With more than 67% of web servers running Apache, it is by far the most widely used web server platform in the world. Apache has evolved into a powerful system that easily rivals other HTTP servers in terms of functionality, efficiency, and speed. Despite these impressive capabilities, though, Apache is only a beneficial tool if it's a secure one.To be sure, administrators installing and configuring Apache still need a sure-fire way to secure it--whether it's running a huge e-commerce operation, corporate intranet, or just a small hobby site.Our new guide, Apache Security, gives administrators... View More...
Confronted by the new challenges of the information age and the post-Soviet world, the U.S. intelligence community must adapt and change. And marginal change is not enough, the authors of this provocative book insist. Bruce D. Berkowitz and Allan E. Goodman call for fundamental, radical reforms in the organization and approach of America's intelligence agencies. They show why traditional approaches to intelligence fall short today, and they propose thoughtful alternatives that take into account recent changes in information technology and intelligence requirements. An information-age intellige... View More...
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks.What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since... View More...
A comprehensive anthology of readings on computers and ethical issues surrounding their use. Can be used as a core book or supplemental readings in Computer Ethics or Computers and Society subjects.
Many excellent hardware and software products exist to protect our data communications sytems, but security threats dictate that they must be further enhanced. Many laws implemented during the past 15 years have provided law enforcement with more teeth to take a bite out of cyber crime, but there is still a need for individuals who know how to investigate computer network security incidents. Organizations demand experts with both investigative talents and a technical knowledge of how cyberspace really works. Cyber Crime Investigator's Field Guide, Second Edition provides the investigative fram... View More...
As the 21st century dawns, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy -- the most basic of our civil rights -- is in grave peril.Simson Garfinkel -- jo... View More...
- Cliff Stoll, author of The Cuckoos Egg: Tracking a Spy Through the Maze of Computer Espionage As a user of the Internet, you are fortunate to be tied into the worlds greatest communication and information exchange - but not without a price. As a result of this connection, your computer, your organizations network, and everywhere that network reaches are all vulnerable to potentially disastrous infiltration by hackers. Written by the AT&T Bell Labs researchers who tracked the infamous Berferd hacker and also built the firewall gateway at Bell Labs, Firewalls and Internet Security gives you in... View More...
Tutorial in style, this volume provides a comprehensive survey of the state-of-the-art of the entire field of computer security. First covers the threats to computer systems (which motivate the field of computer security); then discusses all the models, techniques, and mechanisms designed to thwart those threats as well as known methods for exploiting vulnerabilities; and closes with an exploration of security evaluation of computer systems--the science and art that attempts to grade a particular implementation of computer security. For engineers and scientists interested in computer se... View More...
In this text, the author of Know Your Enemy explores state-of-the-art security technologies called Honeypots. It provides examples of real world deployments and coverage of the legal issues surrounding the use of honeypots. The CD includes white papers, source code and evaluation software. View More...
- Proven--based on field experience - Authoritative--offers the best advice available - Accurate--technically validated and tested - Actionable--provides the steps to success - Relevant--addresses real-world problems based on customer scenarios View More...
By definition, information security exists to protect your organization's valuable information resources. But too often information security efforts are viewed as thwarting business objectives. An effective information security program preserves your information assets and helps you meet business objectives. Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management provides the tools you need to select, develop, and apply a security program that will be seen not as a nuisance but as a means to meeting your organization's goals. Divided i... View More...
A practical solution to defending a network, this guide focuses on integration of multiple network security components into a unified defence architecture. View More...
The brain is a fearsomely complex information-processing environment--one that often eludes our ability to understand it. At any given time, the brain is collecting, filtering, and analyzing information and, in response, performing countless intricate processes, some of which are automatic, some voluntary, some conscious, and some unconscious.Cognitive neuroscience is one of the ways we have to understand the workings of our minds. It's the study of the brain biology behind our mental functions: a collection of methods--like brain scanning and computational modeling--combined with a way of loo... View More...
The brain is a fearsomely complex information-processing environment--one that often eludes our ability to understand it. At any given time, the brain is collecting, filtering, and analyzing information and, in response, performing countless intricate processes, some of which are automatic, some voluntary, some conscious, and some unconscious.Cognitive neuroscience is one of the ways we have to understand the workings of our minds. It's the study of the brain biology behind our mental functions: a collection of methods--like brain scanning and computational modeling--combined with a way of loo... View More...
Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this.PGP, which stands for Pretty Good Privacy, is a free and widely available encryption... View More...
Use of the Internet is expanding beyond anyone's expectations. As corporations, government offices, and ordinary citizens begin to rely on the information highway to conduct business, they are realizing how important it is to protect their communications -- both to keep them a secret from prying eyes and to ensure that they are not altered during transmission. Encryption, which until recently was an esoteric field of interest only to spies, the military, and a few academics, provides a mechanism for doing this.PGP, which stands for Pretty Good Privacy, is a free and widely available encryption... View More...
Presents a Defense in Depth model for protecting various Windows networks. This book addresses the three elements of a successful security program: people, processes, and technology. It helps you learn how to integrate multiple defenses-deterring attacks, delaying them, and increasing the cost to the attacker. View More...
The Knightmare is the sort of Super Hacker who keeps security guards from sleeping at night. He's not motivated by money or malice. He's in it for the hack. If your computer has any link whatever to the outside world, there is not question. The Knightmare can break in; the only question is whether he wants to. Secrets of a Super Hacker is an extraordinary manual on the methods of hacking. Here are some of the techniques covered in this data-devouring dossier: - Brute Force Attacks: Hurling passwords at a system until it cracks. - Social Engineering and Reverse Social Engineering: Seducing legi... View More...
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals: 1. Coding - The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL. 2. Sockets - The technology that allows programs and scripts to communicate over a network is sockets. Even though the theory remains the same - communication over TCP and UDP, sockets ar... View More...
The dramatic true story of the capture of the world's most wanted cyberthief by brilliant computer expert Tsutomu Shimomura, describes Kevin Mitnick's long computer crime spree, which involved millions of dollars in credit card numbers and corporate trade secrets. Reprint. NYT. View More...
With the intense growth of e-business, we hear about an increase in hacking and technology-based criminal incidents. Institutions such as Citibank and Ebay have faced intrusions that have cost them millions of dollars in damages. With the onset of these criminal attacks, there is an increase in demand for products and services that provide more information for people. Tangled Web: Tales of Digital Crime from the Shadows of Cyberspace portrays the shadow side of cyberspace by taking you into the lairs of hackers, crackers, researchers, private investigators, law enforcement agents and intellige... View More...