, stores, and fresh meat to ensure its continued existence as an effective force.