Beobachtungsmöglichkeiten im Domain Name System

Angriffe auf die Privatsphäre und Techniken zum Selbstdatenschutz

DOWNLOAD NOW »

Author: Dominik Herrmann

Publisher: Springer-Verlag

ISBN: 3658132639

Category: Computers

Page: 490

View: 1249

Dominik Herrmann zeigt, dass die Betreiber von Nameservern, die im Internet zur Auflösung von Domainnamen in IP-Adressen verwendet werden, das Verhalten ihrer Nutzer detaillierter nachvollziehen können als bislang gedacht. Insbesondere können sie maschinelle Lernverfahren einsetzen, um einzelne Internetnutzer an ihrem charakteristischen Verhalten wiederzuerkennen und über lange Zeiträume unbemerkt zu überwachen. Etablierte Verfahren eignen sich allerdings nicht zur Anonymisierung der Namensauflösung. Daher schlägt der Autor neue Techniken zum Selbstdatenschutz vor und gibt konkrete Handlungsempfehlungen.

Pro OpenSSH

DOWNLOAD NOW »

Author: Michael Stahnke

Publisher: Apress

ISBN: 1430200766

Category: Computers

Page: 312

View: 3128

* Authored by two Fortune 100 system administrators responsible for the architecture and deployment of OpenSSH across several hundred corporate servers. * Covers commonplace yet often confusing deployment scenarios that come up daily in enterprise environments, large and small. * Focuses upon the worlds most prevalent SSH implementation, OpenSSH.

The Internet Encyclopedia

DOWNLOAD NOW »

Author: Hossein Bidgoli

Publisher: John Wiley & Sons

ISBN: 9780471222033

Category: Business & Economics

Page: 944

View: 9134

The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium.

Practical UNIX and Internet Security

DOWNLOAD NOW »

Author: Simson Garfinkel,Gene Spafford,Alan Schwartz

Publisher: "O'Reilly Media, Inc."

ISBN: 0596003234

Category: Computers

Page: 954

View: 9172

The definitive book on UNIX security, this volume covers every aspect of computer security on UNIX machines and the Internet.

Web Commerce Security

Design and Development

DOWNLOAD NOW »

Author: Hadi Nahari,Ronald L. Krutz

Publisher: John Wiley & Sons

ISBN: 9781118098912

Category: Computers

Page: 504

View: 6585

A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems. Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security; he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it. Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.

Incident Response & Computer Forensics, 2nd Ed.

DOWNLOAD NOW »

Author: Kevin Mandia,Chris Prosise

Publisher: McGraw Hill Professional

ISBN: 0072230371

Category: Computers

Page: 544

View: 3464

Written by FBI insiders, this updated best-seller offers a look at the legal, procedural, and technical steps of incident response and computer forensics. Including new chapters on forensic analysis and remediation, and real-world case studies, this revealing book shows how to counteract and conquer today’s hack attacks.

Designing with Javascript

Creating Dynamic Web Pages

DOWNLOAD NOW »

Author: Nick Heinle,Bill Peña

Publisher: "O'Reilly Media, Inc."

ISBN: 9781565923607

Category: Computers

Page: 216

View: 6284

A guide for beginners offers an overview of JavaScript basics and explains how to create Web pages, identify browsers, and integrate sound, graphics, and animation into Web applications

LDAP System Administration

DOWNLOAD NOW »

Author: Gerald Carter

Publisher: O'Reilly Media

ISBN: 9781565924918

Category: Computers

Page: 308

View: 3172

Be more productive and make your life easier. That's what LDAP System Administration is all about. System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately "see" the updated information. Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux® distributions and Mac OS® X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses: Configuration and access control Distributed directories; replication and referral Using OpenLDAP to replace NIS Using OpenLDAP to manage email configurations Using LDAP for abstraction with FTP and HTTP servers, Samba, and Radius Interoperating with different LDAP servers, including Active Directory Programming using Net::LDAP If you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.

