feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Access
  • 1
    Book
    Book
    Cambridge [u.a.] :Cambridge Univ. Press,
    UID:
    almahu_BV035339231
    Format: XVI, 535 S. : , Ill., graph. Darst.
    Edition: 1. publ.
    ISBN: 978-0-521-77050-7
    Language: English
    Subjects: Physics , Mathematics
    RVK:
    RVK:
    Keywords: Nichtgleichgewicht ; Musterbildung ; Selbstorganisation
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Rockland, MA :Syngress Publishing,
    UID:
    almahu_9949697901702882
    Format: 1 online resource (513 p.)
    Edition: 1st ed.
    ISBN: 1-281-06021-6 , 9786611060213 , 0-08-050409-4
    Content: Over 75% of network attacks are targeted at the web application layer. This book provides explicit hacks, tutorials, penetration tests, and step-by-step demonstrations for security professionals and Web application developers to defend their most vulnerable applications.This book defines Web application security, why it should be addressed earlier in the lifecycle in development and quality assurance, and how it differs from other types of Internet security. Additionally, the book examines the procedures and technologies that are essential to developing, penetration testing and releasi
    Note: Includes index. , Front Cover; Developer's Guide to Web Application Security; Copyright Page; Contents; Chapter 1. Hacking Methodology; Introduction; A Brief History of Hacking; What Motivates a Hacker?; Understanding Current Attack Types; Recognizing Web Application Security Threats; Preventing Break-Ins by Thinking like a Hacker; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. How to Avoid Becoming a Code Grinder; Introduction; What Is a Code Grinder?; Thinking Creatively when Coding; Security from the Perspective of a Code Grinder; Building Functional and Secure Web Applications , SummarySolutions Fast Track; Frequently Asked Questions; Chapter 3. Understanding the Risk Associated with Mobile Code; Introduction; Recognizing the Impact of Mobile Code Attacks; Identifying Common Forms of Mobile Code; Protecting Your System from Mobile Code Attacks; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Vulnerable CGI Scripts; Introduction; What Is a CGI Script, and What Does It Do?; Break-Ins Resulting from Weak CGI Scripts; Languages for Writing CGI Scripts; Advantages of Using CGI Scripts; Rules for Writing Secure CGI Scripts; Summary , Solutions Fast TrackFrequently Asked Questions; Chapter 5. Hacking Techniques and Tools; Introduction; A Hacker's Goals; The Five Phases of Hacking; Defacing Web Sites; Social Engineering; The Intentional "Back Door"Attack; Exploiting Inherent Weaknesses in Code or Programming Environments; The Tools of the Trade; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Code Auditing and Reverse Engineering; Introduction; How to Efficiently Trace through a Program; Auditing and Reviewing Selected Programming Languages; Looking for Vulnerabilities; Pulling It All Together; Summary , Solutions Fast TrackFrequently Asked Questions; Chapter 7. Securing Your Java Code; Introduction; Overview of the Java Security Architecture; How Java Handles Security; Potential Weaknesses in Java; Coding Functional but Secure Java Applets; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. Securing XML; Introduction; Defining XML; Creating Web Applications Using XML; The Risks Associated with Using XML; Securing XML; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 9. Building Safe ActiveX Internet Controls; Introduction , Dangers Associated with Using ActiveXMethodology for Writing Safe ActiveX Controls; Securing ActiveX Controls; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 10. Securing ColdFusion; Introduction; How Does ColdFusion Work?; Preserving ColdFusion Security; ColdFusion Application Processing; Risks Associated with Using ColdFusion; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 11. Developing Security-Enabled Applications; Introduction; The Benefits of Using Security-Enabled Applications; Types of Security Used in Applications; Reviewing the Basics of PKI , Using PKI to Secure Web Applications , English
    Additional Edition: ISBN 1-59749-061-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Burlington, MA :Syngress Pub.,
    UID:
    almahu_9948026048102882
    Format: 1 online resource (866 p.)
    Edition: 2nd ed.
