|
46 Free eBooks On Security! Time to brush up your computer security skills with these 46 free ebooks!
With more and more security threats coming up everyday, security is one field in technology that will never slow down in terms of job opportunities. And as almost every employer today is looking for experts in this field, we bring 46 free ebooks from different aspects of security to help you update your skill set.
1. |
Network Security Hacks, 2nd Edition
The
introduction of the book says, "In the fast-moving world of computers,
things are always changing. Since the first edition of this
strong-selling book appeared two years ago, network security techniques
and tools have evolved rapidly to meet new and more sophisticated
threats that pop up with alarming regularity. The 2nd edition offers
both new and thoroughly updated hacks for Linux, Windows, OpenBSD, and
Mac OS X servers that not only enable readers to secure TCP/IP-based
services, but helps them implement a good deal of clever host-based
security techniques as well." |
2. |
Microsoft Windows XP Networking and Security Inside OutThe introduction of the book says, "Dig
into Windows XP - and discover how you can really put its networking
and security features to work! Also covering Windows 2000, this
supremely organized reference packs hundreds of time saving solutions,
troubleshooting tips, and handy workarounds in concise, fast-answer
format. It's all muscle and no fluff. Find the best and fastest ways to
perform everyday networking tasks, and challenge yourself to new levels
of mastery!" |
3. |
Linux Network Administrator's Guide, 3rd EditionThe introduction of the book says, "The
Linux Network Administrator's Guide, 3rd Edition dispenses all the
practical advice you need to join a network. Along with some hardware
considerations, this highly acclaimed guide takes an in-depth look at
all of the essential networking software that comes with the operating
system - including basic infrastructure (TCP/IP, wireless networking,
firewalling) and the most popular services on Linux systems. But as the
follow-up to a classic, the third edition of the Linux Network
Administrator's Guide does more than just spruce up the basics." |
4. |
Network Security with OpenSSLThe introduction of the book says, "OpenSSL
is a popular and effective open source version of SSL/TLS, the most
widely used protocol for secure network communications. The only guide
available on the subject, Network Security with OpenSSL details the
challenges in securing network communications, and shows you how to use
OpenSSL tools to best meet those challenges. Focused on the practical,
this book provides only the information that is necessary to use OpenSSL
safely and effectively." |
5. |
Pro PHP Security, 2nd EditionThe introduction of the book says, "PHP
security just like PHP itself, has advanced. Updated for PHP 5.3, the
2nd edition of this authoritative PHP security book covers foundational
PHP security topics like SQL injection, XSS, user authentication, and
secure PHP development. Chris Snyder and Tom Myer also delve into recent
developments like mobile security the impact of JavaScript, and the
advantages of recent PHP hardening efforts. Pro PHP Security Second
Edition will serve as your complete guide for taking defensive and
proactive security measures within your PHP applications. Beginners in
secure programming will find a lot of material on secure PHP
development, the basics of encryption, secure protocols, as well as how
to reconcile the demands of server-side and web application security." |
6. |
End-to-End Network SecurityThe introduction of the book says, "End-to-End
Network Security is designed to counter the new generation of complex
threats. Adopting this robust security strategy defends against highly
sophisticated attacks that can occur at multiple locations in your
network. The ultimate goal is to deploy a set of security capabilities
that together create an intelligent, self-defending network that
identifies attacks as they occur, generates alerts as appropriate, and
then automatically responds." |
7. |
Professional ASP.NET 3.5 Security, Membership, and Role Management with C# and VBThe introduction of the book says, "ASP.NET
security covers concepts such as Web security developing in partial
trust, forms authentication, and securing configuration—just to name a
few—all integral components to helping developers ensure reliable
security. Addressing the ASP.NET developer's security view, this book
offers detailed information on every major area of ASP.NET security that
you'll encounter when developing Web applications. The book covers
security in ASP.NET in general and includes the new additions and
changes in ASP.NET 3.5." |
8. |
Web Security Testing CookbookThe introduction of the book says, "Among
the tests you perform on web applications, security testing is perhaps
the most important, yet it's often the most neglected. The recipes in
the Web Security Testing Cookbook demonstrate how developers and testers
can check for the most common web security issues, while conducting
unit tests, regression tests, or exploratory tests. Unlike ad hoc
security assessments, these recipes are repeatable, concise, and
systematic-perfect for integrating into your regular test suite." |
9. |
Hacking Exposed Linux, 3rd EditionThe introduction of the book says, "This
authoritative guide will help you secure your Linux network - whether
you use Linux as a desktop OS, for Internet services, for
telecommunications, or for wireless services. Completely rewritten the
ISECOM way, Hacking Exposed Linux, Third Edition provides the most
up-to-date coverage available from a large team of topic-focused
experts. The book is based on the latest ISECOM security research and
shows you, in full detail, how to lock out intruders and defend your
Linux systems against catastrophic attacks." |
