Showing posts with label Network Security. Show all posts
Showing posts with label Network Security. Show all posts

22 March, 2010

Wireless and Mobile Data Networks


Wireless and Mobile Data Networks
Publisher: Wiley-Interscience | ISBN: 0471670758 | edition 2005 | PDF | 377 pages | 15,3 mb

Wireless and Mobile Data Networks provides a single point of knowledge about wireless data technologies, including:
* Comprehensive easy-to understand resource on wireless data technologies
* Includes wireless media, data transmission via cellular networks, and network security
* Provides a single point of knowledge about wireless data
* Focuses on wireless data networks, wireless channels, wireless local networks, wide area cellular networks and wireless network security

Download:
Link_1
Or
Link_2
Or
Link_3
.

20 March, 2010

Implementing Cisco IOS Network Security


Catherine Paquet, "Implementing Cisco IOS Network Security"
Cisco Press | 2009 | ISBN: 1587058154, 1587058782 | 624 pages | PDF | 10,8 MB

Implementing Cisco IOS Network Security (IINS) is a Cisco-authorized, self-paced learning tool for CCNA® Security foundation learning. This book provides you with the knowledge needed to secure Cisco® routers and switches and their associated networks. By reading this book, you will gain a thorough understanding of how to troubleshoot and monitor network devices to maintain integrity, confidentiality, and availability of data and devices, as well as the technologies that Cisco uses in its security infrastructure.

This book focuses on the necessity of a comprehensive security policy and how it affects the posture of the network. You will learn how to perform basic tasks to secure a small branch type office network using Cisco IOS® security features available through the Cisco Router and Security Device Manager (SDM) web-based graphical user interface (GUI) and through the command-line interface (CLI) on Cisco routers and switches. The author also provides, when appropriate, parallels with Cisco ASA appliances.

Whether you are preparing for CCNA Security certification or simply want to gain a better understanding of Cisco IOS security fundamentals, you will benefit from the information provided in this book.

Implementing Cisco IOS Network Security (IINS) is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com/go/authorizedtraining.

Catherine Paquet is a practitioner in the field of internetworking, network security and security financials. Catherine has in-depth knowledge of security systems, remote access, and routing technology. She is CCSP®, CCNP®, and CompTIA Security+ certified. She is also a certified Cisco instructor with the largest training partner of Cisco. Catherine, who has her M.B.A. from York University, is the director of her consulting company, Netrisec, Inc., specializing in making the business case for network security. In 2002 and 2003, Catherine volunteered with the UN mission in Kabul, Afghanistan, to train Afghan public servants in the area of networking.

•Develop a comprehensive network security policy to counter threats against information security
•Configure routers on the network perimeter with Cisco IOS Software security features
•Configure firewall features including ACLs and Cisco IOS zone-based policy firewalls to perform basic security operations on a network
•Configure site-to-site VPNs using Cisco IOS features
•Configure IPS on Cisco network routers
•Configure LAN devices to control access, resist attacks, shield other network devices and systems, and protect the integrity and confidentiality of network traffic
This volume is in the Certification Self-Study Series offered by Cisco Press®. Books in this series provide officially developed self-study solutions to help networking professionals understand technology implementations and prepare for the Cisco Career Certifications examinations.

Download:
Link_1
Or
Link_2
.

Voice over IP Security


Patrick Park, "Voice over IP Security"
Cisco Press | 2008 | ISBN: 1587054698, 1587058200 | 384 pages | PDF | 3 MB

VoIP security issues are becoming increasingly serious because voice networks and services cannot be protected from recent intelligent attacks and fraud by traditional systems such as firewalls and NAT alone. After analyzing threats and recent patterns of attacks and fraud, consideration needs to be given to the redesign of secure VoIP architectures with advanced protocols and intelligent products, such as Session Border Controller (SBC). Another type of security issue is how to implement lawful interception within complicated service architectures according to government requirements.

Voice over IP Security focuses on the analysis of current and future threats, the evaluation of security products, the methodologies of protection, and best practices for architecture design and service deployment. This book not only covers technology concepts and issues, but also provides detailed design solutions featuring current products and protocols so that you can deploy a secure VoIP service in the real world with confidence.

