Network Security and Management
Publisher: Wikipedia 2014
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
Home page url
Download or read it online for free here:
by William R. Cheswick, Steven M. Bellovin - Addison-Wesley
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.