Mostrando entradas con la etiqueta Security. Mostrar todas las entradas
Mostrando entradas con la etiqueta Security. Mostrar todas las entradas

11 de septiembre de 2009

Network Security - A Beginner's Guide [Ebook-PDF]


Get security best practices from one practical resource and learn the steps you need to take to effectively establish a security program appropriate for your organization.


Download Here:

http://rapidshare.com/files/255347024/Network_Security_-_A_Beginner_s_Guide.pdf

Cisco Press Cisco Network Admission Control Volume II [Ebook-PDF]


Network Admission Control (NAC) is designed to prohibit or restrict access to the secured internal network from devices with a diminished security posture until they are patched or updated to meet the minimum corporate security requirements. A fundamental component of the Cisco® Self-Defending Network Initiative, NAC enables you to enforce host patch policies and to regulate network access permissions for noncompliant, vulnerable systems.

Cisco Network Admission Control, Volume II, helps you understand how to deploy the NAC Framework solution and ultimately build a self-defending network. The book focuses on the key components that make up the NAC Framework, showing how you can successfully deploy and troubleshoot each component and the overall solution. Emphasis is placed on real-world deployment scenarios, and the book walks you step by step through individual component configurations. Along the way, the authors call out best practices and tell you which mistakes to avoid. Component-level and solution-level troubleshooting techniques are also presented. Three full-deployment scenarios walk you through application of NAC in a small business, medium-sized organization, and large enterprise.

Download Here:

http://rapidshare.com/files/254216122/Cisco_Press_Cisco_Network_
Admission_Control_Volume_II.rar

3 de septiembre de 2009

Hacking Exposed Network Security Secrets & Solutions [Ebook-PDF]


Meet the formidable demands of security in today’s hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested “attack-countermeasure” philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker’s extensive arsenal.

New and updated material:

* New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking
* Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits
* The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits
* New wireless and RFID security tools, including multilayered encryption and gateways
* All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices
* Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage
* VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking
* Fully updated chapters on hacking the Internet user, web hacking, and securing code


Download Here:

http://rapidshare.com/files/254684137/Hacking_Exposed_Network_Security_
Secrets___Solutions.rar

Firewall Policies And VPN Configurations [Ebook-PDF]


The security provided by firewalls and VPNs is only as strong as the protocol rules and policies that you create. The concepts of "defense-in-depth" and "least privilege" are merely holes in your perimeter waiting to be exploited, unless you can define and maintain protocol rules that allow only the minimum protocols required to provide your requisite services.

This book provides fundamental information necessary to configure firewalls and build VPNs and DMZs to survive the dangers of today's internet. The book includes a bonus chapter from the companion Web site on using Ethereal to monitor and analyze network traffic. While you may now feel overwhelmed by the countless firewalls with a dizzying array of features, you will feel empowered by the knowledge gained from this book. This book covers the leading firewall products. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections. Products covered include Cisco PIX Firewall, ISA Server 2004, Check Point NGX, Juniper'?s NetScreen Firewalls, SonicWall, and Nokia.

Download Here:

http://rapidshare.com/files/256080237/Firewall_Policies_And_VPN_Configurations.rar

Cisco Intrusion Prevention Fundamentals [Ebook-CHM]


An introduction to network attack mitigation with IPS Where did IPS come from? How has it evolved? How does IPS work? What components does it have? What security needs can IPS address? Does IPS work with other security products? What is the “big picture”? What are the best practices related to IPS? How is IPS deployed, and what should be considered prior to a deployment? Intrusion Prevention Fundamentals offers an introduction and in-depth overview of Intrusion Prevention Systems (IPS) technology. Using real-world scenarios and practical case studies, this book walks you through the lifecycle of an IPS project–from needs definition to deployment considerations. Implementation examples help you learn how IPS works, so you can make decisions about how and when to use the technology and understand what “flavors” of IPS are available. The book will answer questions like: Whether you are evaluating IPS technologies or want to learn how to deploy and manage IPS in your network, this book is an invaluable resource for anyone who needs to know how IPS technology works, what problems it can or cannot solve, how it is deployed, and where it fits in the larger security marketplace. Understand the types, triggers, and actions of IPS signatures Deploy, configure, and monitor IPS activities and secure IPS communications Learn the capabilities, benefits, and limitations of host IPS Examine the inner workings of host IPS agents and management infrastructures Enhance your network security posture by deploying network IPS features Evaluate the various network IPS sensor types and management options Examine real-world host and network IPS deployment scenarios This book is part of the Cisco Press® Fundamentals Series. Books in this series introduce networking professionals to new networking technologies, covering network topologies, example deployment concepts, protocols, and management techniques.