Voice over IP Security gives you everything you need to understand the latest security threats and design solutions to protect your VoIP network from fraud and security incidents.

Patrick Park has been working on product design, network architecture design, testing, and consulting for more than 10 years. Currently Patrick works for Cisco® as a VoIP test engineer focusing on security and interoperability testing of rich media collaboration gateways. Before Patrick joined Cisco, he worked for Covad Communications as a VoIP security engineer focusing on the design and deployment of secure network architectures and lawful interception (CALEA). Patrick graduated from the Pusan National University in South Korea, where he majored in computer engineering.

Understand the current and emerging threats to VoIP networks

Learn about the security profiles of VoIP protocols, including SIP, H.323, and MGCP

Evaluate well-known cryptographic algorithms such as DES, 3DES, AES, RAS, digital signature (DSA), and hash function (MD5, SHA, HMAC)

Analyze and simulate threats with negative testing tools

Secure VoIP services with SIP and other supplementary protocols

Eliminate security issues on the VoIP network border by deploying an SBC

Configure enterprise devices, including firewalls, Cisco Unified Communications Manager, Cisco Unified Communications Manager Express, IP phones, and multilayer switches to secure VoIP network traffic

Implement lawful interception into VoIP service environments

This IP communications book is part of the Cisco Press® Networking Technology Series.

Download:
Link_1
Or
Link_2
.

12 March, 2010

Cracking Codes and Cryptograms For Dummies


Denise Sutherland, Mark Koltko-Rivera, "Cracking Codes and Cryptograms For Dummies"
For Dummies | 2009 | ISBN: 0470591005 | 336 pages | PDF | 8,3 MB

The fast and easy way to crack codes and cryptograms

Did you love Dan Brown’s The Lost Symbol? Are you fascinated by secret codes and deciphering lost history? Cracking Codes and Cryptograms For Dummies shows you how to think like a symbologist to uncover mysteries and history by solving cryptograms and cracking codes that relate to Freemasonry, the Knights Templar, the Illuminati, and other secret societies and conspiracy theories.

You’ll get easy-to-follow instructions for solving everything from the simplest puzzles to fiendishly difficult ciphers using secret codes and lost symbols.
Over 350 handcrafted cryptograms and ciphers of varying types
Tips and tricks for cracking even the toughest code
Sutherland is a syndicated puzzle author; Koltko-Rivera is an expert on the major symbols and ceremonies of Freemasonry

With the helpful information in this friendly guide, you’ll be unveiling mysteries and shedding light on history in no time!

Download:
Link_1
Or
Link_2
.

02 March, 2010

Cisco NAC Appliance: Enforcing Host Security with Clean Access


Cisco NAC Appliance: Enforcing Host Security with Clean Access
Publisher: Cisco Press | ISBN: 1587053063 | edition 2007 | PDF | 576 pages | 21,3 mb

This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end self-defending networks.

Download:
Link_1
Or
Link_2
Or
Link_3
.

27 February, 2010

Firewalls and Internet Security: Repelling the Wily Hacker


Firewalls and Internet Security: Repelling the Wily Hacker
Publisher: Addison-Wesley Professional | ISBN: 020163466X | edition 2003 | PDF | 464 pages | 56,4 mb

Firewalls and Internet Security: Repelling the Wily Hacker gives invaluable advice and practical tools for protecting our computers. You will learn how to plan and execute a security strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services. In particular, the authors show step-by-step how to set up a "firewall" gateway - a dedicated computer equipped with safeguards that acts as a single, more easily defended, Internet connection. They even include a description of their most recent gateway, the tools they used to build it, and the hacker attacks they devised to test it. In addition, there is vital information on cryptography, a description of the tools used by hackers, and the legal implications of computer security. With Firewalls and Internet Security, anyone will be well equipped to provide their organization with effective protection from the wily Internet hacker.

Download:
Link_1
Or
Link_2
.

