NTP Security

NTP Security

Learn the risks associated with Network Time Protocol (NTP) security and how to minimize those risks while deploying and managing the protocol. You will be able to reduce the disruption of communication between servers on the network and the risk that the entire network will be taken offline….

CEH v9

CEH v9: Certified Ethical Hacker Version 9

Master CEH v9 and identify your weak spots CEH: Certified Ethical Hacker Version 9 Practice Tests are the ideal preparation for this high-stakes exam. Five complete, unique practice tests are designed to help you identify weak spots in your understanding, so you can direct your preparation efforts efficiently…

VMware View Security Essentials

VMware View Security Essentials

Most people associate security with network security and focus on firewalls and network monitoring. However, there is more to security than that. Security starts with the establishment of a stable environment, protecting this environment not only from intrusion, but also from malicious intent. It is about tracking the…

Practical Information Security Management

Practical Information Security Management

Create appropriate, security-focused business propositions that consider the balance between cost, risk, and usability, while starting your journey to become an information security manager. Covering a wealth of information that explains exactly how the industry works today, this book focuses on how you can set up an effective…

From Hacking to Report Writing

From Hacking to Report Writing

This book will teach you everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate,…

Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization

Mastering Microsoft Forefront UAG 2010 Customization is a hands-on guide with step-by-step instructions for enhancing the functionality of UAG through customization. Each topic details one key aspect of functionality and the operative mechanism behind it, and suggests functionality that can be achieved with customization, along with helpful code…

Securing SQL Server

Securing SQL Server

Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn’t lead to loss or compromise…

IT Security Risk Control Management

IT Security Risk Control Management

This book explains how to construct an information security program, from inception to audit, with enduring, practical, hands-on advice and actionable behavior for IT professionals. ¬†Information security is more than configuring firewalls, removing¬†viruses, hacking machines, or setting passwords. Creating and promoting a successful security program requires skills in…

Mastering Wireshark

Mastering Wireshark

Wireshark is a popular and powerful tool used to analyze the amount of bits and bytes that are flowing through a network. Wireshark deals with the second to seventh layer of network protocols, and the analysis made is presented in a human readable form. Mastering Wireshark will help…

1783281499

Node Security

Node.js is a fast-growing platform for building server applications using JavaScript. Now that it is being more widely used in production settings, Node applications will start to be specifically targeted for security vulnerabilities. Protecting your users will require an understanding of attack vectors unique to Node, as well…