    ISBN: 1-282-28505-X , 9786612285059 , 0-08-055543-8
    Content: Over 700,000 IT Professionals Have Prepared for Exams with Syngress Authored Study GuidesThe Security+ Study Guide & Practice Exam is a one-of-a-kind integration of text and Web-based exam simulation and remediation. This system gives you 100% coverage of official CompTIA Security+ exam objectives plus test preparation software for the edge you need to achieve certification on your first try! This system is comprehensive, affordable, and effective!* Completely Guaranteed Coverage of All Exam ObjectivesAll five Security+ domains are covered in full: General Securi
    Note: Includes index. , Cover; Contents; Foreword; Chapter 1: General Security Concepts: Access Control, Authentication, and Auditing; Chapter 2: General Security Concepts: Attacks; Chapter 3: Communication Security: Remote Access and Messaging; Chapter 4: Communication Security: Wireless; Chapter 5: Communication Security: Web Based Services; Chapter 6: Infrastructure Security: Devices and Media; Chapter 7: Topologies and IDS; Chapter 8: Infrastructure Security: System Hardening; Chapter 9: Basics of Cryptography; Chapter 10: Public Key Infrastructure , Chapter 11: Operational and Organizational Security: Incident ResponseChapter 12: Operational and Organizational Security: Policies and Disaster Recovery; Self Test Appendix; Index , English
    Additional Edition: ISBN 1-59749-153-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948025941802882
    Format: 1 online resource (529 p.)
    Edition: 1st edition
    ISBN: 1-282-55246-5 , 9786612552465 , 0-08-050092-7 , 1-59749-994-3
    Series Statement: How to Cheat
    Content: Windows 2003 Server is unquestionably the dominant enterprise level operating system in the industry, with 95% of all companies running it. And for the last tow years, over 50% of all product upgrades have been security related. Securing Windows Server, according to bill gates, is the company's #1 priority.The book will start off by teaching readers to create the conceptual design of their Active Directory infrastructure by gathering and analyzing business and technical requirements. Next, readers will create the logical design for an Active Directory infrastructure. Here the book star
    Note: Includes index. , Front Cover; Active Directory Infrastructure; Copyright Page; Contents; Chapter 1. The Assessment Stage; Introduction; Assessing the Technical Environment; Assessing the Current Server Infrastructure; Assessing DNS; Assessing the Physical Network; Assessing the Impact of Proposed Designs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 2. Developing the Active Directory Infrastructure Designs; Introduction; Assessing and Designing the Administrative Model; Assessing and Defining the Forest Design; Assessing and Creating a Domain Design; Developing the OU Model , Developing the Replication DesignSummary; Solutions Fast Track; Frequently Asked Questions; Chapter 3. Developing the Network Services Design; Introduction; Developing the Network Services Infrastructure Designs; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 4. Designing the Logical Components; Introduction; Defining Standards; Defining the Forest Structure, Hierarchy, and Naming Strategy; Defining Authentication Mechanisms; Designing the Organizational Unit Model; Defining the Group Policy Object Approach; Exploring Groups and Roles; Defining Replication Topology , SummarySolutions Fast Track; Frequently Asked Questions; Chapter 5. Name Resolution; Introduction; Understanding DNS Design; Understanding WINS Design; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 6. Remote Access and Address Management; Introduction; Remote Access Service Servers; IP Address Management and DHCP; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 7. Service Sizing and Placement; Introduction; The Planning Phase; Sizing and Availability; Summary; Solutions Fast Track; Frequently Asked Questions; Chapter 8. The Physical Design; Introduction , Networking and RoutingDesigning Requirements for Remote Access Infrastructures; Determining Sizing and Availability of Remote Access Infrastructure; Summary; Solutions Fast Track; Frequently Asked Questions; Index , English
    Additional Edition: ISBN 1-59749-058-X
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9948026126402882
    Format: 1 online resource (393 p.)
    ISBN: 1-281-05599-9 , 9786611055998 , 0-08-047808-5
    Content: Identity-theft is the fastest growing crime in America, affecting approximately 900,000 new victims each year. Protect your assets and personal information online with this comprehensive guide.Hack Proofing Your Identity will provide readers with hands-on instruction for how to secure their personal information on multiple devices. It will include simple measures as well as advanced techniques gleaned from experts in the field who have years of experience with identity theft and fraud. This book will also provide readers with instruction for identifying cyber-crime and the different
    Note: Includes index. , 1931836515.pdf; 1931836515.pdf; Cover; Table of Contents; Chapter 1 Identity Theft: Are You At Risk?; Chapter 2 Protecting Your Hard Drive; Chapter 3 Keeping Your E-mail Private; Chapter 4 Self Defense on the Web; Chapter 5 Connecting to the Internet Safely; Chapter 6 Are Your Kids Putting You at Risk?; Chapter 7 If You Become a Victim; Chapter 8 Configuring Your Browser and Firewall; Index; Related Titles
    Additional Edition: ISBN 1-931836-51-5
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Burlington, MA :Syngress Pub.,
    UID:
    almahu_9948026261602882
    Format: 1 online resource (745 p.)
