eBooks-it.org Logo
eBooks-IT.org Inner Image

Security & Encryption eBooks

Download free Security & Encryption eBooks

Wireless Network Hacks & Mods

For Dummies
Wireless Network Hacks & Mods Image
Fun projects and valuable content join forces to enable readers to turn their wireless home network into a high-performance wireless infrastructure capable of entertainment networking and even home automationStep-by-step instructions help readers find, buy, and install the latest and greatest wireless equipmentThe authors are home tech gurus and offer detailed discussion on the next-generation wireless gear that will move the wireless LAN beyond computers and into telephony, entertainment, home automation/control, and even automotive networkingThe number of wireless LAN users in North America is expected to grow from 4.2 million current users to more than 31 million by 2007...

The Art of Error Correcting Coding

The Art of Error Correcting Coding Image
The Art of Error Correcting Coding provides a comprehensive coverage of the basic techniques of error concealment. It addresses the need for selecting, implementing and simulating algorithms for the encoding and decoding of codes used for error correction and detection. This practical approach uses simple and easy to follow numerical examples to describe the basic concepts of a particular coding or decoding scheme. Basic analysis tools are provided throughout to help in the assessment of the error performance block and convolutional codes of a particular Error Correcting Coding (ECC) scheme for a selection of the basic channel models.* Provides a complete treatment of important decoding algorithms including errors-and-erasures decoding of BCH and Ree...

Hardware-based Computer Security Techniques to Defeat Hackers

From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers Image
Presents primary hardware-based computer security approaches in an easy-to-read toolbox formatProtecting valuable personal information against theft is a mission-critical component of today's electronic business community. In an effort to combat this serious and growing problem, the Intelligence and Defense communities have successfully employed the use of hardware-based security devices.This book provides a road map of the hardware-based security devices that can defeatand preventattacks by hackers. Beginning with an overview of the basic elements of computer security, the book covers:CryptographyKey generation and distributionThe qualities of security solutionsSecure co-processorsSecure bootstrap loadingSecure memory management and trusted executio...

Seven Deadliest USB Attacks

Seven Deadliest USB Attacks Image
Do you need to keep up with the latest hacks, attacks, and exploits effecting USB technology? Then you need Seven Deadliest USB Attacks. This book pinpoints the most dangerous hacks and exploits specific to USB, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: USB HacksawUSB SwitchbladeUSB Based Virus/Malicous Code LaunchUSB Device OverflowRAMdumpPod SlurpingSocial Engineering and USB Technology Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globall...

Configuring Juniper Networks NetScreen & SSG Firewalls

Configuring Juniper Networks NetScreen & SSG Firewalls Image
Juniper Networks Secure Access SSL VPN appliances provide a complete range of remote access appliances for the smallest companies up to the largest service providers. This comprehensive configuration guide will allow system administrators and security professionals to configure these appliances to allow remote and mobile access for employees. If you manage and secure a larger enterprise, this book will help you to provide remote and/or extranet access for employees, partners, and customers from a single platform.Configure Juniper's Instant Virtual Extranet (IVE). Install and set up IVE through either the command line interface (CLI) or Web-based console. Master the "3 Rs": Realms, Roles, and Resources.Realize the potential of the 3Rs for en...


2007 - 2017 © eBooks-IT.org