How to cheat at designing a Windows Server 2003 [electronic resource] : Active Directory infrastructure / Melissa M. Meyer ... [et al.]. |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub. |
Descrizione fisica | xxi, 505 p. : ill. ; 23 cm. |
Disciplina | 005.4/47682 |
Altri autori (Persone) | Meyer, Melissa M. |
Soggetto topico | Directory services (Computer network technology) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490580
159749058X |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: The Assessment Stage -- Chapter 2: Developing the Active Directory Infrastructure Design -- Chapter 3: Developing the Network Service Design Chapter 4: Designing the Logical Components -- Chapter 5: Name Resolution -- Chapter 6: Remote Access and Address Management Chapter 7: Service Sizing and Placement -- Chapter 8: The Physical Design. |
Record Nr. | UNISALENTO-991003250879707536 |
Rockland, MA : Syngress Pub. | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
How to cheat at managing information security [electronic resource] / Mark Osborne ; Paul M. Summitt, technical editor |
Autore | Osborne, Mark |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xxv, 315 p. : ill. ; 23 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Summitt, Paul M. |
Soggetto topico |
Computer security - Management
Information technology - Security measures |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597491105
1597491101 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1: Preface and Introduction Chapter 2: The Security Organization Chapter 3: The Information Security Policy Chapter 4: Jargon, principles and concepts Chapter 5: Information Security laws and regulations Chapter 6: Information Security Standards and Audits Chapter 7: Interviews, Bosses and Staff Chapter 8: Infrastructure security Chapter 9: Firewalls Chapter 10: Intruder detection systems Theory Chapter 11: Intruder detection systems In Practice Chapter 12: Intruder Prevention and Protection Chapter13: Network penetration testing Chapter14: Application security flaws and application testing. |
Record Nr. | UNISALENTO-991003251459707536 |
Osborne, Mark
![]() |
||
Rockland, MA : Syngress | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Intrusion prevention and active response [electronic resource] : deploying network and host IPS / Michael Rash ... [et al.] ; foreword by Stephen Northcutt |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xx, 402 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Rash, Michael (Michael Brandon) author |
Soggetto topico |
Computer networks - Security measures
Computer network protocols Computers - Access control Data protection |
Soggetto genere / forma | Electronic books. |
ISBN |
9781932266474
193226647X |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to Intrusion Prevention ; False Positives and Real Damage ; Data Link IPS ; Network IPS ; Transport IPS ; Application Layer Responses ; Host IPS Actions ; Hybrid IPS Actions ; Network Inline Data Modification. |
Record Nr. | UNISALENTO-991003259499707536 |
Rockland, MA : Syngress | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Microsoft log parser toolkit [electronic resource] / Gabriele Giuseppini, Mark Burnett |
Autore | Giuseppini, Gabriele |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xxvi, 437 p. : ill. ; 24 cm. |
Disciplina | 005.713 |
Altri autori (Persone) | Burnett, Mark. author |
Soggetto topico |
Parsing (Computer grammar) - Software
Data mining - Handbooks, manuals, etc File organization (Computer science) - Handbooks, manuals, etc |
Soggetto genere / forma | Electronic books. |
ISBN |
9781932266528
1932266526 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Parsing Logfile Data ; Assuring IIS Performance and Stability ; Tracking Down Intruders ; Getting the Most from Exchange Server Logs ; Finding Knowledge in the Windows EventLog ; Tracking ISA Server Logs ; Enhancing Log Parser with Custom Input Processors ; Formatting, Reporting, and Charting ; The Log Parser Security Audit ; Keeping an Eye on Critical Servers ; Working with Tricky Data ; Converting, Rotating, and Archiving Logs ; Log Parser: The All-Purpose Hacker's Tool ; Studying Firewall, IDS, and Router Logs ; Appendix A: Log Parser SQL Grammar Reference ; Appendix B: Log Parser Function Reference ; Appendix C: Log Parser Input Format Reference ; Appendix D: Log Parser Output Format Reference. |
Record Nr. | UNISALENTO-991003259659707536 |
Giuseppini, Gabriele
![]() |
||
Rockland, MA : Syngress | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Network security evaluation using the NSA IEM [electronic resource] / Russ Rogers, technical editor and contributor ; Bryan Cunningham ... [et al.]. |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xxvi, 437 p. : ill. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) |
Rogers, Russ. author
Cunningham, Bryan |
Soggetto topico |
Computer networks - Security measures - Evaluation
Computer security - Evaluation Information resources management - Evaluation |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490351
1597490350 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout. |
Altri titoli varianti | Network security evaluation using the National Security Agency INFOSEC evaluation methodology |
Record Nr. | UNISALENTO-991003250319707536 |
Rockland, MA : Syngress | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Programmer's ultimate security deskref [electronic resource] / James C. Foster, Stephen C. Foster |
Autore | Foster, James C. |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub. |
Descrizione fisica | xvi, 587 p. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) | Foster, Stephen C. author |
Soggetto topico |
Computer security - Handbooks, manuals, etc
Programming languages (Electronic computers) - Handbooks, manuals, etc |
Soggetto genere / forma | Electronic books. |
ISBN |
9781932266726
1932266720 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Java Ref; C Ref; C++ Ref; Visual Basic Ref; Perl Ref; PHP Ref; Python Ref; SQL Ref; C# Ref; JavaScript Ref; SAS Ref; Lisp Ref; IDL Ref. |
Record Nr. | UNISALENTO-991003260259707536 |
Foster, James C.
![]() |
||
Rockland, MA : Syngress Pub. | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Sockets, shellcode, porting & coding [electronic resource] : reverse engineering exploits and tool coding for security professionals / James C. Foster with Mike Price ; foreword by Stuart McClure |
Autore | Foster, James C. |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub. Inc., |
Descrizione fisica | xxviii, 665 p. ; 24 cm. |
Disciplina | 005.8 |
Altri autori (Persone) |
Price, Mike. author
McClure, Stuart |
Soggetto topico |
Computer security - Handbooks, manuals, etc
Programming languages (Electronic computers) - Handbooks, manuals, etc Systèmes informatiques - Sécurité - Mesures - Guides, manuels, etc Protection de l'information (Informatique) - Guides, manuels, etc Langages de programmation - Guides, manuels, etc |
Soggetto genere / forma | Electronic books. |
ISBN |
9781597490054
1597490059 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Section 1 0-day Basics Introduction ; Security Coding ; NASL ; Section 2 Networking 0-Day Code Introduction ; BSD Sockets ; Winsock ; Java Sockets ; Section 3 - Shellcode Introduction ; Shellcode Techniques ; Writing Shellcode ; Section 4 Universal Exploitation Introduction ; Writing Portable Code ; Writing Portable Network Code ; Section 5 - Automation Introduction ; Automating Exploits I ; Automating Exploits II ; Automating Exploits III ; Automating Security Components ; Automating Identification Tools Appendices: A Glossary ; B - Technical Publications and References ; C - Tool and Application Compedium ; D - LibWhisker Primer ; E - Exploit Archives ; F - Useful Syscalls ; G - The Complete Data Conversion Table. |
Record Nr. | UNISALENTO-991003249679707536 |
Foster, James C.
![]() |
||
Rockland, MA : Syngress Pub. Inc., | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Windows to Linux migration toolkit [electronic resource] / David Allen ... [et al.] ; Christian Lahti, technical editor |
Autore | Allen, David |
Pubbl/distr/stampa | Rockland, MA : Syngress Pub. |
Descrizione fisica | xxxi, 490 p. : ill. ; 24 cm. + 1 computer optical disc (4 3/4 in.) |
Disciplina | 005.268 |
Altri autori (Persone) | Lahti, Christian |
Soggetto topico |
Systems migration - Handbooks, manuals, etc
Operating systems (Computers) - Handbooks, manuals, etc |
Soggetto genere / forma | Electronic books. |
ISBN |
9781931836395
1931836396 |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISALENTO-991003257399707536 |
Allen, David
![]() |
||
Rockland, MA : Syngress Pub. | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|
Wireless hacking projects for Wi-Fi enthusiasts [electronic resource] / by the SoCalFreeNet.org Wireless Users Group ; Lee Barken with Eric Bermel ... [et al.]. |
Autore | Barken, Lee. |
Pubbl/distr/stampa | Rockland, MA : Syngress |
Descrizione fisica | xxiii, 334 p. : ill. ; 24 cm. |
Disciplina | 004.6 |
Altri autori (Persone) | Bermel, Eric |
Soggetto topico |
Wireless LANs - Handbooks, manuals, etc
Wireless LANs - Security measures - Handbooks, manuals, etc Electronic villages (Computer networks) - Handbooks, manuals, etc IEEE 802.11 (Standard) |
Soggetto genere / forma | Electronic books. |
ISBN |
9781931836371
193183637X |
Formato | Risorse elettroniche ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Wireless Background; Indoor/Outdoor Deployment Considerations; Wireless Network Models; Hardware Projects; 802.11 Access Points; 802.11 Client Cards; Software Projects; Wireless Operating Systems; Monitoring the Network; Low-Cost Commercial Options; Mesh Networks; Antennas and Outdoor Enclosure Projectsl; Antennas; Building Outdoor Enclosures & Antenna Masts; Solar Powered Access Points and Repeaters Appendix.
pt. 1. Introduction to wireless hacking -- pt. 2. Hacking projects -- pt. 3. Software projects -- pt. 4. Antennas and outdoor enclosure projects -- Appendix: A wireless 802.11 hacks. |
Record Nr. | UNISALENTO-991003257309707536 |
Barken, Lee.
![]() |
||
Rockland, MA : Syngress | ||
![]() | ||
Lo trovi qui: Univ. del Salento | ||
|