    Edition: 2nd ed. / Michael Cross.
    ISBN: 1-281-71687-1 , 9786611716875 , 0-08-048699-1
    Content: When it comes to computer crimes, the criminals got a big head start. But the law enforcement and IT security communities are now working diligently to develop the knowledge, skills, and tools to successfully investigate and prosecute Cybercrime cases. When the first edition of ""Scene of the Cybercrime"" published in 2002, it was one of the first books that educated IT security professionals and law enforcement how to fight Cybercrime. Over the past 5 years a great deal has changed in how computer crimes are perpetrated and subsequently investigated. Also, the IT security and law enforcement
    Note: Includes index. , Previous ed.: published as by Debra Littlejohn Shinder. 2002. , Front Cover; Scene of the Cybercrime Second Edition; Copyright Page; Author; Author of First Edition; Contents; Chapter 1: Facing the Cybercrime Problem Head-On; Introduction; Defining Cybercrime; Understanding the Importance of Jurisdictional Issues; Quantifying Cybercrime; Differentiating Crimes That Use the Net from Crimes That Depend on the Net; Working toward a Standard Definition of Cybercrime; Categorizing Cybercrime; Collecting Statistical Data on Cybercrime; Developing Categories of Cybercrimes; Prioritizing Cybercrime Enforcement; Reasons for Cybercrimes; Fighting Cybercrime , Determining Who Will Fight CybercrimeEducating Cybercrime Fighters; Getting Creative in the Fight against Cybercrime; Summary; Frequently Asked Questions; Chapter 2: The Evolution of Cybercrime; Introduction; Exploring Criminality in the Days of Stand-Alone Computers; Sharing More Than Time; The Evolution of a Word; Understanding Early Phreakers, Hackers, and Crackers; Hacking Ma Bell's Phone Network; Living on the LAN: Early Computer Network Hackers; How BBSes Fostered Criminal Behavior; How Online Services Made Cybercrime Easy; Introducing the ARPANET: The Wild West of Networking , Sputnik Inspires ARPAARPA Turns Its Talents to Computer Technology; Network Applications Come into Their Own; The Internetwork Continues to Expand; Watching Crime Rise with the Commercialization of the Internet; Bringing the Cybercrime Story Up-to-Date; Understanding How New Technologies Create New Vulnerabilities; Looking to the Future; Changes in Policing; Planning for the Future: How to Thwart Tomorrow's Cybercriminal; Summary; Frequently Asked Questions; Chapter 3: Understanding the People on the Scene; Introduction; Understanding Cybercriminals; Profiling Cybercriminals , Categorizing CybercriminalsUnderstanding Cybervictims; Categorizing Victims of Cybercrime; Making the Victim Part of the Crime-Fighting Team; Understanding Cyberinvestigators; Recognizing the Characteristics of a Good Cyberinvestigator; Categorizing Cyberinvestigators by Skill Set; Recruiting and Training Cyberinvestigators; Facilitating Cooperation: CEOs on the Scene; Summary; Frequently Asked Questions; Chapter 4: Understanding the Technology; Introduction; Understanding Computer Hardware; Looking Inside the Machine; Storage Media; Digital Media Devices , Understanding Why These Technical Details Matter to the InvestigatorThe Language of the Machine; Wandering through a World of Numbers; Understanding the Binary Numbering System; Encoding Nontext Files; Understanding Why These Technical Details Matter to the Investigator; Understanding Computer Operating Systems; Understanding the Role of the Operating System Software; Differentiating between Multitasking and Multiprocessing Types; Differentiating between Proprietary and Open Source Operating Systems; An Overview of Commonly Used Operating Systems; File Systems; Understanding Network Basics , Network Operating Systems , English
    Additional Edition: ISBN 1-59749-276-0
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Burlington, MA :Syngress Pub.,
    UID:
    almahu_9948025815402882
    Format: 1 online resource (476 p.)
