Author: Martin Freiss
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Protecting Networks with SATAN
Author: Martin Freiss
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Using and Managing PPP
Author: Andrew Sun
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923218
Category : Computers
Languages : en
Pages : 452
Book Description
Covering all aspects of PPP, including setting up dial-in servers, debugging, and PPP options, this book also contains overviews of related areas like serial communications, DNS setup, and routing. Also covered are several different software packages on both clients and servers, including the PPP support built into Solaris.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923218
Category : Computers
Languages : en
Pages : 452
Book Description
Covering all aspects of PPP, including setting up dial-in servers, debugging, and PPP options, this book also contains overviews of related areas like serial communications, DNS setup, and routing. Also covered are several different software packages on both clients and servers, including the PPP support built into Solaris.
Managing IP Networks with Cisco Routers
Author: Scott Ballew
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Power Programming with RPC
Author: John Bloomer
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175774
Category : Computers
Languages : en
Pages : 544
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175774
Category : Computers
Languages : en
Pages : 544
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Virtual Private Networks
Author: Charlie Scott
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
Securing and Controlling Cisco Routers
Author: Peter T. Davis
Publisher: CRC Press
ISBN: 1420031457
Category : Computers
Languages : en
Pages : 686
Book Description
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)
Publisher: CRC Press
ISBN: 1420031457
Category : Computers
Languages : en
Pages : 686
Book Description
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)
PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
Author: Kabiri, Peyman
Publisher: IGI Global
ISBN: 1609608372
Category : Computers
Languages : en
Pages : 291
Book Description
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
Publisher: IGI Global
ISBN: 1609608372
Category : Computers
Languages : en
Pages : 291
Book Description
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
Principles of Distributed Systems
Author: Teruo Higashino
Publisher: Springer
ISBN: 3540315845
Category : Computers
Languages : en
Pages : 470
Book Description
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15 –17, 2004 at Grenoble, France.
Publisher: Springer
ISBN: 3540315845
Category : Computers
Languages : en
Pages : 470
Book Description
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15 –17, 2004 at Grenoble, France.
Communications and Multimedia Security Issues of the New Century
Author: Ralf Steinmetz
Publisher: Springer
ISBN: 0387354131
Category : Computers
Languages : en
Pages : 414
Book Description
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.
Publisher: Springer
ISBN: 0387354131
Category : Computers
Languages : en
Pages : 414
Book Description
The volume contains the papers presented at the fifth working conference on Communications and Multimedia Security (CMS 2001), held on May 21-22, 2001 at (and organized by) the GMD -German National Research Center for Information Technology GMD - Integrated Publication and Information Systems Institute IPSI, in Darmstadt, Germany. The conference is arranged jointly by the Technical Committees 11 and 6 of the International Federation of Information Processing (IFIP) The name "Communications and Multimedia Security" was first used in 1995, Reinhard Posch organized the first in this series of conferences in Graz, Austria, following up on the previously national (Austrian) "IT Sicherheit" conferences held in Klagenfurt (1993) and Vienna (1994). In 1996, the CMS took place in Essen, Germany; in 1997 the conference moved to Athens, Greece. The CMS 1999 was held in Leuven, Belgium. This conference provides a forum for presentations and discussions on issues which combine innovative research work with a highly promising application potential in the area of security for communication and multimedia security. State-of-the-art issues as well as practical experiences and new trends in the areas were topics of interest again, as it has already been the case at previous conferences. This year, the organizers wanted to focus the attention on watermarking and copyright protection for e commerce applications and multimedia data. We also encompass excellent work on recent advances in cryptography and their applications. In recent years, digital media data have enormously gained in importance.