Information Technology

Security & Auditing

Per Page:

The ABCs of LDAP: How to Install, Run, and Administer LDAP Services

1st Edition

Reinhard E. Voglmaier
November 13, 2003

This book explores the use of Lightweight Directory Access Protocol (LDAP) as an efficient protocol. It combines all of the relevant information available on the Internet along with a number of arguments treated in the various books that are available, and provides many examples of LDAP code....

Investigator's Guide to Steganography

1st Edition

Gregory Kipper
October 27, 2003

Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in...

Cyber Terrorism: A Guide for Facility Managers

1st Edition

Joseph F. Gustin
October 15, 2003

Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs. Known terrorist groups are identified, discussed, and their...

The Laws of Software Process: A New Model for the Production and Management of Software

1st Edition

Phillip G. Armour
September 25, 2003

Within one generation, software has become one of the principal sources of wealth in the world. The development and use of software has grown faster than for any artifact in the history of the world. Probably no topic or subject in history has accelerated in its rate of practice as software has....

Managing A Network Vulnerability Assessment

1st Edition

Thomas R. Peltier, Justin Peltier, John A. Blackley
May 28, 2003

The instant access that hackers have to the latest tools and techniques demands that companies become more aggressive in defending the security of their networks. Conducting a network vulnerability assessment, a self-induced hack attack, identifies the network components and faults in policies, and...

Asset Protection and Security Management Handbook

1st Edition

James Walsh
December 27, 2002

The Asset Protection and Security Management Handbook is a must for all professionals involved in the protection of assets. For those new to the security profession, the text covers the fundamental aspects of security and security management providing a firm foundation for advanced development. For...

Using the Common Criteria for IT Security Evaluation

1st Edition

Debra S. Herrmann
December 27, 2002

Many organizations and government agencies require the use of Common Criteria certified products and systems and use the Common Criteria methodology in their acquisition process. In fact, in July 2002 the U.S. National Information Assurance Acquisition Policy (NSTISSP #11) mandated the use of CC...

Building A Global Information Assurance Program

1st Edition

Raymond J Curts, Douglas E. Campbell
December 26, 2002

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to...

Complete Book of Remote Access: Connectivity and Security

1st Edition

Victor Kasacavage
December 10, 2002

As technology advances, the demand and necessity for seamless connectivity and stable access to servers and networks is increasing exponentially. Unfortunately the few books out there on remote access focus on Cisco certification preparation, one aspect of network connectivity or security. This...

The Total CISSP Exam Prep Book: Practice Questions, Answers, and Test Taking Tips and Techniques

1st Edition

Thomas R. Peltier, Patrick D. Howard, Bob Cartwright
June 20, 2002

Until now, those preparing to take the Certified Information Systems Security Professional (CISSP) examination were not afforded the luxury of studying a single, easy-to-use manual. Written by ten subject matter experts (SMEs) - all CISSPs - this test prep book allows CISSP candidates to test their...

UNIX Administration: A Comprehensive Sourcebook for Effective Systems & Network Management

1st Edition

Bozidar Levi
May 29, 2002

To configure and maintain an operating system is serious business. With UNIX and its wide variety of "flavors," it can be especially difficult and frustrating, and networking with UNIX adds still more challenges. UNIX Administration: A Comprehensive Sourcebook for Effective Systems &...

Securing and Controlling Cisco Routers

1st Edition

Peter T. Davis
May 15, 2002

Securing and Controlling Cisco Routers demonstrates proven techniques for strengthening network security. The book begins with an introduction to Cisco technology and the TCP/IP protocol suite. Subsequent chapters cover subjects such as routing, routing protocols, IP addressing, and Cisco...