A Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al.
Publisher: Microsoft Press 2010
Number of pages: 148
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or information technology (IT) professional who designs, builds, or operates Web applications and services that require identity information about their users.
Home page url
Download or read it online for free here:
by A. Orebaugh, S. Biles, J. Babbin - O'Reilly Media
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
by Marcus Goncalves - Mcgraw-Hill
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
- U.S. Government Printing Office
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.
by Gordon Fyodor Lyon - Nmap Project
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.