Welcome to E-Books Directory
This page lists freely downloadable books.


e-books in this category

Building the Infrastructure for Cloud SecurityBuilding the Infrastructure for Cloud Security
by Raghu Yeluri, Enrique Castro-Leon - Springer , 2014
The book highlights the fundamental technology components necessary to build and enable trusted clouds. Here is an explanation of the security and compliance challenges organizations face as they migrate mission-critical applications to the cloud.

Information Security and Privacy in Network EnvironmentsInformation Security and Privacy in Network Environments
- U.S. Government Printing Office , 1994
The report focuses on policy issues in three areas: 1) national cryptography policy, including federal information processing standards; 2)guidance on safeguarding unclassified information in federal agencies; 3)legal issues and information security.

Ethical HackingEthical Hacking
- HaKTuts , 2014
Ethical hacking, which encompasses methodical penetration testing, white hat hacking, and vulnerability testing -- involves the same tools, tricks, and techniques that criminal hackers use, but with the target's permission in a professional setting.

Network Security and ManagementNetwork Security and Management
- Wikipedia , 2014
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.

- Wikibooks , 2013
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.

Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by Leo Notenboom - Puget Sound Software , 2011
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.

Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign , 2000
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.

Firewalls CompleteFirewalls Complete
by Marcus Goncalves - Mcgraw-Hill , 1998
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.

A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press , 2010
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.

Nmap Network ScanningNmap Network Scanning
by Gordon Fyodor Lyon - Nmap Project , 2009
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.

Snort CookbookSnort Cookbook
by A. Orebaugh, S. Biles, J. Babbin - O'Reilly Media , 2005
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.

Network Security ToolsNetwork Security Tools
by Nitesh Dhanjani, Justin Clarke - O'Reilly Media, Inc. , 2005
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.

Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by William R. Cheswick, Steven M. Bellovin - Addison-Wesley , 1994
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.

Intrusion Detection with SNORTIntrusion Detection with SNORT
by Rafeeq Ur Rehman - Prentice Hall PTR , 2003
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.

Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by Microsoft Corporation - Microsoft Press , 2003
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.

Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by Tony Howlett - Prentice Hall PTR , 2004
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.

Forensic DiscoveryForensic Discovery
by Dan Farmer, Wietse Venema - Addison-Wesley Professional , 2005
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.

Understanding OSIUnderstanding OSI
by John Larmouth - Prentice Hall , 1995
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.