    Edition: 1st edition
    ISBN: 1-281-11269-0 , 9786611112691 , 0-08-055664-7
    Content: This book is about Web Application Hacking. The world-renowned authors teach the reader to use publicly available tools to conduct thorough assessments of web application. This assessment process provides the reader with an understanding of Web application vulnerabilities and how they are exploited. The book goes on to teach the reader to detect, exploit, and ultimately prevent these vulnerabilities. Next, the authors cover advanced techniques of exploiting vulnerabilities such as SQL Injection, Arbitrary command injection, and more.·Learn to defend Web-based applications developed wi
    Note: Includes index. , Front Cover; Web Application Vulnerabilities Detect, Exploit, Prevent; Copyright Page; Contributing Authors; Contents; Chapter 1 : Introduction to Web Application Hacking; Introduction; Web Application Architecture Components; The Web Server; The Application Content; The Data Store; Complex Web Application Software Components; Login; Session Tracking Mechanism; User Permissions Enforcement; Role Level Enforcement; Data Access; Application Logic; Logout; Putting it all Together; The Web Application Hacking Methodology; Define the Scope of the Engagement; Before Beginning the Actual Assessment , Open Source Intelligence ScanningDefault Material Scanning; Base Line the Application; Fuzzing; Exploiting/Validating Vulnerabilities; Reporting; The History of Web Application Hacking and the Evolution of Tools; Example 1: Manipulating the URL Directly (GET Method Form Submittal); Example 2: The POST Method; Example 3: Man in the Middle Sockets; The Graphical User Interface Man in the Middle Proxy; Common (or Known) Vulnerability Scanners; Spiders and other Crawlers; Automated Fuzzers; All in One and Multi Function Tools; OWASP's WebScarab Demonstration; Starting WebScarab , Next: Create a new sessionNext: Ensure the Proxy Service is Listening; Next, Configure Your Web Browser; Next, Configure WebScarab to Intercept Requests; Next, Bring up the Summary Tab; Web Application Hacking Tool List; Security E-Mail Lists; Summary; Chapter 2 : Information Gathering Techniques; Introduction; The Principles of Automating Searches; The Original Search Term; Expanding Search Terms; E-mail Addresses; Telephone Numbers; People; Getting Lots of Results; More Combinations; Using ""Special"" Operators; Getting the Data From the Source , Scraping it Yourself - Requesting and Receiving ResponsesScraping it Yourself - The Butcher Shop; Dapper; Aura/EvilAPI; Using Other Search Engines; Parsing the Data; Parsing E-mail Addresses; Domains and Sub-domains; Telephone Numbers; Post Processing; Sorting Results by Relevance; Beyond Snippets; Presenting Results; Applications of Data Mining; Mildly Amusing; Most Interesting; Taking It One Step Further; Collecting Search Terms; On the Web; Spying on Your Own; Search Terms; Gmail; Honey Words; Referrals; Summary; Chapter 3 : Introduction to Server Side Input Validation Issues; Introduction , Cross Site Scripting (XSS)Presenting False Information; How this Example Works; Presenting a False Form; Exploiting Browser Based Vulnerabilities; Exploit Client/Server Trust Relationships; Chapter 4 : Client-Side Exploit Frameworks; Introduction; AttackAPI; Enumerating the Client; Attacking Networks; Hijacking the Browser; Controlling Zombies; BeEF; Installing and Configuring BeEF; Controlling Zombies; BeEF Modules; Standard Browser Exploits; Port Scanning with BeEF; Inter-protocol Exploitation and Communication with BeEF; CAL9000; XSS Attacks, Cheat Sheets, and Checklists , Encoder, Decoders, and Miscellaneous Tools , English
    Additional Edition: ISBN 1-59749-209-4
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Rockland, Mass. :Syngress Publishing,
    UID:
    almahu_9948026517202882
    Format: 1 online resource (969 p.)
