eBooks-it.org Logo
eBooks-IT.org Inner Image

Syngress eBooks Page 2

Download free Syngress eBooks Page 2

Industrial Network Security

Securing Critical Infrastructure Networks for Smart Grid, SCADA and Other Industrial Control Systems
Industrial Network Security Image
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems describes an approach to ensure the security of industrial networks by taking into account the unique network, protocol, and application characteristics of an industrial control system, along with various compliance controls. It offers guidance on deployment and configuration, and it explains why, where, and how security controls should be implemented. Divided into 11 chapters, the book explains the basics of Ethernet and Transmission Control Protocol/Internet Protocol (TCP/IP) networking communications and the SCADA and field bus protocols. It also discusses industrial networks as they relate to "critical infrastruc...

Snort IDS and IPS Toolkit

Snort IDS and IPS Toolkit Image
This all new book covering the brand new Snort version 2.6 from members of the Snort developers team.The book will begin with a discussion of packet inspection and the progression from intrusion detection to intrusion prevention. The authors provide examples of packet inspection methods including: protocol standards compliance, protocol anomaly detection, application control, and signature matching. In addition, application-level vulnerabilities including Binary Code in HTTP headers, HTTP/HTTPS Tunneling, URL Directory Traversal, Cross-Site Scripting, and SQL Injection will also be analyzed. Next, a brief chapter on installing and configuring Snort will highlight various methods for fine tuning your installation to optimize Snort performance includin...

Inside the SPAM Cartel

Trade Secrets from the Dark Side
Inside the SPAM Cartel Image
Authored by a former spammer, this is a methodical, technically explicit expose of the inner workings of the SPAM economy. Readers will be shocked by the sophistication and sheer size of this underworld. From the Author: "You may hate spam and think all spammers are evil, but listen to my story and see why I do this and more importantly, HOW."For most people, the term "SPAM" conjures up the image of hundreds of annoying, and at times offensive, e-mails flooding their inbox every week. But for a few, SPAM is a way of life that delivers an adrenaline rush fueled by cash, danger, retribution, porn and the avoidance of local, federal, and international law enforcement agencies. "Inside the SPAM Cartel" offer readers a never-...

Microsoft Log Parser Toolkit

A complete toolkit for Microsoft's undocumented log analysis tool
Microsoft Log Parser Toolkit Image
HIGHLIGHTWritten by Microsoft's Log Parser developer, this is the first book available on Microsoft's popular yet undocumented log parser tool. The book and accompanying Web site contain hundreds of customized, working scripts and templates that system administrators will find invaluable for analyzing the log files from Windows Server, Snort IDS, ISA Server, IIS Server, Exchange Server, and other products.System administrators running Windows, Unix, and Linux networks manage anywhere from 1 to thousands of operating systems (Windows, Unix, etc.), Applications (Exchange, Snort, IIS, etc.), and hardware devices (firewalls, routers, etc.) that generate incredibly long and detailed log files of all activity on the particular application or device. This b...

Stealing the Network

How to Own the Box
Stealing the Network Image
"Stealing the Network: How to Own the Box" is NOT intended to be a "install, configure, update, troubleshoot, and defend book." It is also NOT another one of the countless Hacker books out there. So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the "street fighting" tactics used to attack networks and systems. Not just another "hacker" book, it plays on "edgy" market success of Steal this Computer Book with first hand, eyewitness account...



2007 - 2017 © eBooks-IT.org