Maximum Linux Security


Book Description

A controversial, comprehensive guide to Linux security--written by the same anonymous hacker who wrote the bestselling "Maximum Security." The book covers hundreds of Linux system holes, attack methods, hacker's tools, and security techniques. The CD-ROM includes a comprehensive collection of Linux security products, plus code examples, technical documents,




Computer Security


Book Description

We live in a wired society, with computers containing and passing around vital information on both personal and public matters. Keeping this data safe is of paramount concern to all. Yet, not a day seems able to pass without some new threat to our computers. Unfortunately, the march of technology has given us the benefits of computers and electronic tools, while also opening us to unforeseen dangers. Identity theft, electronic spying, and the like are now standard worries. In the effort to defend both personal privacy and crucial databases, computer security has become a key industry. A vast array of companies devoted to defending computers from hackers and viruses have cropped up. Research and academic institutions devote a considerable amount of time and effort to the study of information systems and computer security. Anyone with access to a computer needs to be aware of the developing trends and growth of computer security. To that end, this book presents a comprehensive and carefully selected bibliography of the literature most relevant to understanding computer security. Following the bibliography section, continued access is provided via author, title, and subject indexes. With such a format, this book serves as an important guide and reference tool in the defence of our computerised culture.




Incident Response & Computer Forensics, 2nd Ed.


Book Description

Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.




Mac OS X Maximum Security


Book Description

While Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point. Yet most Mac OS X books are generally quite simplistic -- with the exception of the author's "Mac OS X Unleashed," the first book to address OS X's underlying BSD subsystem. "Maximum Mac OS X Security" takes a similar UNIX-oriented approach, going into significantly greater depth on OS X security topics: Setup basics, including Airport and network topology security. User administration and resource management with NetInfo. Types of attacks, how attacks work, and how to stop them. Network service security, such as e-mail, Web, and file sharing. Intrusion prevention and detection, and hands-on detection tools.




Maximum Security


Book Description

Fully revised to cover the latest security technologies, this third edition provides comprehensive, platform-by-platform coverage of security issues and includes clear descriptions of the most common techniques hackers use to penetrate systems. The CD-ROM includes security products, code examples, and utilities.




Maximum PC


Book Description

Maximum PC is the magazine that every computer fanatic, PC gamer or content creator must read. Each and every issue is packed with punishing product reviews, insightful and innovative how-to stories and the illuminating technical articles that enthusiasts crave.




A Complete Hacker's Handbook


Book Description

No area of computing has generated as much mythology, speculation and sheer fascination as hacking. From Hollywood's perception of hackers as sinister, threatening cyberwizards to the computer trades' claim that such people are nothing more than criminal nerds, misunderstandings abound.




Linux Filesystems


Book Description

CD-rom contains: Samba -- Coda File System -- Logical Volume Manager (LVM) -- Benchmarking utilities -- Netatalk -- Linux kernals.




TICSA TruSecure ICSA Certified Security Associate


Book Description

TICSA (TruSecure ICSA Computer Security Associate) is an entry-level computer security certification aimed at individuals with one to three years of computer security experience. TICSA represents base level certification, and is designed for network administrators responsible for security administration of systems or networks in an enterprise.




The Computer Continuum


Book Description

For courses in Computer Concepts, Introduction to Computers, Computer Literacy, Introduction to Computer Science, Computers and Society/Computer Science. This text introduces students to the fundamental concepts in the fields of information systems and computer science by examining how technology works. It first establishes a theoretical foundation, then introduces applications that put the theory into practice. It includes topics such as binary numbers, modeling and distributive systems to take students into the theory behind how and why technology works.