    Edition: 1st edition
    ISBN: 1-281-03582-3 , 9786611035822 , 0-08-048944-3
    Content: The Network+ Study Guide covers all the objectives on the CompTIA exam, including the features and functions of networking components, and ensuring that readers have the knowledge and skills needed to install, configure and troubleshoot basic networking hardware, protocols and services. It covers exam topics such as media and topologies, protocols and standards, network implementation, and network support, as well as new exam topics on technologies such as wireless networking and Ethernet.* Complete coverage of the new 2005 exam, written from the ground up * Competitively priced wi
    Note: Includes index. , Cover; Exam Objective Map; Contents; Introduction; Media and Topologies; Network Fundamentals; Network Media; Network Devices; Wireless Technologies; Protocols and Standards; OSI Model; Network Protocols; WAN and Security Standards and Services; Network Operating Systems; Network Implementation; Network Infrastructure and Security; Fault Management and Disaster Recovery; Network Support; Network Troubleshooting Tools; Network Troubleshooting Methodology; Self Test Appendix; Index; Related Titles , English
    Additional Edition: ISBN 1-931836-42-6
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almahu_9949697892802882
    Format: 1 online resource (xv, 237 pages) : , illustrations (chiefly color)
    Edition: 1st edition
    ISBN: 0-12-416639-3 , 0-12-416650-4
    Series Statement: Gale eBooks
    Content: The Basics of Cyber Safety: Computer and Mobile Device Safety Made Easy presents modern tactics on how to secure computer and mobile devices, including what behaviors are safe while surfing, searching, and interacting with others in the virtual world. The book's author, Professor John Sammons, who teaches information security at Marshall University, introduces readers to the basic concepts of protecting their computer, mobile devices, and data during a time that is described as the most connected in history. This timely resource provides useful information for readers who know very little about the basic principles of keeping the devices they are connected to—or themselves—secure while online. In addition, the text discusses, in a non-technical way, the cost of connectedness to your privacy, and what you can do to it, including how to avoid all kinds of viruses, malware, cybercrime, and identity theft. Final sections provide the latest information on safe computing in the workplace and at school, and give parents steps they can take to keep young kids and teens safe online. Provides the most straightforward and up-to-date guide to cyber safety for anyone who ventures online for work, school, or personal use Includes real world examples that demonstrate how cyber criminals commit their crimes, and what users can do to keep their data safe
    Note: Description based upon print version of record. , Front Cover; The Basics of Cyber Safety; Copyright Page; Dedication; Contents; About the Authors; Acknowledgments; 1 What is cyber safety?; What Is Cyber Safety?; Why Is It Important?; What Is the Internet?; Keep the Faith; Paying Attention to What's Out There; Not All Information Is Valid; Think Before You Click; Reading URLs; Faking sites with URLs; Privacy; Expectations and Reality; Who Has Ownership?; Where Are Your Files Stored?; How Important Is Your Data?; Once It's Out There, It's Out There; Encryption; Encrypting Storage; Encrypting mobile devices , Secure Communication on the InternetMonitoring Online Activity; Monitoring Your Bank Account; Identifying the Devices You Use, and Where You Use Them; Separating Home and Business Computers; Bring your own device; Computer Use in Public Places; Mobile Devices; Mobile apps; Information shared and collected by apps; Location feature; Smart TVs and Game Systems; Internet of Things; Using Different Windows Accounts; Biometrics; Physical Security; Locking Down Hardware; Summary; Further Reading; 2 Before connecting to the Internet; Securing Your Web Browser; Cookies; Tracking Protection , Disabling and Managing Pop-UpsWi-fi Security and Safety; A Basic Understanding of Components Used to Connect to the Internet; Configuring Your Router; Changing the administrator username/password; Service set identifier; Security mode; SSID passphrase; Using Other People's Wi-Fi; Sharing Your Wi-Fi With Others; Setting up a guest network; Passwords; Strong Passwords; Changing Passwords; Password Policies; Setting Up Security Questions; Remembering Passwords; Tools; Password generators; Password vaults; Passwords stored in IE; Passwords stored in Chrome; Google smart lock; Firewalls , Firewall on a RouterSummary; Reference; 3 Software problems and solutions; Malware and Viruses; Types of Malware; Antivirus; Windows Defender; Updating; Scheduling Regular Scans; Rogue Antivirus; Antimalware; Don't Forget Your Mobile; Staying Up-To-Date; Types of Updates; Automatic Updates; Updates in Windows 10; Windows 10 peer-to-peer updates; Mobile Device Updates; Other Device Updates; Disaster Recovery; Keeping a Copy of Passwords; Backing Up Files; Online backups; Backing up phones and tablets; Setting and Restoring Restore Points; Summary; Reference; 4 Email safety and security , Email ProtectionLimiting What Your Email Reveals; Choosing an Email Client; Securing Thunderbird; Why Is It Important to Block Remote Content?; Hiding the Message Pane; The Dangers of an Attachment; Free Email Sites; Security Settings on Email Sites; Mail.com security; Gmail Security; Encryption; Summary; 5 Cybercrime; What Is a Cybercriminal?; How Criminals Choose Their Targets; Identity Theft; Controlling the Information You Provide; Child Identity Theft; Social Engineering; Technology and Social Engineering; Suspicious Emails and SPAM; Baiting; Hacking; Hijacking/Hacked Accounts , Defaced Sites
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    almahu_9948026405002882
    Format: 1 online resource (xvii, 328 pages) : , illustrations
    ISBN: 1-59749-987-0
    Additional Edition: ISBN 1-59749-986-2
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages