by Himanshu Dwivedi
Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it's notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access...
Price: $16.85 | Publisher: No Starch Press | Release: 2008
by Carla Schroder
If you want a book that lays out the steps for specific Linux networking tasks, one that clearly explains the commands and configurations, this is the book for you. Linux Networking Cookbook is a soup-to-nuts collection of recipes that covers everything you need to know to perform your job as a Linux network administrator. You'll dive straight into the gnarly hands-on work of building and maintaining a...
Price: $34.71 | Publisher: O'Reilly Media | Release: 2007
Network Security Assessment, 2nd Edition
by Chris McNab
Network Security Assessment provides you with the tricks and tools professional security consultants use to identify and assess risks in Internet-based networks-the same penetration testing model they use to secure government, military, and commercial networks. With this book, you can adopt, refine, and reuse this testing model to design and deploy networks that are hardened and immune from attack....
Price: $7.94 | Publisher: O'Reilly Media | Release: 2007
A+, Network+, Security+ Exams in a Nutshell
by Pawan K. Bhardwaj
If you're preparing for the new CompTIA 2006 certification in A+, or the current Network+ and Security+ certifications, you'll find this book invaluable. Its concise easy-to-use format provides all the information you need to get ready for the exams, including the four new A+ exams - the required Essentials exam and three elective exams that pertain to your area of specialization....
Price: $5.00 | Publisher: O'Reilly Media | Release: 2007
by Chris Sanders
It's easy enough to install Wireshark and begin capturing packets off the wire - or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-wo...
Price: $10.46 | Publisher: No Starch Press | Release: 2007
Linux Thin Client Networks Design and Deployment
by David Richards
A thin client network is a client-server architecture where client computers depend primarily on a central server for processing activities. The client machines (thin clients) mainly focus on passing user input to remote services and receiving and displaying the output; thin clients aren't as much about the hardware or software as about the design.This book has all the information you need to easily se...
Price: $23.99 | Publisher: Packt Publishing | Release: 2007
by Rich Cannings, Himanshu Dwivedi, Zane Lackey
Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plu...
Price: $7.39 | Publisher: McGraw-Hill | Release: 2007
by Bernard Golden
Virtualization has become a "megatrend" - and for good reason. Implementing virtualization allows for more efficient utilization of network server capacity, simpler storage administration, reduced energy costs, and better use of corporate capital. In other words: virtualization helps you save money, energy, and space. Not bad, huh?If you're thinking about "going virtual&q...
Price: $4.09 | Publisher: Wiley | Release: 2007
by Larry Stevenson, Nancy Altholz
A rootkit is a type of malicious software that gives the hacker root or administrator access to your network. They are activated before your system's operating system has completely booted up, making them extremely difficult to detect. Rootkits allow hackers to install hidden files, processes, and hidden user accounts. Hackers can use them to open back doors in order to intercept data from terminals, c...
Price: $7.55 | Publisher: Wiley | Release: 2007
by Bryan Burns, Dave Killion, Nicolas Beauchesne, Eric Moret, Julien Sobrier, Michael Lynn, Eric Markham, Chris Iezzoni, Philippe Biondi, Jennifer Stisa Granick, Steve Manzuik, Paul Guersch
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac...
Price: $43.53 | Publisher: O'Reilly Media | Release: 2007