UNIX: The Complete Reference, Second Edition

DOWNLOAD NOW »

Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski

Publisher: McGraw Hill Professional

ISBN: 9780071706988

Category: Computers

Page: 912

View: 6306

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

UNIX: The Complete Reference, Second Edition

DOWNLOAD NOW »

Author: Kenneth Rosen,Douglas Host,Rachel Klee,Richard Rosinski

Publisher: McGraw Hill Professional

ISBN: 0072263369

Category: Computers

Page: 912

View: 9814

The Definitive UNIX Resource--Fully Updated Get cutting-edge coverage of the newest releases of UNIX--including Solaris 10, all Linux distributions, HP-UX, AIX, and FreeBSD--from this thoroughly revised, one-stop resource for users at all experience levels. Written by UNIX experts with many years of experience starting with Bell Laboratories, UNIX: The Complete Reference, Second Edition provides step-by-step instructions on how to use UNIX and take advantage of its powerful tools and utilities. Get up-and-running on UNIX quickly, use the command shell and desktop, and access the Internet and e-mail. You'll also learn to administer systems and networks, develop applications, and secure your UNIX environment. Up-to-date chapters on UNIX desktops, Samba, Python, Java Apache, and UNIX Web development are included. Install, configure, and maintain UNIX on your PC or workstation Work with files, directories, commands, and the UNIX shell Create and modify text files using powerful text editors Use UNIX desktops, including GNOME, CDE, and KDE, as an end user or system administrator Use and manage e-mail, TCP/IP networking, and Internet services Protect and maintain the security of your UNIX system and network Share devices, printers, and files between Windows and UNIX systems Use powerful UNIX tools, including awk, sed, and grep Develop your own shell, Python, and Perl scripts, and Java, C, and C++ programs under UNIX Set up Apache Web servers and develop browser-independent Web sites and applications

Einführung in die bash-Shell

DOWNLOAD NOW »

Author: Cameron Newham,Bill Rosenblatt

Publisher: Springer DE

ISBN: 9783897214248

Category: UNIX (Computer file)

Page: 350

View: 5902

Handbook of Information Security, Information Warfare, Social, Legal, and International Issues and Security Foundations

DOWNLOAD NOW »

Author: Hossein Bidgoli

Publisher: Wiley

ISBN: 9780471648314

Category: Business & Economics

Page: 1008

View: 3505

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security. The text contains 180 articles from over 200 leading experts, providing the benchmark resource for information security, network security, information privacy, and information warfare.

Linux-Sicherheits-Kochbuch

DOWNLOAD NOW »

Author: Daniel J. Barrett,Richard E. Silverman,Robert G. Byrnes

Publisher: O'Reilly Verlag DE

ISBN: 9783897213647

Category:

Page: 343

View: 2550

Kryptografie verständlich

Ein Lehrbuch für Studierende und Anwender

DOWNLOAD NOW »

Author: Christof Paar,Jan Pelzl

Publisher: Springer-Verlag

ISBN: 3662492970

Category: Computers

Page: 416

View: 2591

Das Buch gibt eine umfassende Einführung in moderne angewandte Kryptografie. Es behandelt nahezu alle kryptografischen Verfahren mit praktischer Relevanz. Es werden symmetrische Verfahren (DES, AES, PRESENT, Stromchiffren), asymmetrische Verfahren (RSA, Diffie-Hellmann, elliptische Kurven) sowie digitale Signaturen, Hash-Funktionen, Message Authentication Codes sowie Schlüsselaustauschprotokolle vorgestellt. Für alle Krypto-Verfahren werden aktuelle Sicherheitseinschätzungen und Implementierungseigenschaften beschrieben.

Sys Admin

The Journal for UNIX System Administrators

DOWNLOAD NOW »

Author: N.A

Publisher: N.A

ISBN: N.A

Category: UNIX (Computer file)

Page: N.A

View: 9000

Active directory

DOWNLOAD NOW »

Author: Robbie Allen,Alistair G. Lowe-Norris

Publisher: O'Reilly Verlag DE

ISBN: 9783897211735

Category:

Page: 708

View: 6089

SunExpert

DOWNLOAD NOW »

Author: N.A

Publisher: N.A

ISBN: N.A

Category: Computers

Page: N.A

View: 333

Getting Connected

The Internet at 56K and Up

DOWNLOAD NOW »

Author: Kevin Dowd

Publisher: Oreilly & Associates Incorporated

ISBN: N.A

Category: Computers

Page: 410

View: 8312

Written in a readable style, this is the first book for setting up and managing an Internet connection for organizations. It breaks down tasks into easy-to-understand, manageable chunks--such as setting up a simple DNS or World Wide Web server, and gets the user started with DNS, sendmail, TCP/IP and managing Internet servers.