Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Wednesday, February 8, 2012

Red Hat Linux Security and Optimization

Red Hat Linux Security and Optimization Review



Red Hat Linux Security and Optimization is a reference for power-users and administrators covering all security issues, including Filesystems Security, Securing root accounts and Firewalls. Other Security books talk about how to apply certain patches to fix a security problem -- but this book shows you how to secure all applications so that the chances for a security breach are automatically minimized. Application performance benchmarking will also be covered. This book introduces you to many application-specific performance and benchmarking techniques and shows you how to tune your computer as well as your networks. This book covers all the primary Red Hat Linux Applications such as Apache Web Server, WuFTP, FTP server, BIND DNS server, Sendmail SMTP server and focuses on how to enhance security for each of them. It also shows you how to secure NFS and Samba Server, as well as the Apache Web Server.


Friday, January 27, 2012

CompTIA Security + All-in-One Exam Guide (Exam SY0-301), 3rd Edition with CD-ROM

CompTIA Security + All-in-One Exam Guide (Exam SY0-301), 3rd Edition with CD-ROM Review



Get complete coverage of all the objectives included on CompTIA Security+ exam inside this completely updated, comprehensive volume. Written by leading network security experts, this definitive guide covers exam SY0-301 in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this practical resource also serves as an essential on-the-job reference.

Covers all exam topics, including:

  • General security concepts
  • Operational organizational security
  • Legal issues, privacy, and ethics
  • Cryptography
  • Public key infrastructure
  • Standards and protocols
  • Physical security
  • Infrastructure security
  • Remote access and authentication
  • Intrusion detection systems
  • Security baselines
  • Types of attacks and malicious software
  • E-mail and instant messaging
  • Web components
  • Disaster recovery and business continuity
  • Risk, change, and privilege management
  • Computer forensics

CD-ROM features:

  • Two full practice exams
  • PDF copy of the book


Monday, October 31, 2011

Security Engineering: A Guide to Building Dependable Distributed Systems

Security Engineering: A Guide to Building Dependable Distributed Systems Review



The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here?s straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.


Wednesday, October 19, 2011

CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201)

CompTIA Security+ All-in-One Exam Guide, Second Edition (Exam SY0-201) Review



A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Security+ exam with ease, this definitive volume also serves as an essential on-the-job reference. Get full details on all exam topics, including how to:

  • Combat viruses, Trojan horses, spyware, logic bombs, and worms
  • Defend against DDoS, spoofing, replay, TCP/IP hijacking, and other attacks
  • Apply best practices for access control methods
  • Implement authentication using Kerberos, CHAP, biometrics, and other methods
  • Use cryptography and PKI
  • Secure remote access, wireless, and virtual private networks (VPNs)
  • Harden networks, operating systems, and applications
  • Manage incident response and follow forensic procedures

The CD-ROM features

  • One full practice exam
  • Complete electronic book