Download Here:

http://rapidshare.com/files/254700202/Intrusion_Prevention_
Fundamentals_2006.rar

Practical VoIP Security [Ebook-PDF]


Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive

· More VoIP phone lines are being installed every day than traditional PBX phone lines

· VoIP is vulnerable to the same range of attacks of any network device

· VoIP phones can receive as many Spam voice mails as your e-mail can receive Spam e-mails, and as result must have the same types of anti-spam capabilities


Download Here:

http://rapidshare.com/files/254619292/Practical_VoIP_Security.rar

18 de junio de 2009

IPSec VPN Design (2005) [Ebook-CHM]

As the number of remote branches and work-from-home employees grows throughout corporate America, VPNs are becoming essential to both enterprise networks and service providers. IPSec is one of the more popular technologies for deploying IP-based VPNs. IPSec VPN Design provides a solid understanding of the design and architectural issues of IPSec VPNs. Some books cover IPSec protocols, but they do not address overall design issues. This book fills that void.

IPSec VPN Design consists of three main sections. The first section provides a comprehensive introduction to the IPSec protocol, including IPSec Peer Models. This section also includes an introduction to site-to-site, network-based, and remote access VPNs. The second section is dedicated to an analysis of IPSec VPN architecture and proper design methodologies. Peer relationships and fault tolerance models and architectures are examined in detail. Part three addresses enabling VPN services, such as performance, scalability, packet processing, QoS, multicast, and security. This book also covers the integration of IPSec VPNs with other Layer 3 (MPLS VPN) and Layer 2 (Frame Relay, ATM) technologies; and discusses management, provisioning, and troubleshooting techniques. Case studies highlight design, implementation, and management advice to be applied in both service provider and enterprise environments.

Comparing, Designing, And Deploying VPNs (2006) [Ebook-CHM]


Comparing, Designing, and Deploying VPNs brings together the most popular VPN technologies for convenient reference. The book examines the real-world operation, application, design, and configuration of the following site-to-site VPNs: Layer 2 Tunneling Protocol version 3 (L2TPv3)-based Layer 2 VPNs (L2VPN); Any Transport over MPLS (AToM)-based L2VPN; MPLS Layer 3-based VPNs; and IP Security (IPsec)-based VPNs. The book covers the same details for the following remote access VPNs: Layer 2 Tunneling Protocol version 2 (L2TPv2) VPNs; L2TPv3 VPNs; IPsec-based VPNs; and Secure Socket Layer (SSL) VPNs. Through the operation, application, and configuration details offered in each chapter, you'll learn how to compare and contrast the numerous types of VPN technologies, enabling you to consider all relevant VPN deployment options and select the VPN technologies that are most appropriate for your network.

IPsec Virtual Private Network Fundamentals (2006) [Ebook-CHM]


This book follows a tiered approach toward building a working knowledge of fundamental IPsec VPN design, starting with an overview of basic IPsec business drivers and functional components. These concepts and components are then used as a foundation upon which IPsec VPN High Availability (HA) design considerations are presented. Lastly, several advanced IPsec VPN technologies that are commonly available in today's enterprise networks are presented and discussed. Within each chapter, the design concepts are presented and then reinforced with configurations, illustrations, and practical case studies where appropriate.

16 de junio de 2009

Cisco Press Home Network Security Simplified [Ebook-CHM]

Home Network Security Simplified is a straightforward, graphic-based bag meshwork section meaning aggregation for the routine user. Home Network Security Simplified takes initiate users from no or restricted discernment of meshwork section to the saucer where they crapper ingest their meshwork with the pact of nous that comes with lettered that your meshwork and your aggregation is secure. Home Network Security is designed by the guiding generalisation of Ten Easy Steps to a Safte Home Network. The aggregation module wage an discernment of the assorted types of section threats (what they are, how they work), a program of tutorials on section strategy for apiece of these threats, and a step-by-step pass to implementing section crossways the network. Armed with an discernment of bag networking section concepts, users crapper verify plus of a panoramic clothing of benefits including - Understanding the assorted types of section threats - Securing their networks against those threats - Recognizing if someone has attempted to severance their meshwork - Staying abreast of aborning threats.