Practical UNIX and Internet Security

Titre : Practical UNIX and Internet Security
Auteur : Simson Garfinkel
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596003234
Libération : 2003

Télécharger Lire en ligne



The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.

Information Warfare and Security

Titre : Information Warfare and Security
Auteur : Dorothy Elizabeth Robling Denning
Éditeur : Addison-Wesley Professional
ISBN-13 : STANFORD:36105021929133
Libération : 1999

Télécharger Lire en ligne



This is a comprehensive and detailed view of information warfare. It presents methods, laws, and case examples stressing actual incidents to illustrate such instances. What individuals, corporations, and governments need to know about information-related attacks and defenses! Every day, we hear reports of hackers who have penetrated computer networks, vandalized Web pages, and accessed sensitive information. We hear how they have tampered with medical records, disrupted emergency 911 systems, and siphoned money from bank accounts. Could information terrorists, using nothing more than a personal computer, cause planes to crash, widespread power blackouts, or financial chaos? Such real and imaginary scenarios, and our defense against them, are the stuff of information warfare-operations that target or exploit information media to win some objective over an adversary. Dorothy E. Denning, a pioneer in computer security, provides in this book a framework for understanding and dealing with information-based threats: computer break-ins, fraud, sabotage, espionage, piracy, identity theft, invasions of privacy, and electronic warfare. She describes these attacks with astonishing, real examples, as in her analysis of information warfare operations during the Gulf War. Then, offering sound advice for security practices and policies, she explains countermeasures that are both possible and necessary.

Database Nation

Titre : Database Nation
Auteur : Simson Garfinkel
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596550642
Libération : 2000-12-04

Télécharger Lire en ligne



Fifty years ago, in 1984, George Orwell imagined a future in which privacy was demolished by a totalitarian state that used spies, video surveillance, historical revisionism, and control over the media to maintain its power. Those who worry about personal privacy and identity--especially in this day of technologies that encroach upon these rights--still use Orwell's "Big Brother" language to discuss privacy issues. But the reality is that the age of a monolithic Big Brother is over. And yet the threats are perhaps even more likely to destroy the rights we've assumed were ours.Database Nation: The Death of Privacy in the 21st Century shows how, in these early years of the 21st century, advances in technology endanger our privacy in ways never before imagined. Direct marketers and retailers track our every purchase; surveillance cameras observe our movements; mobile phones will soon report our location to those who want to track us; government eavesdroppers listen in on private communications; misused medical records turn our bodies and our histories against us; and linked databases assemble detailed consumer profiles used to predict and influence our behavior. Privacy--the most basic of our civil rights--is in grave peril.Simson Garfinkel--journalist, entrepreneur, and international authority on computer security--has devoted his career to testing new technologies and warning about their implications. This newly revised update of the popular hardcover edition of Database Nation is his compelling account of how invasive technologies will affect our lives in the coming years. It's a timely, far-reaching, entertaining, and thought-provoking look at the serious threats to privacy facing us today. The book poses a disturbing question: how can we protect our basic rights to privacy, identity, and autonomy when technology is making invasion and control easier than ever before?Garfinkel's captivating blend of journalism, storytelling, and futurism is a call to arms. It will frighten, entertain, and ultimately convince us that we must take action now to protect our privacy and identity before it's too late.

Subject Guide to Books in Print

Titre : Subject Guide to Books in Print
Auteur :
Éditeur :
ISBN-13 : STANFORD:36105025888558
Libération : 2003

Télécharger Lire en ligne



A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Subject Guide to Books in Print Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.

Web Security Commerce

Titre : Web Security Commerce
Auteur : Simson Garfinkel
Éditeur : O'Reilly Media
ISBN-13 : UOM:39015039899060
Libération : 1997

Télécharger Lire en ligne



The World Wide Web is the fastest growing part of the Internet--and the part that is the most vulnerable to attack. "Web Security and Commerce" examines both the new technologies and the new risks, and describes the best available strategies for minimizing those risks. Topics include basic security, CGI/API programming, cryptography, SSL, digital IDs, Web servers, Java, JavaScript, ActiveX, code signing, electronic commerce, and legal issues.

Web Security Privacy Commerce

Titre : Web Security Privacy Commerce
Auteur : Simson Garfinkel
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9780596000455
Libération : 2002

Télécharger Lire en ligne



"Web Security, Privacy & Commerce" cuts through the hype and the front page stories. It tells readers what the real risks are and explains how to minimize them. Whether a casual (but concerned) Web surfer or a system administrator responsible for the security of a critical Web server, this book will tells users what they need to know.

Network Intrusion Detection

Titre : Network Intrusion Detection
Auteur : Stephen Northcutt
Éditeur : New Riders Publishing
ISBN-13 : PSU:000046647917
Libération : 2000

Télécharger Lire en ligne



A training aid and reference for intrusion detection analysts. The authors have been through the trenches and give you access to unusual and unique data.

Building Internet Firewalls

Titre : Building Internet Firewalls
Auteur : Elizabeth D. Zwicky
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596551886
Libération : 2000-06-26

Télécharger Lire en ligne



In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.

Digital Evidence and Computer Crime

Titre : Digital Evidence and Computer Crime
Auteur : Eoghan Casey
Éditeur : Academic Press
ISBN-13 : 9780123742681
Libération : 2011

Télécharger Lire en ligne



"Digital Evidence and Computer Crime" provides the knowledge necessary to uncover and use digital evidence effectively in any kind of investigation. This completely updated edition provides the introductory materials that new students require, and also expands on the material presented in previous editions to help students develop these skills.

Crypto

Titre : Crypto
Auteur : Steven Levy
Éditeur : Penguin
ISBN-13 : 9781101199466
Libération : 2001-01-08

Télécharger Lire en ligne



If you've ever made a secure purchase with your credit card over the Internet, then you have seen cryptography, or "crypto", in action. From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.