Author: Martin Freiss
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Protecting Networks with SATAN
Author: Martin Freiss
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Publisher: O'Reilly Media
ISBN:
Category : Computers
Languages : en
Pages : 142
Book Description
SATAN performs "security audits", scanning host computers for security vulnerabilities. This book describes how to install and use SATAN and how to adapt it to local requirements and increase its knowledge of specific security vulnerabilities.
Using and Managing PPP
Author: Andrew Sun
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923218
Category : Computers
Languages : en
Pages : 452
Book Description
Covering all aspects of PPP, including setting up dial-in servers, debugging, and PPP options, this book also contains overviews of related areas like serial communications, DNS setup, and routing. Also covered are several different software packages on both clients and servers, including the PPP support built into Solaris.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923218
Category : Computers
Languages : en
Pages : 452
Book Description
Covering all aspects of PPP, including setting up dial-in servers, debugging, and PPP options, this book also contains overviews of related areas like serial communications, DNS setup, and routing. Also covered are several different software packages on both clients and servers, including the PPP support built into Solaris.
Managing IP Networks with Cisco Routers
Author: Scott Ballew
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923201
Category : Computers
Languages : en
Pages : 364
Book Description
The basics of IP networking. Network design part 1 & 2. Selecting network equipment. Routing protocol selection. Routing protocol configuration. The non-technical side of network management. The technical side of network management. Connecting to the outside world. Network security.
Virtual Private Networks
Author: Charlie Scott
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565925298
Category : Computers
Languages : en
Pages : 238
Book Description
Historically, only large companies could afford secure networks, which they created from expensive leased lines. Smaller folks had to make do with the relatively untrusted Internet. Nowadays, even large companies have to go outside their private nets, because so many people telecommute or log in while they're on the road. How do you provide a low-cost, secure electronic network for your organization?The solution is a virtual private network: a collection of technologies that creates secure connections or "tunnels" over regular Internet lines--connections that can be easily used by anybody logging in from anywhere. A number of products now exist to help you develop that solution.This book tells you how to plan and build a VPN. It starts with general concerns like costs, configuration, and how a VPN fits in with other networking technologies like firewalls. It continues with detailed descriptions of how to install and use VPN technologies that are available for Windows NT and Unix, such as PPTP and L2TP, Altavista Tunnel, Cisco PIX, and the secure shell (SSH).New features in the second edition include SSH, which is a popular VPN solution for Unix systems, and an expanded description of the IPSec standard, for which several vendors have announced support.Topics include: How the VPN compares to other available networking technologies Introduction to encryption, firewalls, the IPSec standard, and other technologies that let VPNs work Point to Point Tunneling Protocol (PPTP) and L2TP The Altavista Tunnel The Cisco PIX Firewall Secure Shell (SSH) Maintenance and troubleshooting
Power Programming with RPC
Author: John Bloomer
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175774
Category : Computers
Languages : en
Pages : 544
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Publisher: "O'Reilly Media, Inc."
ISBN: 9780937175774
Category : Computers
Languages : en
Pages : 544
Book Description
Computer Systems Organization -- Computer-Communication Networks.
Principles of Distributed Systems
Author: Teruo Higashino
Publisher: Springer
ISBN: 3540315845
Category : Computers
Languages : en
Pages : 470
Book Description
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15 –17, 2004 at Grenoble, France.
Publisher: Springer
ISBN: 3540315845
Category : Computers
Languages : en
Pages : 470
Book Description
The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15 –17, 2004 at Grenoble, France.
Privacy, Intrusion Detection and Response: Technologies for Protecting Networks
Author: Kabiri, Peyman
Publisher: IGI Global
ISBN: 1609608372
Category : Computers
Languages : en
Pages : 291
Book Description
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
Publisher: IGI Global
ISBN: 1609608372
Category : Computers
Languages : en
Pages : 291
Book Description
Though network security has almost always been about encryption and decryption, the field of network security is moving towards securing the network environment rather than just stored or transferred data. Privacy, Intrusion Detection and Response: Technologies for Protecting Networks explores the latest practices and research works in the area of privacy, intrusion detection, and response. Increased interest on intrusion detection together with prevention and response proves that protecting data either in the storage or during transfer is necessary, but not sufficient, for the security of a network. This book discusses the latest trends and developments in network security and privacy, and serves as a vital reference for researchers, academics, and practitioners working in the field of privacy, intrusion detection, and response.
PGP: Pretty Good Privacy
Author: Simson Garfinkel
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565920989
Category : Computers
Languages : en
Pages : 442
Book Description
Pretty Good Privacy, or "PGP", is an encryption program widely available on the Internet. The program runs on MS-DOS, UNIX, and the Mac. PGP: Pretty Good Privacy offers both a readable technical user's guide and a fascinating behind-the-scenes look at cryptography and privacy, explaining how to get PGP from publicly available sources and how to install it on various platforms.
Securing and Controlling Cisco Routers
Author: Peter T. Davis
Publisher: CRC Press
ISBN: 1420031457
Category : Computers
Languages : en
Pages : 686
Book Description
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)
Publisher: CRC Press
ISBN: 1420031457
Category : Computers
Languages : en
Pages : 686
Book Description
Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco Authentication, Authorization, and Accounting services (AAA)
The Dark Side of Software Engineering
Author: Johann Rost
Publisher: John Wiley & Sons
ISBN: 0470922877
Category : Business & Economics
Languages : en
Pages : 264
Book Description
Betrayal! Corruption! Software engineering? Industry experts Johann Rost and Robert L. Glass explore the seamy underbelly of software engineering in this timely report on and analysis of the prevalance of subversion, lying, hacking, and espionage on every level of software project management. Based on the authors' original research and augmented by frank discussion and insights from other well-respected figures, The Dark Side of Software Engineering goes where other management studies fear to tread -- a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.
Publisher: John Wiley & Sons
ISBN: 0470922877
Category : Business & Economics
Languages : en
Pages : 264
Book Description
Betrayal! Corruption! Software engineering? Industry experts Johann Rost and Robert L. Glass explore the seamy underbelly of software engineering in this timely report on and analysis of the prevalance of subversion, lying, hacking, and espionage on every level of software project management. Based on the authors' original research and augmented by frank discussion and insights from other well-respected figures, The Dark Side of Software Engineering goes where other management studies fear to tread -- a corporate environment where schedules are fabricated, trust is betrayed, millions of dollars are lost, and there is a serious need for the kind of corrective action that this book ultimately proposes.