Showing posts with label security. Show all posts
Showing posts with label security. Show all posts

Security In Distributed Computing: Did You Lock the Door? Review

Security In Distributed Computing: Did You Lock the Door
Average Reviews:

(More customer reviews)
This author does a good job of explaining and including the latest IT security applications & tools involved with the new concept & efficient network system of Distributing Computing; while pointing out that this new technology has a lot of weaknesses as far as vulnerability to outside attacks or other abuse etc. He also gives a lot of examples & information on how to best implement security measures to protect this type of network design & still allow an organization to take advantage of its benefits, but in a safer way that protects vital data & information.

Click Here to see more reviews about: Security In Distributed Computing: Did You Lock the Door

An end-to-end guide to safeguarding a company's information assets.Identifies key issues in computer security, and the technologies that can help organizations respond. Presents guidance on developing a distributed systems architecture and methodology that is inherently more secure. Shows how to secure distributed transaction processing systems. Covers the human and organizational aspects of security. Discusses security issues that affect PCs, workstations and mainframes, with especially detailed coverage of UNIX security issues.Anyone responsible for architecting, building, managing or auditing distributed computing applications, including software developers, project managers, system and network administrators, and security officers.

Buy Now

Click here for more information about Security In Distributed Computing: Did You Lock the Door

Read More...

Computer Security Fundamentals Review

Computer Security Fundamentals
Average Reviews:

(More customer reviews)
I am using this book for an introduction to computer security course I teach. It has the breadth of topics I need (fundamentals of viruses, trojan horses, denial of service, firewalls, IDS, anti spyware, etc.). It even has some material few introductory books cover (cryptography, identity theft).
It has excellent exercises and review questions. I can unequivocally recomend it.

Click Here to see more reviews about: Computer Security Fundamentals

KEY BENEFIT: This gateway into the world of computer security provides one-volume coverage of all the basic concepts, terminology and issues, along with practical skills essential to security. Topics covered range from those commonly found in security books such as virus attacks, buffer overflow, hacking spyware and network defense, as well as more specialized areas including cyber terrorism, industrial espionage and encryption. Providing a comprehensive introduction, this volumes examines assessing a target system, denial of service attacks, malware, basics of assessing and securing a system, encryption, Internet fraud, and cyber crime, industrial espionage, cyber terrorism and information warfare, cyber detective, security hardware and software. For system analysts network administrators, network security professionals and security audit professionals.

Buy NowGet 20% OFF

Click here for more information about Computer Security Fundamentals

Read More...

Applied Information Security Review

Applied Information Security
Average Reviews:

(More customer reviews)
Excellent book for people who are interested in learning more about information Security. It is geared towards both beginner and advanced users. This book will give you an insight on what the Information security field is like and also will introduce you to some concepts that will challenge your understanding and knowledge of network security.

Click Here to see more reviews about: Applied Information Security

Applied Information Security guides readers through the installation and basic operation of IT Security software used in the industry today. Dos Commands; Password Auditors; Data Recovery & Secure Deletion; Packet Sniffer; Port Scanners; Vulnerability Scanners; Monitoring Software; Porn & Spam Filters; Tracing & Information Gathering; Honeypots And Intrusion Detection Systems; File Integrity Checkers & System Monitors; Forensics; Alternate Data Streams; Cryptography And Steganography; Security Readings; Wireless; Sql Injection; Linux Primer; Web Servers; Utilities & Other; Intermediate & Advanced For readers looking for hands-on assignments in IT Security.

Buy NowGet 4% OFF

Click here for more information about Applied Information Security

Read More...

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting Review

Network Monitoring and Analysis: A Protocol Approach to Troubleshooting
Average Reviews:

(More customer reviews)
I bought this book to learn about Windows NT troubleshooting, but now I'm not sure I can trust anything it says about that area, since it has so many mistakes in the area that I do know, TCP/IP. Errors abound when discussing the IP header. The Type of Service discussion doesn't distinguish between the TOS field and the TOS bits, whose meaning are obsolete anyway. It doesn't discuss Precedence, which really is used, for exampe, VoIP uses precedence 5. IP source routing, which nobody uses anyway, is explained in a completely muddled way and the example shows someone setting that option when pinging from 10.0.0.60 to 10.0.0.10, which would be a really silly use of the option. The book also has lots of typos and badly-written sentences. Where was the editor? You would think Prentice Hall could hire editors. The SPX chapter starts with this, "The SPX/IPX protocol is a still a common occurrence on many corporate networks." The only mention of AppleTalk is in the list of Application-layer protocols where it has two entries that say this: AppleTalk and Appleshare apples networking protocol suite AFP apples protocol for remote file access AppleTalk shoudn't be in the list and couldn't they have used an editor who knew what Apple means in the computer industry?