15 February, 2010

Microsoft Forefront Threat Management Gateway (TMG) Administrator’s


Microsoft Forefront Threat Management Gateway (TMG) Administrator’s Companion
Publisher: Microsoft Press | ISBN: 0735626383 | Jan 2010 | PDF | 1056 pages | 20.2 Mb

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft(R) Forefront(R) Threat Management Gateway (TMG). You’ll gain the real-world insights, implementation and configuration best practices, and management practices you need for on-the-job results.

Discover how to:
* Implement TMG
* integrated security features
* Analyze your Web and perimeter security requirements and infrastructure
* Plan, install, and configure TMG
* Implement network intrusion prevention, proxy, caching, filtering
* Configure security for the Web, Microsoft(R) Exchange Server, and SharePoint(R) Products and Technologies
* Implement remote access and site-to-site VPNs
* Select and configure clients
* Monitor and troubleshoot protected systems with Network Monitor 3 and other tools
* Use scripting to configure systems and automate administration
* Plus, get a fully searchable eBook on the companion CD

Download:
Link_1
Or
Link_2
.

28 December, 2009

Complete Guide to CISM Certification


Complete Guide to CISM Certification
Publisher: AUERBACH | ISBN: 0849353564 | edition 2006 | PDF | 476 pages | 10,2 mb

Complete Guide to CISM Certification describes the tasks performed by information security managers and offers the necessary knowledge to manage, design, and oversee an information security program. The author explains each task and related knowledge statement, as well as applicable information security management principles, practices, and strategies. The book also covers the areas of information security governance, risk management, information security program management, information security management, and response management. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Download:
Link_1
Or
Link_2
.

22 December, 2009

MPLS VPN Security


MPLS VPN Security
Cisco Press | June 18, 2005 | ISBN: 1587051834 | 312 pages | CHM | 5.2 MB

A practical guide to hardening MPLS networks

* Define "zones of trust" for your MPLS VPN environment
* Understand fundamental security principles and how MPLS VPNs work
* Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network’s backbone, misconfigurations, sniffing, and inside attack forms
* Identify VPN security requirements, including robustness against attacks, hiding of the core infrastructure, protection against spoofing, and ATM/Frame Relay security comparisons
* Interpret complex architectures such as extranet access with recommendations of Inter-AS, carrier-supporting carriers, Layer 2 security considerations, and multiple provider trust model issues
* Operate and maintain a secure MPLS core with industry best practices
* Integrate IPsec into your MPLS VPN for extra security in encryption and data origin verification
* Build VPNs by interconnecting Layer 2 networks with new available architectures such as virtual private wire service (VPWS) and virtual private LAN service (VPLS)
* Protect your core network from attack by considering Operations, Administration, and Management (OAM) and MPLS backbone security incidents

Multiprotocol Label Switching (MPLS) is becoming a widely deployed technology, specifically for providing virtual private network (VPN) services. Security is a major concern for companies migrating to MPLS VPNs from existing VPN technologies such as ATM. Organizations deploying MPLS VPNs need security best practices for protecting their networks, specifically for the more complex deployment models such as inter-provider networks and Internet provisioning on the network.

MPLS VPN Security is the first book to address the security features of MPLS VPN networks and to show you how to harden and securely operate an MPLS network. Divided into four parts, the book begins with an overview of security and VPN technology. A chapter on threats and attack points provides a foundation for the discussion in later chapters. Part II addresses overall security from various perspectives, including architectural, design, and operation components. Part III provides practical guidelines for implementing MPLS VPN security. Part IV presents real-world case studies that encompass details from all the previous chapters to provide examples of overall secure solutions.

Drawing upon the authors’ considerable experience in attack mitigation and infrastructure security, MPLS VPN Security is your practical guide to understanding how to effectively secure communications in an MPLS environment.

Download:
Link_1
Or
Link_2
.

12 December, 2009

Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle


Special Ops: Host and Network Security for Microsoft, UNIX, and Oracle
Syngress | ISBN: 1931836698 | February 17, 2003 | 1040 pages | PDF | 11 MB

Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the "bad guys," but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other's data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books.

Download:
Link_1
Or
Link_2
.

