home | archive | books | download | about us | contact us

  Main Sections

Home
Archive
Books
Download
About Us
Contact Us
  Download

Antivirus Software
Antivirus Updates
Firewall Software
Security Tools
  Microsoft Warnings

MS04-028 : Buffer Overrun in JPEG Processing (GDI+)
MS04-027 : Vulnerability in WordPerfect Converter
MS04-026 : Vulnerability in Exchange Server 5.5 Outlook Web Access
MS04-025 : Cumulative Security Update for IE
MS04-024 : Vulnerability in Windows Shell
MS04-023 : Vulnerability in HTML Help
MS04-022 : Vulnerability in Task Scheduler
MS04-021 : Security Update for IIS 4
MS04-020 : Vulnerability in POSIX
MS04-019 : Vulnerability in Utility Manager
  Sun Warnings

#220 Double Free bug in zlib compression library
#219 SEA SNMP
#218 Bytecode Verifier
#217 Java Web Start
#216 HttpURLConnection
#215 snmpdx
#214 dtspcd
#213 login
#212 rpc.ttdbserverd
#211 xntpd

Books

1997 | 1998 | 1999 | 2000 | 2001 | 2002

Every month we select a book we think you should definately read. In association with Amazon.com you can order the books on-line.

Hacking Exposed: Network Security Secrets & Solutions (3rd Edition)
The new edition of this powerful best-seller contains a CD-ROM with links to security tools mentioned in the book, key security tools for download from the CD, and a password database. Inside the book, you'll also get all-new security information on 802.11 (Wireless) hacking, Windows XP, Windows.NET Server (code named Whistler), and IIS 5--plus a whole lot more! click for more info
Hacking Exposed: Network Security Secrets & Solutions
Published by McGraw-Hill Osborne Media
Publication Date: September 2001
 
The Art of Deception
Inviting you into the complex mind of the hacker, Mitnick provides realistic scenarios of cons, swindles, and social engineering attacks on businesses-and the consequences. Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. He illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent or any other seemingly innocent character. Narrated from the points of view of both the attacker and the victim, The Art of Deception explores why each attack was so successful and how it could have been averted in an engaging and highly readable manner reminiscent of a true-crime novel.
click for more info
The Art of Deception by Kevin D. Mitnick and William L. Simon
Published by John Wiley & Sons
Publication Date: October 2002
 
Oracle Security Handbook
Opening mission-critical systems to partners and customers over the Internet poses new challenges to traditional measures of enterprise security. Oracle Security Handbook presents tested techniques and proven strategies for securing an Oracle environment -- from the operating system to the database to the network. You'll get step-by-step details on developing a rock-solid security plan and concrete examples of how to implement security using Oracle's built-in tools.
The book also explains how to hacker-proof, audit, and troubleshoot your entire system. Officially endorsed by Oracle Corporation, this expert resource even delves into the details of Oracles own security implementations.
click for more info
Oracle Security Handbook by Marlene L. Theriault and Aaron Newman
Published by McGraw-Hill Osborne Media
Publication Date: August 2001
 
Red Hat Linux Networking and System Administration
Red Hat Linux experts Terry Collings and Kurt Wall start with the basics—network planning and Red Hat installation and configuration. They then show you in detail how to set up network and Internet services, from establishing a network file system to configuring mail services. Eight chapters give you the lowdown on customizing the kernel, automating tasks with scripting, performing backups, and more—the nuts-and-bolts maintenance information you need to keep your system running smoothly.
And last but not least, the authors provide nearly 100 pages of proven strategies and tips for maintaining system security.
click for more info
Red Hat Linux Networking and System Administration by Terry Collings and Kurt Wall
Published by John Wiley & Sons
Publication Date: January 2002
 
Network Intrusion Detection: An Analyst's Handbook (2nd Edition)
Intrusion detection is one of the hottest growing areas of network security. As the number of corporate, government, and educational networks grow and as they become more and more interconnected through the Internet, there is a correlating increase in the types and numbers of attacks to penetrate those networks. Intrusion Detection, Second Edition is a training aid and reference for intrusion detection analysts. This book is meant to be practical.
The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. People travel from all over the world to hear them speak, and this book will be a distillation of that experience. The book's approach is to introduce and ground topics through actual traffic patterns.
click for more info
Network Intrusion Detection: An Analyst's Handbook by Stephen Northcutt, Donald McLachlan and Judy Novak
Published by New Riders Publishing
Publication Date: September 2000
 
Cisco Secure PIX Firewalls
Reduce the threat of network attacks with an authorized self-study guideOne of the primary components of any organization's security policy is the implementation and maintenance of firewalls. Firewalls are network devices residing at the perimeter of corporate networks that protect internal networks from intrusion by the outside world.
The integrated hardware/software PIX Firewall series delivers high security without impacting network performance while scaling to meet the entire range of customer requirements.
click for more info
Cisco Secure PIX Firewalls by David W. Chapman Jr. and Andy Fox
Published by Cisco Press
Publication Date: December 2001

Amazon
© 1997-2012 Security-Solutions.net   All Rights Reserved.  Privacy Statement.