Selasa, 07 Mei 2013

Wow! eBook: Securing SQL Server, 2nd Edition - 6 new eBooks


Wow! eBook: Securing SQL Server, 2nd Edition - 6 new eBooks

Link to Wow! eBook

Securing SQL Server, 2nd Edition

Posted: 07 May 2013 10:36 AM PDT

Book Description

Written by Denny Cherry, a Microsoft MVP for the SQL Server product, a Microsoft Certified Master for SQL Server 2008, and one of the biggest names in SQL Server today, Securing SQL Server, Second Edition explores the potential attack vectors someone can use to break into your SQL Server database as well as how to protect your database from these attacks. In this book, you will learn how to properly secure your database from both internal and external threats using best practices and specific tricks the author uses in his role as an independent consultant while working on some of the largest and most complex SQL Server installations in the world. This edition includes new chapters on Analysis Services, Reporting Services, and Storage Area Network Security.

  • Presents hands-on techniques for protecting your SQL Server database from intrusion and attack.
  • Provides the most in-depth coverage of all aspects of SQL Server database security, including a wealth of new material on Microsoft SQL Server 2012 (Denali).
  • Explains how to set up your database securely, how to determine when someone tries to break in, what the intruder has accessed or damaged, and how to respond and mitigate damage if an intrusion occurs.

Table of Contents
Chapter 1. Securing the Network
Chapter 2. Database Encryption
Chapter 3. SQL Password Security
Chapter 4. Securing the Instance
Chapter 5. Additional Security for an Internet Facing SQL Server and Application
Chapter 6. Analysis Services
Chapter 7. Reporting Services
Chapter 8. SQL Injection Attacks
Chapter 9. Database Backup Security Compression and Encryption
Chapter 10. Storage Area Network Security
Chapter 11. Auditing for Security
Chapter 12. Server Rights
Chapter 13. Securing Data

Book Details

  • Paperback: 408 pages
  • Publisher: Syngress; 2nd Edition (August 2012)
  • Language: English
  • ISBN-10: 1597499471
  • ISBN-13: 978-1597499477
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Securing SQL Server, 2nd Edition appeared first on Wow! eBook.

PCI Compliance, 3rd Edition

Posted: 07 May 2013 10:32 AM PDT

Book Description

The credit card industry established the PCI Data Security Standards to provide a minimum standard for how vendors should protect data to ensure it is not stolen by fraudsters. PCI Compliance, 3e, provides the information readers need to understand the current PCI Data Security standards, which have recently been updated to version 2.0, and how to effectively implement security within your company to be compliant with the credit card industry guidelines and protect sensitive and personally identifiable information. Security breaches continue to occur on a regular basis, affecting millions of customers and costing companies millions of dollars in fines and reparations. That doesn’t include the effects such security breaches have on the reputation of the companies that suffer attacks. PCI Compliance, 3e, helps readers avoid costly breaches and inefficient compliance initiatives to keep their infrastructure secure.

  • Provides a clear explanation of PCI.
  • Provides practical case studies, fraud studies, and analysis of PCI.
  • The first book to address version 2.0 updates to the PCI DSS, security strategy to keep your infrastructure PCI compliant.

Table of Contents
Chapter 1. About PCI and This Book
Chapter 2. Introduction to Fraud, Data Theft, and Related Regulatory Mandates
Chapter 3. Why Is PCI Here?
Chapter 4. Determining and Reducing the PCI Scope
Chapter 5. Building and Maintaining a Secure Network
Chapter 6. Strong Access Controls
Chapter 7. Protecting Cardholder Data
Chapter 8. Using Wireless Networking
Chapter 9. Vulnerability Management
Chapter 10. Logging Events and Monitoring the Cardholder Data Environment
Chapter 11. PCI for the Small Business
Chapter 12. Managing a PCI DSS Project to Achieve Compliance
Chapter 13. Don't Fear the Assessor
Chapter 14. The Art of Compensating Control
Chapter 15. You're Compliant, Now What?
Chapter 16. Emerging Technology and Alternative Payment Schemes
Chapter 17. Myths and Misconceptions of PCI DSS

Book Details

  • Paperback: 360 pages
  • Publisher: Syngress; 3rd Edition (August 2012)
  • Language: English
  • ISBN-10: 159749948X
  • ISBN-13: 978-1597499484
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post PCI Compliance, 3rd Edition appeared first on Wow! eBook.

Hacking Web Apps

Posted: 07 May 2013 10:25 AM PDT

Book Description

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these attacks, but he also tells you how to get rid of these worms, trojans, and botnets and how to defend against them in the future. Countermeasures are detailed so that you can fight against similar attacks as they evolve.

Attacks featured in this book include:

  • SQL Injection
  • Cross Site Scripting
  • Logic Attacks
  • Server Misconfigurations
  • Predictable Pages
  • Web of Distrust
  • Breaking Authentication Schemes
  • HTML5 Security Breaches
  • Attacks on Mobile Apps

Even if you don’t develop web sites or write HTML, Hacking Web Apps can still help you learn how sites are attacked-as well as the best way to defend against these attacks. Plus, Hacking Web Apps gives you detailed steps to make the web browser – sometimes your last line of defense – more secure.

  • More and more data, from finances to photos, is moving into web applications. How much can you trust that data to be accessible from a web browser anywhere and safe at the same time?
  • Some of the most damaging hacks to a web site can be executed with nothing more than a web browser and a little knowledge of HTML.
  • Learn about the most common threats and how to stop them, including HTML Injection, XSS, Cross Site Request Forgery, SQL Injection, Breaking Authentication Schemes, Logic Attacks, Web of Distrust, Browser Hacks and many more.