Practical Unix & Internet Security, Second Edition


Simson Garfinkel, Gene Spafford PH.D., Practical Unix & Internet Security, Second Edition
O'Reilly | ISBN: 1565921488 | 1996 | CHM | 1000 pages | 2.51 MB

This book is a practical guide to UNIX security. For users, we explain what computer security is, describe some of the dangers that you may face, and tell you how to keep your data safe and sound. For administrators, we explain in greater detail how UNIX security mechanisms work and tell how to configure and administer your computer for maximum protection. For everybody, we try to teach something about UNIX's internals, its history, and how to keep yourself from getting burned.

Download:
Link_1
.

08 December, 2009

How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN


How Secure is Your Wireless Network? Safeguarding Your Wi-Fi LAN
Prentice Hall | September 5, 2003 | ISBN: 0131402064 | 224 pages | PDF | 3.11 MB

Now you can have the awesome benefits of wireless LANs without falling victim to their notorious security flaws. Leading wireless security expert Lee Barken shows you practical workarounds and fixes for the vulnerabilities in today'sWLANs, introduces high-security wireless protocols new to the market place, and offers step-by-step instructions for protectingall your wireless information, from the home to the enterprise.This is the definitive and easy-to-use WLAN security book you've been searching for--whether you're a network administrator,security specialist, manager, or home user.

Download:
Link_1
.

04 December, 2009

Internet Firewalls and Network Security

Karanjit S. Siyan, Internet Firewalls and Network Security
New Riders Publishing ISBN: 1562056328 1996 PDF 720 pages 10.11 MB
Internet Firewalls and Network Security succeeds precisely because of its restricted focus: half of this book is devoted to firewalls and packet filters. After a comprehensive introduction to the architecture and theory of firewalls, the guide documents several commercial and noncommercial packages, including a shareware product included on the bundled CD-ROM. One of the book's highlights is a fine chapter on defining a network policy. Coauthor Chris Hare is a contributor to SysAdmin magazine, and it shows. This section feels like it was written for real-world network administrators, whether beginning or experienced. There are some weaker points, including an introduction to TCP/IP and Unix basics with too many details for the beginner and too few for the expert. But these flaws are more than offset by the depth of information you'll find on the book's core subjects.
Download:
.

27 November, 2009

Wireless Security: Models, Threats, and Solutions


Panos C. Lekkas, Wireless Security: Models, Threats, and Solutions
McGraw-Hill | ISBN: 0071380388 | 2001 | PDF | 657 pages | 5.95 MB

This book is also an encyclopedic guide to the state of the art with: Encryption algorithms you can use now, End-to-end hardware solutions and field programmable gate arrays, An extensive guide to speech cryptology, Authentication strategies and security protocols for wireless systems, Infosec and infowar experience, Adding satellites to your security mix and much more.

Download:
Link_1
.

02 November, 2009

Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions


Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions
544 pages | McGraw-Hill Osborne Media; 2 edition (September 10, 2009) | 0071626778 | PDF | 8 Mb

The latest strategies for investigating cyber-crime

Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with council, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases.

Effectively uncover, capture, and prepare evidence for investigation
Store and process collected data in a highly secure digital forensic lab
Restore deleted documents, partitions, user activities, and file systems
Analyze evidence gathered from Windows, Linux, and Macintosh systems
Use the latest Web and client-based e-mail tools to extract relevant artifacts
Overcome the hacker's anti-forensic, encryption, and obscurity techniques
Unlock clues stored in cell phones, PDAs, and Windows Mobile devices
Prepare legal documents that will hold up to judicial and defense scrutiny

Download:
Link_1
Or
Link_2
Or
Link_3
.

31 October, 2009

Security of Mobile Communications


Noureddine Boudriga, "Security of Mobile Communications"
AUERBACH | ISBN: 0849379415 | 2009 | 630 pages | PDF | 4,6 MB

The explosive demand for mobile communications is driving the development of wireless technology at an unprecedented pace. Unfortunately, this exceptional growth is also giving rise to a myriad of security issues at all levels — from subscriber to network operator to service provider.

Providing technicians and designers with a critical and comprehensive resource, Security of Mobile Communications brings together the policies, practices, and guidelines needed to identify and address the security issues related to today’s wireless sensor networks, satellite services, mobile e-services, and inter-system roaming and interconnecting systems. It details the major mobile standards for securing mobile communications and examines the architectures able to provide data confidentiality, authentication, integrity, and privacy in various wireless environments.

