Hacking Exposed Windows, 3rd EditionMeet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors and contributors many years as security professionals hired to break into the world's largest IT infrastructures. ...
Hacking Exposed Web 2.0Protect your Web 2.0 architecture against the latest wave of cybercrime using expert tactics from Internet security professionals. Hacking Exposed Web 2.0 shows how hackers perform reconnaissance, choose their entry point, and attack Web 2.0 - based services, and reveals detailed countermeasures and defense techniques. You'll learn how to avoid injection and buffer overflow attacks, fix browser and plug-in flaws, and secure AJAX, Flash, and XML-driven applications. Real-world case studies illustrate social networking site weaknesses, cross-site attack methods, migration vulnerabilities, and IE shortcomings. ...
Security MetricsSecurity Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. ...
Network Security Hacks, 2nd EditionIn the fast-moving world of computers, things are always changing. Since the first edition of this strong-selling book appeared two years ago, network security techniques and tools have evolved rapidly to meet new and more sophisticated threats that pop up with alarming regularity. The 2nd edition offers both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and Mac OS X servers that not only enable readers to secure TCP/IP-based services, but helps them implement a good deal of clever host-based security techniques as well. ...
Linux Network Administrator's Guide, 3rd EditionThe Linux Network Administrator's Guide, 3rd Edition dispenses all the practical advice you need to join a network. Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system - including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems. But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. ...
Microsoft Windows XP Networking and Security Inside OutDig into Windows XP - and discover how you can really put its networking and security features to work! Also covering Windows 2000, this supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and handy workarounds in concise, fast-answer format. It's all muscle and no fluff. Find the best and fastest ways to perform everyday networking tasks, and challenge yourself to new levels of mastery! ...
Network Security with OpenSSLOpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the practical, this book provides only the information that is necessary to use OpenSSL safely and effectively. ...