Table of Contents
Chapter 1. Introduction
Chapter 2. Cross Site Scripting (XSS)
Chapter 3. Cross Site Request Forgery (CSRF)
Chapter 4. SQL Injection
Chapter 5. Server Misconfigurations and Predictable Pages
Chapter 6. Breaking Authentication Schemes
Chapter 7. Logic Attacks
Chapter 8. Web of Distrust
Chapter 9. HTML5 Security Breaches

Book Details

  • Paperback: 296 pages
  • Publisher: Syngress (September 2012)
  • Language: English
  • ISBN-10: 159749951X
  • ISBN-13: 978-1597499514
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Hacking Web Apps appeared first on Wow! eBook.

Keys to the Kingdom

Posted: 07 May 2013 10:19 AM PDT

Book Description

Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author’s previous book, Practical Lock Picking.

This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. As with Deviant Ollam’s previous book, Practical Lock PickingKeys to the Kingdom includes full-color versions of all diagrams and photographs. Check out the companion website which includes instructional videos that provide readers with a full-on training seminar from the author.

  • Excellent companion to Deviant Ollam’s Practical Lock Picking.
  • Understand the typical failings of common security hardware in order to avoid these weaknesses.
  • Learn advanced methods of physical attack in order to be more successful with penetration testing.
  • Detailed full-color photos in the book make learning easy, and companion website is filled with invalualble training videos from Dev!

Table of Contents
Chapter 1. Key Impressioning
Chapter 2. Foil Key/Soft Key Attacks
Chapter 3. Master Key Privilege Escalation
Chapter 4. Key Bumping
Chapter 5. Skeleton Keys
Chapter 6. Cast and Mold Attacks
Chapter 7. Set-Up Keys
Chapter 8. Sight Decoding of Keys from Photos or in Real Life
Chapter 9. Decoding & Attacking User Re-Keyable Locks
Chapter 10. Construction Keying

Book Details

  • Paperback: 256 pages
  • Publisher: Syngress (September 2012)
  • Language: English
  • ISBN-10: 1597499838
  • ISBN-13: 978-1597499835
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Keys to the Kingdom appeared first on Wow! eBook.

CISSP Study Guide, 2nd Edition

Posted: 07 May 2013 10:16 AM PDT

Book Description

The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. The newest edition of this acclaimed study guide is aligned to cover all of the material included in the newest version of the exam’s Common Body of Knowledge. The ten domains are covered completely and as concisely as possible with an eye to acing the exam.

Each of the ten domains has its own chapter that includes specially designed pedagogy to aid the test-taker in passing the exam, including: Clearly stated exam objectives; Unique terms/Definitions; Exam Warnings; Learning by Example; Hands-On Exercises; Chapter ending questions. Furthermore, special features include: Two practice exams; Tiered chapter ending questions that allow for a gradual learning curve; and a self-test appendix

  • Provides the most complete and effective study guide to prepare you for passing the CISSP exam-contains only what you need to pass the test, with no fluff!
  • Eric Conrad has prepared hundreds of professionals for passing the CISSP exam through SANS, a popular and well-known organization for information security professionals.
  • Covers all of the new information in the Common Body of Knowledge updated in January 2012, and also provides two practice exams, tiered end-of-chapter questions for a gradual learning curve, and a complete self-test appendix.

Table of Contents
Domain 1. Information Security Governance and Risk Management
Domain 2. Access Control
Domain 3. Cryptography
Domain 4. Physical (Environmental) Security
Domain 5. Security Architecture and Design
Domain 6. Business Continuity and Disaster Recovery Planning
Domain 7. Telecommunications and Network Security
Domain 8. Application Development Security
Domain 9. Operations Security
Domain 10. Legal, Regulations, Investigations, and Compliance

Book Details

  • Paperback: 600 pages
  • Publisher: Syngress; 2nd Edition (September 2012)
  • Language: English
  • ISBN-10: 1597499617
  • ISBN-13: 978-1597499613
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post CISSP Study Guide, 2nd Edition appeared first on Wow! eBook.

Malware Forensics Field Guide for Windows Systems

Posted: 07 May 2013 10:13 AM PDT

Book Description

Dissecting the dark side of the Internet with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware) is a treaterous condition for any forensic investigator or analyst. Written by information security experts with real-world investigative experience, Malware Forensics Field Guide for Windows Systems is a ”tool” with checklists for specific tasks, case studies of difficult situations, and expert analyst tips.

  • A condensed hand-held guide complete with on-the-job tasks and checklists
  • Specific for Windows-based systems, the largest running OS in the world
  • Authors are world-renowned leaders in investigating and analyzing malicious code

Table of Contents
Chapter 1. Malware Incident Response
Chapter 2. Memory Forensics
Chapter 3. Post-Mortem Forensics
Chapter 4. Legal Considerations
Chapter 5. File Identification and Profiling Initial Analysis of a Suspect File on a Windows System
Chapter 6. Analysis of a Suspect Program

Book Details

  • Paperback: 560 pages
  • Publisher: Syngress (June 2012)
  • Language: English
  • ISBN-10: 1597494720
  • ISBN-13: 978-1597494724
Note: There is a file embedded within this post, please visit this post to download the file.

Related Books

The post Malware Forensics Field Guide for Windows Systems appeared first on Wow! eBook.

Tidak ada komentar:

Posting Komentar