Beobachtungsmöglichkeiten im Domain Name System

Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz
Author: Dominik Herrmann
Publisher: Springer-Verlag
ISBN: 3658132639
Category: Computers
Page: 490
View: 1547

Continue Reading →

Dominik Herrmann zeigt, dass die Betreiber von Nameservern, die im Internet zur Auflösung von Domainnamen in IP-Adressen verwendet werden, das Verhalten ihrer Nutzer detaillierter nachvollziehen können als bislang gedacht. Insbesondere können sie maschinelle Lernverfahren einsetzen, um einzelne Internetnutzer an ihrem charakteristischen Verhalten wiederzuerkennen und über lange Zeiträume unbemerkt zu überwachen. Etablierte Verfahren eignen sich allerdings nicht zur Anonymisierung der Namensauflösung. Daher schlägt der Autor neue Techniken zum Selbstdatenschutz vor und gibt konkrete Handlungsempfehlungen.

Practical UNIX and Internet Security


Author: Simson Garfinkel,Gene Spafford,Alan Schwartz
Publisher: "O'Reilly Media, Inc."
ISBN: 0596003234
Category: Computers
Page: 954
View: 4156

Continue Reading →

The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.

Pro OpenSSH


Author: Michael Stahnke
Publisher: Apress
ISBN: 1430200766
Category: Computers
Page: 312
View: 2307

Continue Reading →

* Authored by two Fortune 100 system administrators responsible for the architecture and deployment of OpenSSH across several hundred corporate servers. * Covers commonplace yet often confusing deployment scenarios that come up daily in enterprise environments, large and small. * Focuses upon the worlds most prevalent SSH implementation, OpenSSH.

The Internet Encyclopedia


Author: Hossein Bidgoli
Publisher: John Wiley & Sons
ISBN: 9780471222033
Category: Business & Economics
Page: 944
View: 3446

Continue Reading →

The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium.

Web Commerce Security

Design and Development
Author: Hadi Nahari,Ronald L. Krutz
Publisher: John Wiley & Sons
ISBN: 9781118098912
Category: Computers
Page: 504
View: 2138

Continue Reading →

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems. Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security; he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it. Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.

Incident Response & Computer Forensics, 2nd Ed.


Author: Kevin Mandia,Chris Prosise
Publisher: McGraw Hill Professional
ISBN: 0072230371
Category: Computers
Page: 544
View: 9336

Continue Reading →

Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.

Designing with Javascript

Creating Dynamic Web Pages
Author: Nick Heinle,Bill Peña
Publisher: "O'Reilly Media, Inc."
ISBN: 9781565923607
Category: Computers
Page: 216
View: 914

Continue Reading →

A guide for beginners offers an overview of JavaScript basics and explains how to create Web pages, identify browsers, and integrate sound, graphics, and animation into Web applications

LDAP System Administration


Author: Gerald Carter
Publisher: O'Reilly Media
ISBN: 9781565924918
Category: Computers
Page: 308
View: 7882

Continue Reading →

Be more productive and make your life easier. That's what LDAP System Administration is all about. System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

UNIX: The Complete Reference, Second Edition


Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski
Publisher: McGraw Hill Professional
ISBN: 9780071706988
Category: Computers
Page: 912
View: 9776

Continue Reading →

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

UNIX: The Complete Reference, Second Edition


Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski
Publisher: McGraw Hill Professional
ISBN: 0072263369
Category: Computers
Page: 912
View: 441

Continue Reading →

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

Kryptografie verständlich

Ein Lehrbuch für Studierende und Anwender
Author: Christof Paar,Jan Pelzl
Publisher: Springer-Verlag
ISBN: 3662492970
Category: Computers
Page: 416
View: 1187

Continue Reading →

Das Buch gibt eine umfassende Einführung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlüsselaustauschprotokolle vorgestellt. Für alle Krypto-Verfahren werden aktuelle Sicherheitseinschätzungen und Implementierungseigenschaften beschrieben.

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations


Author: Hossein Bidgoli
Publisher: Wiley
ISBN: 9780471648314
Category: Business & Economics
Page: 1008
View: 7309

Continue Reading →

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Sys Admin

The Journal for UNIX System Administrators
Author: N.A
Publisher: N.A
ISBN: N.A
Category: UNIX (Computer file)
Page: N.A
View: 6118

Continue Reading →

Linux-Sicherheits-Kochbuch


Author: Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes
Publisher: O'Reilly Verlag DE
ISBN: 9783897213647
Category:
Page: 343
View: 7969

Continue Reading →

Active directory


Author: Robbie Allen,Alistair G. Lowe-Norris
Publisher: O'Reilly Verlag DE
ISBN: 9783897211735
Category:
Page: 708
View: 2769

Continue Reading →