This book will serve as an invaluable resource for those looking to identify and ameliorate security issues. Professor Noureddine Boudriga, an internationally recognized authority, goes beyond analysis, standards, and guidelines to define the roles and responsibilities that network operators, service providers, and even customers need to fulfill to assure our mobile communications are as secure as they are prolific.

Download:
Link_1
Or
Link_2
.

25 October, 2009

CCIE Security Exam Certification Guide (CCIE Self-Study)


CCIE Security Exam Certification Guide (CCIE Self-Study)
Publisher: Cisco Press | ISBN: 1587201356 | edition 2005 | CHM | 720 pages | 14,54 mb

Official self-study test preparation guide for the CCIE Security written exam 350-018
Updated content covers all the latest CCIE Security written exam 2.0 objectives, including:
* AES, EAP, IOS SSH, RDEP, and intrusion prevention
* DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and SNMP
* Password security, password recovery, and standard and extended access lists
* Encryption technologies and security protocols, including IPSec, AES, 3DES, TACACS+, and RADIUS
* Cisco security applications, including Cisco Secure PIX® Firewall, VPN, IDS, IPS, and Cisco Policy Manager
* Basic security methods and the evolution of new secure networks including packet filtering, proxies, and NAT/PAT
* Cisco security applications such as the VPN 3000, client-side VPNs, and service modules

Download:
Link_1
Or
Link_2
Or
Link_3
.

Eleventh Hour Security+: Exam SY0-201 Study Guide


Eleventh Hour Security+: Exam SY0-201 Study Guide
232 pages | Syngress; Stg edition (October 29, 2009) | 1597494275 | PDF | 1 Mb

This book will focus on just the essentials needed to pass the Security+ certification exam. It will be filled with critical information in a way that will be easy to remember and use for your quickly approaching exam. It will focus on the main objectives of the exam and include the following pedagogy for ease of use in those final hours.

The book will include:
.Exam Objectives - Fast Track Review
.Key words/definitions
.Five Toughest questions and their answers
.Exam Warnings - What to pay attention to

The only book keyed to the new SY0-201 objectives that has been crafted for last minute cramming
Easy to find, essential material with no fluff - this book does not talk about security in general, just how it applies to the test
Includes review of five toughest questions by topic - sure to improve your score

Download:
Link_1
Or
Link_2
.

20 October, 2009

CISSP: Certified Information Systems Security Professional Study Guide


CISSP: Certified Information Systems Security Professional Study Guide
Publisher: Sybex Inc | ISBN: 0782141757 | edition 2003 | CHM | 754 pages | 1,7 mb

IT security skills are in high demand, and the CISSP Study Guide can give you the skills you need to pursue a successful career as an IT security professional. Sponsored by (ICS2), CISSP was selected as one of the "10 Hottest Certifications for 2002" by the leading certification web site, CertCities.com. It was developed to validate mastery of an international standard for information security. Topics covered include security architecture, access control systems, cryptography, operations and physical security, law, investigation & ethics. Written by IT security experts with years of real-world security experience, this book provides in-depth coverage of all official exam domains and includes hundreds of challenging review questions, electronic flashcards, and a searchable electronic version of the entire book.

Download:
Link_1
Or
Link_2
.

31 August, 2009

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition


Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Publisher: Wiley | ISBN: 0471128457 | edition 1995 | PDF | 784 pages | 2,94 mb

Cryptographic techniques have applications far beyond the obvious uses of encoding and decoding information. For Internet developers who need to know about capabilities, such as digital signatures, that depend on cryptographic techniques, there's no better overview than Applied Cryptography, the definitive book on the subject. Bruce Schneier covers general classes of cryptographic protocols and then specific techniques, detailing the inner workings of real-world cryptographic algorithms including the Data Encryption Standard and RSA public-key cryptosystems. The book includes source-code listings and extensive advice on the practical aspects of cryptography implementation, such as the importance of generating truly random numbers and of keeping keys secure.

Download:
Link_1
Or
Link_2
Or
Link_3
.