Welcome to E-Books Directory
This page lists freely downloadable books.

 

e-books in this category

Network Security and ManagementNetwork Security and Management
- Wikipedia , 2014
From the table of contents: Introduction (Code, Cipher, Cryptography); Stream Ciphers (Stream cipher, Rotor machine, Stream cipher attack, ...); Public Key Systems; System Identification and Clustering; Security; Telecommunication Networks.
(791 views)

OpenSSHOpenSSH
- Wikibooks , 2013
The OpenSSH protocol suite provides secure remote access and file transfer. This book is for fellow users of OpenSSH to help them save effort and time through using OpenSSH, and especially SFTP, where it makes sense to use it.
(1374 views)

Internet Safety: Keeping your Computer Safe on the InternetInternet Safety: Keeping your Computer Safe on the Internet
by Leo Notenboom - Puget Sound Software , 2011
In this free 113 page ebook I summarize popular articles from covering the basics -- the things you must do, the software you must run and the concepts you need to be aware of -- to keep your computer and your data safe as you use the internet.
(5389 views)

Guide to Securing Intranet and Extranet ServersGuide to Securing Intranet and Extranet Servers
- VeriSign , 2000
This guide reviews the main security risks of deploying Intranets and Extranets and will discuss the five fundamental goals of a security system: privacy, authentication, content integrity, non-repudiation, and ease of use.
(3811 views)

Firewalls CompleteFirewalls Complete
by Marcus Goncalves - Mcgraw-Hill , 1998
This book provides all of the information needed to install and maintain firewalls. It covers major firewall technologies and brands, advantages and disadvantages, what to watch for, who to avoid, and what to look for in firewall products.
(4768 views)

A Guide to Claims-Based Identity and Access ControlA Guide to Claims-Based Identity and Access Control
by Dominick Baier, at al. - Microsoft Press , 2010
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
(4567 views)

Nmap Network ScanningNmap Network Scanning
by Gordon Fyodor Lyon - Nmap Project , 2009
The official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. This book suits all levels of security and networking professionals.
(11197 views)

Snort CookbookSnort Cookbook
by A. Orebaugh, S. Biles, J. Babbin - O'Reilly Media , 2005
Snort, the open source intrusion detection tool, is capable of performing real-time traffic analysis and packet logging on IP network. This Cookbook will save hours of sifting through wordy tutorials in order to leverage the full power of Snort.
(3714 views)

Network Security ToolsNetwork Security Tools
by Nitesh Dhanjani, Justin Clarke - O'Reilly Media, Inc. , 2005
The book shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus. This concise, high-end guide discusses the common customizations and extensions for these tools.
(6558 views)

Firewalls and Internet Security: Repelling the Wily HackerFirewalls and Internet Security: Repelling the Wily Hacker
by William R. Cheswick, Steven M. Bellovin - Addison-Wesley , 1994
Advice and practical tools for protecting our computers. You will learn how to plan and execute a strategy that will thwart the most determined and sophisticated of hackers, while still allowing your company easy access to Internet services.
(8852 views)

Intrusion Detection with SNORTIntrusion Detection with SNORT
by Rafeeq Ur Rehman - Prentice Hall PTR , 2003
This book provides information about how to use free Open Source tools to build an Intrusion Detection System. The author provides detailed information about using SNORT as an IDS and using Apache, MySQL, PHP and ACID to analyze intrusion data.
(7646 views)

Improving Web Application Security: Threats and CountermeasuresImproving Web Application Security: Threats and Countermeasures
by Microsoft Corporation - Microsoft Press , 2003
This guide gives you a foundation for designing, and configuring secure ASP.NET Web applications. Whether you have existing applications or are building new ones, you can apply the guidance to help you make your Web applications hack-resilient.
(7317 views)

Open Source Security Tools: Practical Guide to Security ApplicationsOpen Source Security Tools: Practical Guide to Security Applications
by Tony Howlett - Prentice Hall PTR , 2004
A practical introduction to open source security tools for IT managers. It reviewes the assortment of free and low-cost solutions for all areas of information security. For each security topic, the best open source tool is analysed.
(10005 views)

Forensic DiscoveryForensic Discovery
by Dan Farmer, Wietse Venema - Addison-Wesley Professional , 2005
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
(13251 views)

Understanding OSIUnderstanding OSI
by John Larmouth - Prentice Hall , 1995
Provides an intelligent beginner with an understanding of OSI (Open Systems Interconnection). It is not an exposition of the technical detail of the OSI Standards, it aims to explain why OSI is the shape it is, and a guide to computer protocols.
(13641 views)