skip to main | skip to sidebar
Showing posts with label BOOKS. Show all posts
Showing posts with label BOOKS. Show all posts

Friday, June 10, 2011

Cisco Firewalls

0 comments

Cisco Firewalls By Alexandre M.S.P. Moraes
Publisher: Cis.co Pre.ss 2011 | 912 Pages | ISBN: 1587141094 | PDF | 13 MB


Concepts, design and deployment for Cisco Stateful Firewall solutions

Cisco Firewalls thoroughly explains each of the leading Cisco firewall products, features, and solutions, and shows how they can add value to any network security design or operation. The author tightly links theory with practice, demonstrating how to integrate Cisco firewalls into highly secure, self-defending networks. Cisco Firewalls shows you how to deploy Cisco firewalls as an essential component of every network infrastructure. The book takes the unique approach of illustrating complex configuration concepts through step-by-step examples that demonstrate the theory in action. This is the first book with detailed coverage of firewalling Unified Communications systems, network virtualization architectures, and environments that include virtual machines. The author also presents indispensable information about integrating firewalls with other security elements such as IPS, VPNs, and load balancers; as well as a complete introduction to firewalling IPv6 networks. Cisco Firewalls will be an indispensable resource for engineers and architects designing and implementing firewalls; security administrators, operators, and support professionals; and anyone preparing for the CCNA Security, CCNP Security, or CCIE Security certification exams.

  • Create advanced security designs utilizing the entire Cisco firewall product family
  • Choose the right firewalls based on your performance requirements
  • Learn firewall configuration fundamentals and master the tools that provide insight about firewall operations
  • Properly insert firewalls in your network’s topology using Layer 3 or Layer 2 connectivity
  • Use Cisco firewalls as part of a robust, secure virtualization architecture
  • Deploy Cisco ASA firewalls with or without NAT
  • Take full advantage of the classic IOS firewall feature set (CBAC)
  • Implement flexible security policies with the Zone Policy Firewall (ZPF)
  • Strengthen stateful inspection with antispoofing, TCP normalization, connection limiting, and IP fragmentation handling
  • Use application-layer inspection capabilities built into Cisco firewalls
  • Inspect IP voice protocols, including SCCP, H.323, SIP, and MGCP
  • Utilize identity to provide user-based stateful functionality
  • Understand how multicast traffic is handled through firewalls
  • Use firewalls to protect your IPv6 deployments
This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.

The Hacker's Underground Handbook

0 comments

The Hacker's Underground Handbook: Learn how to hack and what it takes to crack even the most secure systems!
Publisher: CreateSpace | pages: 122 | 2010 | ISBN: 1451550189 | PDF | 2,5 mb

The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways. The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner. 

Click  or   Click 

Hacking Exposed: Web Applications

0 comments
Hacking Exposed: Web Applications, 3rd Edition By Joel Scambray, Vincent Liu, Caleb Sima
Publisher: Mc/Gr.aw-Hi.ll, 3rd Edition 2011 | 482 Pages | ISBN: 0071740643 | PDF | 7 MB


The latest Web app attacks and countermeasures from world-renowned practitioners
Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource.
  • Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster
  • See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation
  • Understand how attackers defeat commonly used Web authentication technologies
  • See how real-world session attacks leak sensitive data and how to fortify your applications
  • Learn the most devastating methods used in today's hacks, including SQL injection, XSS, XSRF, phishing, and XML injection techniques
  • Find and fix vulnerabilities in ASP.NET, PHP, and J2EE execution environments
  • Safety deploy XML, social networking, cloud computing, and Web 2.0 services
  • Defend against RIA, Ajax, UGC, and browser-based, client-side exploits
  • Implement scalable threat modeling, code review, application scanning, fuzzing, and security testing procedures
Click here

Hacking Windows Tools and Tranning

12 comments

Router Security Strategies: Securing IP Network Traffic Planes

2 comments

Router Security Strategies: Securing IP Network Traffic Planes
Publisher: Cisco Press | ISBN: 1587053365 | edition 2008 | PDF | 673 pages | 10,2 mb

Router Security Strategies: Securing IP Network Traffic Planes provides a compre-hensive approach to understand and implement IP traffic plane separation and protection on IP routers. This book details the distinct traffic planes of IP networks and the advanced techniques necessary to operationally secure them. This includes the data, control, management, and services planes that provide the infrastructure for IP networking.
The first section provides a brief overview of the essential components of the Internet Protocol and IP networking. At the end of this section, you will understand the fundamental principles of defense in depth and breadth security as applied to IP traffic planes. Techniques to secure the IP data plane, IP control plane, IP management plane, and IP services plane are covered in detail in the second section.
The final section provides case studies from both the enterprise network and the service provider network perspectives. In this way, the individual IP traffic plane security techniques reviewed in the second section of the book are brought together to help you create an integrated, comprehensive defense in depth and breadth security architecture.


