Showing posts with label network security. Show all posts
Showing posts with label network security. Show all posts

Computer Security Fundamentals Review

Computer Security Fundamentals
Average Reviews:

(More customer reviews)
I am using this book for an introduction to computer security course I teach. It has the breadth of topics I need (fundamentals of viruses, trojan horses, denial of service, firewalls, IDS, anti spyware, etc.). It even has some material few introductory books cover (cryptography, identity theft).
It has excellent exercises and review questions. I can unequivocally recomend it.

Click Here to see more reviews about: Computer Security Fundamentals

KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.

Buy NowGet 20% OFF

Click here for more information about Computer Security Fundamentals

Read More...

Principles and Practice of Information Security Review

Principles and Practice of Information Security
Average Reviews:

(More customer reviews)
This book is a must read for the corporate "C" Level. It covers risk abatement, strategies, and tactics to maintain the security of your corporate information as well as your customers and employees information. As a few companies have recently sustained damages in the hundreds of millions from attacks on their security - this book may have prompted them to close a few "loop holes" that allowed the breeches.
Regards
Scott L
www.vision3llc.com

Click Here to see more reviews about: Principles and Practice of Information Security

This book provides professionals with the necessary managerial, technical, and legal background to support investment decisions in security technology. It discusses security from the perspective of hackers (i.e., technology issues and defenses) and lawyers (i.e., legal issues and defenses). This cross-disciplinary book is designed to help users quickly become current on what has become a fundamental business issue. This book covers the entire range of best security practices—obtaining senior management commitment, defining information security goals and policies, transforming those goals into a strategy for monitoring intrusions and compliance, and understanding legal implications. Topics also include computer crime, electronic evidence, cyber terrorism, and computer forensics. For professionals in information systems, financial accounting, human resources, health care, legal policy, and law. Because neither technical nor legal expertise is necessary to understand the concepts and issues presented, this book can be required reading for everyone as part of an enterprise-wide computer security awareness program.

Buy NowGet 33% OFF

Click here for more information about Principles and Practice of Information Security

Read More...

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting Review

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting
Average Reviews:

(More customer reviews)
I bought this book to learn about Windows NT troubleshooting, but now I'm not sure I can trust anything it says about that area, since it has so many mistakes in the area that I do know, TCP/IP. Errors abound when discussing the IP header. The Type of Service discussion doesn't distinguish between the TOS field and the TOS bits, whose meaning are obsolete anyway. It doesn't discuss Precedence, which really is used, for exampe, VoIP uses precedence 5. IP source routing, which nobody uses anyway, is explained in a completely muddled way and the example shows someone setting that option when pinging from 10.0.0.60 to 10.0.0.10, which would be a really silly use of the option. The book also has lots of typos and badly-written sentences. Where was the editor? You would think Prentice Hall could hire editors. The SPX chapter starts with this, "The SPX/IPX protocol is a still a common occurrence on many corporate networks." The only mention of AppleTalk is in the list of Application-layer protocols where it has two entries that say this: AppleTalk and Appleshare apples networking protocol suite AFP apples protocol for remote file access AppleTalk shoudn't be in the list and couldn't they have used an editor who knew what Apple means in the computer industry?

Click Here to see more reviews about: Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

Ever wonder what in the world is happening "under the hood" of your network? Why things suddenly slow down, print jobs fail? Network monitoring is the least understood aspect of network administration -- and one of the most important. In this book, a leading networking expert shows you exactly how to monitor and analyze your Windows-based network -- and how to use the information to maximize performance, reduce congestion, plan for growth -- even identify intrusions! Start by reviewing the TCP/IP, IPX/SPX, Ethernet, and Samba protocol basics you need in order to monitor and analyze networks effectively. Inspect network traffic from four different perspectives: client traffic, server traffic, application traffic, and service traffic. Next, learn how to use each version of Microsoft's Network Monitor (Netmon) -- and compare commercial network monitoring tools, discovering when to use each. Finally, review four of the most important networking troubleshooting scenarios, in-depth: connectivity problems, faulty applications, hardware problems, and compromised security -- walking through the process of identifying, analyzing, and solving the problem, step-by-step.For all network and Windows system administrators seeking to improve the performance of their networks.

Buy NowGet 10% OFF

Click here for more information about Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

Read More...

Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed) Review

Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)
Average Reviews:

(More customer reviews)
A very good and readable book about biometrics for network security. Note the network security part - the coverage is limited to systems that can be used in an everyday business environment. The book could be read by just about anyone, although it does help knowing a little bit about biometrics to start with. There are basically two main parts - the first one describes the different biometric technologies and their strengths and weaknesses. The second part discusses actual testing and deployment using real life examples of what to do and what not to do. I would certainly recommend this book to anyone who is actually going to implement a biometric system. Just knowing how the biometrics work is not enough to have a successful deployment. If you want to know the full details of how different biometric algorithms work, this book is probably not for you. The level of detail is just what you would take away from reading the detailed description, which I actually liked. I would recommend this book to anyone interested in network security.

Click Here to see more reviews about: Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)

The biggest vulnerability in most enterprise networks is the authenticationsystem--especially if it relies solely on passwords. And a result, many companiesare looking to combine password authentication with other authenticationmethods, most especially biometrics. The few biometrics books that do existare overview books aimed at management and/or are not written by biometricspecialists. This book is unique in its coverage of how to design and implementa successful biometric solution for your network--and, it's written by abiometrics expert.Biometrics are automated methods of recognizing a person based on aphysiological or behavioral characteristic. Among the features measured are;face, fingerprints, hand geometry, handwriting, iris, retinal, and voice.Biometric technologies are becoming the foundation of an extensive array ofhighly secure identification and personal verification solutions. As the level ofsecurity breaches and transaction fraud increases, the need for highly secureidentification and personal verification technologies is becoming apparent.

Buy Now

Click here for more information about Biometrics for Network Security (Prentice Hall Series in Computer Networking and Distributed)

Read More...