Programmer's Ultimate Security DeskRef
Title | Programmer's Ultimate Security DeskRef PDF eBook |
Author | James C Foster |
Publisher | Elsevier |
Pages | 609 |
Release | 2004-11-20 |
Genre | Computers |
ISBN | 0080480454 |
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software development lifecycle, none has yet to address the overarching technical problems of incorrect function usage. Most books fail to draw the line from covering best practices security principles to actual code implementation. This book bridges that gap and covers the most popular programming languages such as Java, Perl, C++, C#, and Visual Basic. * Defines the programming flaws within the top 15 programming languages. * Comprehensive approach means you only need this book to ensure an application's overall security. * One book geared toward many languages.
Practical Oracle Security
Title | Practical Oracle Security PDF eBook |
Author | Josh Shaul |
Publisher | Syngress |
Pages | 279 |
Release | 2011-08-31 |
Genre | Computers |
ISBN | 0080555667 |
This is the only practical, hands-on guide available to database administrators to secure their Oracle databases. This book will help the DBA to assess their current level of risk as well as their existing security posture. It will then provide practical, applicable knowledge to appropriately secure the Oracle database. - The only practical, hands-on guide for securing your Oracle database published by independent experts. - Your Oracle database does not exist in a vacuum, so this book shows you how to securely integrate your database into your enterprise.
InfoSecurity 2008 Threat Analysis
Title | InfoSecurity 2008 Threat Analysis PDF eBook |
Author | Craig Schiller |
Publisher | Elsevier |
Pages | 481 |
Release | 2011-04-18 |
Genre | Computers |
ISBN | 0080558690 |
An all-star cast of authors analyze the top IT security threats for 2008 as selected by the editors and readers of Infosecurity Magazine. This book, compiled from the Syngress Security Library, is an essential reference for any IT professional managing enterprise security. It serves as an early warning system, allowing readers to assess vulnerabilities, design protection schemes and plan for disaster recovery should an attack occur. Topics include Botnets, Cross Site Scripting Attacks, Social Engineering, Physical and Logical Convergence, Payment Card Industry (PCI) Data Security Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking. Each threat is fully defined, likely vulnerabilities are identified, and detection and prevention strategies are considered. Wherever possible, real-world examples are used to illustrate the threats and tools for specific solutions.* Provides IT Security Professionals with a first look at likely new threats to their enterprise * Includes real-world examples of system intrusions and compromised data * Provides techniques and strategies to detect, prevent, and recover * Includes coverage of PCI, VoIP, XSS, Asterisk, Social Engineering, Botnets, and Convergence
Asterisk Hacking
Title | Asterisk Hacking PDF eBook |
Author | Joshua Brashars |
Publisher | Syngress |
Pages | 273 |
Release | 2007-08-13 |
Genre | Computers |
ISBN | 0080554350 |
Asterisk Hacking provides detials of techniques people may not be aware of. It teaches the secrets the bad guys already know about stealing personal information through the most common, seemingly innocuous, highway into computer networks: the phone system. This book provides detials to readers what they can do to protect themselves, their families, their clients, and their network from this invisible threat. Power tips show how to make the most out of the phone system for defense or attack. - Contains original code to perform previously unthought of tasks like changing caller id, narrowing a phone number down to a specific geographic location, and more! - See through the eyes of the attacker and learn WHY they are motivated, something not touched upon in most other titles.
Network Security Assessment: From Vulnerability to Patch
Title | Network Security Assessment: From Vulnerability to Patch PDF eBook |
Author | Steve Manzuik |
Publisher | Elsevier |
Pages | 412 |
Release | 2006-12-02 |
Genre | Computers |
ISBN | 0080512534 |
This book will take readers from the discovery of vulnerabilities and the creation of the corresponding exploits, through a complete security assessment, all the way through deploying patches against these vulnerabilities to protect their networks. This is unique in that it details both the management and technical skill and tools required to develop an effective vulnerability management system. Business case studies and real world vulnerabilities are used through the book. It starts by introducing the reader to the concepts of a vulnerability management system. Readers will be provided detailed timelines of exploit development, vendors' time to patch, and corporate path installations. Next, the differences between security assessment s and penetration tests will be clearly explained along with best practices for conducting both. Next, several case studies from different industries will illustrate the effectiveness of varying vulnerability assessment methodologies. The next several chapters will define the steps of a vulnerability assessment including: defining objectives, identifying and classifying assets, defining rules of engagement, scanning hosts, and identifying operating systems and applications. The next several chapters provide detailed instructions and examples for differentiating vulnerabilities from configuration problems, validating vulnerabilities through penetration testing. The last section of the book provides best practices for vulnerability management and remediation.* Unique coverage detailing both the management and technical skill and tools required to develop an effective vulnerability management system* Vulnerability management is rated the #2 most pressing concern for security professionals in a poll conducted by Information Security Magazine* Covers in the detail the vulnerability management lifecycle from discovery through patch.
WarDriving and Wireless Penetration Testing
Title | WarDriving and Wireless Penetration Testing PDF eBook |
Author | Chris Hurley |
Publisher | Syngress |
Pages | 452 |
Release | 2007 |
Genre | Computers |
ISBN | 9781597491112 |
"WarDriving and Wireless Penetration Testing" brings together the premiere wireless penetration testers to outline how successful penetration testing of wireless networks is accomplished, as well as how to defend against these attacks.
Building a VoIP Network with Nortel's Multimedia Communication Server 5100
Title | Building a VoIP Network with Nortel's Multimedia Communication Server 5100 PDF eBook |
Author | Larry Chaffin |
Publisher | Elsevier |
Pages | 513 |
Release | 2006-08-31 |
Genre | Computers |
ISBN | 008050017X |
The first book published on deploying Voice Over IP (VoIP) products from Nortel Networks, the largest supplier of voice products in the world.This book begins with a discussion of the current protocols used for transmitting converged data over IP as well as an overview of Nortel's hardware and software solutions for converged networks. In this section, readers will learn how H.323 allows dissimilar communication devices to communicate with each other, and how SIP (Session Initiation Protocol) is used to establish, modify, and terminate multimedia sessions including VOIP telephone calls. This section next introduces the reader to the Multimedia Concentration Server 5100, and Nortel's entire suite of Multimedia Communications Portfolio (MCP) products. The remaining chapters of the book teach the reader how to design, install, configure, and troubleshoot the entire Nortel product line.· If you are tasked with designing, installing, configuring, and troubleshooting a converged network built with Nortel's Multimedia Concentration Server 5100, and Multimedia Communications Portfolio (MCP) products, then this is the only book you need. · It shows how you'll be able to design, build, secure, and maintaining a cutting-edge converged network to satisfy all of your business requirements· Also covers how to secure your entire multimedia network from malicious attacks