Click   or   Click

Network Security Auditing(Networking Technology: Security)

0 comments

Chris Jackson, "Network Security Auditing (Networking Technology: Security)"
Publisher: Cisco Press | June 12, 2010 | 1 Edition | ISBN: 1587053527 | Pages: 528 | True PDF | Size: 11.3 MB


This complete new guide to auditing network security is an indispensable resource for security, network, and IT professionals, and for the consultants and technology partners who serve them.

Cisco network security expert Chris Jackson begins with a thorough overview of the auditing process, including coverage of the latest regulations, compliance issues, and industry best practices. The author then demonstrates how to segment security architectures into domains and measure security effectiveness through a comprehensive systems approach.

Network Security Auditing thoroughly covers the use of both commercial and open source tools to assist in auditing and validating security policy assumptions. The book also introduces leading IT governance frameworks such as COBIT, ITIL, and ISO 17799/27001, explaining their values, usages, and effective integrations with Cisco security products.

This book arms you with detailed auditing checklists for each domain, realistic design insights for meeting auditing requirements, and practical guidance for using complementary solutions to improve any company’s security posture.

Master the five pillars of security auditing: assessment, prevention, detection, reaction, and recovery.
Recognize the foundational roles of security policies, procedures, and standards.
Understand current laws related to hacking, cracking, fraud, intellectual property, spam, and reporting.
Analyze security governance, including the roles of CXOs, security directors, administrators, users, and auditors.
Evaluate people, processes, and technical security controls through a system-based approach.
Audit security services enabled through Cisco products.
Analyze security policy and compliance requirements for Cisco networks.
Assess infrastructure security and intrusion prevention systems.
Audit network access control and secure remote access systems.
Review security in clients, hosts, and IP communications.
Evaluate the performance of security monitoring and management systems.
This security book is part of the Cisco Press Networking Technology Series. Security titles from Cisco Press help networking professionals secure critical data and resources, prevent and mitigate network attacks, and build end-to-end, self-defending networks.
Downloads

Click   or  Click

PKI Uncovered: Certificate-Based Security Solutions for Next-Generation Networks

0 comments

Andre Karamanian, Srinivas Tenneti, Francois Dessart
Publisher: C.is.co Press; 1 edition 2011 | 272 Pages | ISBN: 1587059169 | PDF | 4 MB


The only complete guide to designing, implementing, and supporting state-of-the-art certificate-based identity solutions with PKI
  • Layered approach is designed to help readers with widely diverse backgrounds quickly learn what they need to know
  • Covers the entire PKI project lifecycle, making complex PKI architectures simple to understand and deploy
  • Brings together theory and practice, including on-the-ground implementers' knowledge, insights, best practices, design choices, and troubleshooting details
PKI Uncovered brings together all the techniques IT and security professionals need to apply PKI in any environment, no matter how complex or sophisticated. At the same time, it will help them gain a deep understanding of the foundations of certificate-based identity management. Its layered and modular approach helps readers quickly get the information they need to efficiently plan, design, deploy, manage, or troubleshoot any PKI environment. The authors begin by presenting the foundations of PKI, giving readers the theoretical background they need to understand its mechanisms. Next, they move to high-level design considerations, guiding readers in making the choices most suitable for their own environments. The authors share best practices and experiences drawn from production customer deployments of all types. They organize a series of design "modules" into hierarchical models which are then applied to comprehensive solutions. Readers will be introduced to the use of PKI in multiple environments, including Cisco router-based DMVPN, ASA, and 802.1X. The authors also cover recent innovations such as Cisco GET VPN. Throughout, troubleshooting sections help ensure smooth deployments and give readers an even deeper "under-the-hood" understanding of their implementations. 

Click     or     Click