Click Here to see more reviews about: Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

Ever wonder what in the world is happening "under the hood" of your network? Why things suddenly slow down, print jobs fail? Network monitoring is the least understood aspect of network administration -- and one of the most important. In this book, a leading networking expert shows you exactly how to monitor and analyze your Windows-based network -- and how to use the information to maximize performance, reduce congestion, plan for growth -- even identify intrusions! Start by reviewing the TCP/IP, IPX/SPX, Ethernet, and Samba protocol basics you need in order to monitor and analyze networks effectively. Inspect network traffic from four different perspectives: client traffic, server traffic, application traffic, and service traffic. Next, learn how to use each version of Microsoft's Network Monitor (Netmon) -- and compare commercial network monitoring tools, discovering when to use each. Finally, review four of the most important networking troubleshooting scenarios, in-depth: connectivity problems, faulty applications, hardware problems, and compromised security -- walking through the process of identifying, analyzing, and solving the problem, step-by-step.For all network and Windows system administrators seeking to improve the performance of their networks.

Buy NowGet 10% OFF

Click here for more information about Network Monitoring and Analysis: A Protocol Approach to Troubleshooting

Read More...

The Art of Computer Networking Review

The Art of Computer Networking
Average Reviews:

(More customer reviews)
This book was a pleasure to read. Computer Networking is a complex, jumbled subject, and probably one of the most difficult to explain. The range of material to cover was well-chosen and organized. The writing was clear and easy to follow. I only wish the book had been larger and covered more.

Click Here to see more reviews about: The Art of Computer Networking

A focussed and practical text suitable for a first course in Computer Networking.

Buy NowGet 39% OFF

Click here for more information about The Art of Computer Networking

Read More...

Understanding Terrorism: Groups, Strategies, and Responses (2nd Edition) Review

Understanding Terrorism: Groups, Strategies, and Responses (2nd Edition)
Average Reviews:

(More customer reviews)
The book came to me a lot later than I had thought it would being I paid the extra money to get a rush delivery, I could have saved my money.
the book was in ok condition, the cover had been bent, but overall it was in good shape.

Click Here to see more reviews about: Understanding Terrorism: Groups, Strategies, and Responses (2nd Edition)

This comprehensive and completely up-to-date book provides a straightforward introduction to terrorism that helps readers better understand this complex subject. The book identifies terrorist groups, reviews terrorist tactics, and examines police and government responses to reduce or eliminate the incidence of terrorism. Fully updated to include coverage of Al Qaeda, suicide bombers, specific threats posed by weapons of mass destruction, and the latest counter-terrorism strategies, Understanding Terrorism: Groups, Strategies and Responses 2e brings together the latest scholarship and coverage of the latest world events to bring you the most complete and most current introduction to terrorism book currently available. Reaches a broad audience from the criminal justice professional to the vigilant civilian.

Buy Now

Click here for more information about Understanding Terrorism: Groups, Strategies, and Responses (2nd Edition)

Read More...

Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series) Review

Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series)
Average Reviews:

(More customer reviews)
At first glance one would think that this text was an extended introduction to the concepts of clusters as well as considerable discussion about interesting limits in latency and communcation speeds in inter-cluster connections. It completely lacks any real "essentials" that would aid the reader in the creation of a cluster, the administration or even something as "essential" as the cluster storage that is needed. This book may look like it provides the essential but it simply fails utterly in this respect. Does it provide information? Yes. If you would like to read about some of the things that were done at Sun Labs to make this happen and perhaps have long reads about the various ways that you *could* create a cluster then fine. However, don't buy this book thinking that there are any essentials. There are not. It does not even talk about simple things like the patches you need for Sun Cluster 3.2 on your Solaris 10 10/09 install.

Click Here to see more reviews about: Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series)

Thousands of IT organizations have adopted clustering to improve the availability of mission-critical software services. Today, with the rapid growth of cloud computing environments, clustering is even more crucial.
Oracle® Solaris Cluster Essentials is a comprehensive, authoritative guide to the industry's most stable, robust clustering platform: Oracle Solaris Cluster. This book covers both Oracle Solaris Cluster 3.2 and Oracle Solaris Cluster Geographic Edition in thorough detail, offering start-to-finish lifecycle guidance for planning, implementation, management, and troubleshooting.

Written by Oracle Solaris Cluster expert Tim Read, this book covers both high availability and disaster recovery features, and offers in-depth guidance for both Oracle and non-Oracle database environments. It also presents several example implementations that can be used to quickly construct effective proofs-of-concept.

Whether you're new to clustering or upgrading from older solutions, this book brings together all the information you'll need to maximize the value, reliability, and performance of any Oracle Solaris Cluster environment. You'll learn how to


Understand Oracle Solaris Cluster's product features and architecture, and their implications for design and performance
Establish requirements and design clustered systems that meet them
Master best practices for integrating clustering with virtualization technologies
Implement proven disaster recovery planning techniques
Efficiently maintain Oracle Solaris Cluster environments

Part of the Oracle Solaris System Administration Series, Oracle® Solaris Cluster Essentials combines a complete technology introduction and hands-on guide for every architect, administrator, and IT manager responsible for high availability and business continuity.


Buy NowGet 22% OFF

Click here for more information about Oracle Solaris Cluster Essentials (Oracle Solaris System Administration Series)

Read More...