10. |
Security MetricsThe introduction of the book says, "Security
Metrics is the first comprehensive best-practice guide to defining,
creating, and utilizing security metrics in the enterprise. Using sample
charts, graphics, case studies, and war stories, Yankee Group Security
Expert Andrew Jaquith demonstrates exactly how to establish effective
metrics based on your organization's unique requirements. You'll
discover how to quantify hard-to-measure security activities, compile
and analyze all relevant data, identify strengths and weaknesses, set
cost-effective priorities for improvement, and craft compelling messages
for senior management." |
11. |
Hacking Exposed Web 2.0The introduction of the book says, "Protect
your Web 2.0 architecture against the latest wave of cybercrime using
expert tactics from Internet security professionals. Hacking Exposed Web
2.0 shows how hackers perform reconnaissance, choose their entry point,
and attack Web 2.0 - based services, and reveals detailed
countermeasures and defense techniques. You'll learn how to avoid
injection and buffer overflow attacks, fix browser and plug-in flaws,
and secure AJAX, Flash, and XML-driven applications. Real-world case
studies illustrate social networking site weaknesses, cross-site attack
methods, migration vulnerabilities, and IE shortcomings." |
12. |
Hacking Exposed Windows, 3rd EditionThe introduction of the book says, "Meet
the challenges of Windows security with the exclusive Hacking Exposed
"attack-countermeasure" approach. Learn how real-world malicious hackers
conduct reconnaissance of targets and then exploit common
misconfigurations and software flaws on both clients and servers. See
leading-edge exploitation techniques demonstrated, and learn how the
latest countermeasures in Windows XP, Vista, and Server 2003/2008 can
mitigate these attacks. Get practical advice based on the authors and
contributors many years as security professionals hired to break into
the world's largest IT infrastructures." |
13. |
A+, Network+, Security+ Exams in a NutshellThe introduction of the book says, "If
you're preparing for the new CompTIA 2006 certification in A+, or the
current Network+ and Security+ certifications, you'll find this book
invaluable. Its concise easy-to-use format provides all the information
you need to get ready for the exams, including the four new A+ exams -
the required Essentials exam and three elective exams that pertain to
your area of specialization." |
14. |
Network Security Assessment, 2nd EditionThe introduction of the book says, "Network
Security Assessment provides you with the tricks and tools professional
security consultants use to identify and assess risks in Internet-based
networks-the same penetration testing model they use to secure
government, military, and commercial networks. With this book, you can
adopt, refine, and reuse this testing model to design and deploy
networks that are hardened and immune from attack." |
15. |
Security Power ToolsThe introduction of the book says, "What
if you could sit down with some of the most talented security engineers
in the world and ask any network security question you wanted? Security
Power Tools lets you do exactly that! Members of Juniper Networks'
Security Engineering team and a few guest experts reveal how to use,
tweak, and push the most popular network security applications,
utilities, and tools available using Windows, Linux, Mac OS X, and Unix
platforms." |
16. |
Network Security Hacks, 2nd EditionThe introduction of the book says, "In
the fast-moving world of computers, things are always changing. Since
the first edition of this strong-selling book appeared two years ago,
network security techniques and tools have evolved rapidly to meet new
and more sophisticated threats that pop up with alarming regularity. The
2nd edition offers both new and thoroughly updated hacks for Linux,
Windows, OpenBSD, and Mac OS X servers that not only enable readers to
secure TCP/IP-based services, but helps them implement a good deal of
clever host-based security techniques as well." |
17. |
Beginning ASP.NET SecurityThe introduction of the book says, "Beginning
ASP.NET Security is for novice to intermediate ASP.NET programmers and
provides a step-by-step solution to securing each area of ASP.NET
development. Rather than approaching security from a theoretical
direction, MVP Barry Dorrans shows you examples of how everyday code can
be attacked, and describes the steps necessary for defense. Inside,
you'll learn how you can defend your ASP.NET applications using the .NET
framework, industry patterns and best practices, code libraries and
resources provided by Microsoft and others." |
18. |
Junos SecurityThe introduction of the book says, "Junos
Security is the complete and authorized introduction to the new Juniper
Networks SRX hardware series. This book not only provides a practical,
hands-on field guide to deploying, configuring, and operating SRX, it
also serves as a reference to help you prepare for any of the Junos
Security Certification examinations offered by Juniper Networks. Network
administrators and security professionals will learn how to use SRX
Junos services gateways to address an array of enterprise data network
requirements - including IP routing, intrusion detection, attack
mitigation, unified threat management, and WAN acceleration. Junos
Security is a clear and detailed roadmap to the SRX product lines." |
19. |
Enterprise Mac Security: Mac OS X Snow Leopard, 2nd EditionThe introduction of the book says, "A
common misconception in the Mac community is that Mac's operating
system is more secure than others. While this might be true in certain
cases, security on the Mac is still a crucial issue. When sharing is
enabled or remote control applications are installed, Mac OS X faces a
variety of security threats. Enterprise Mac Security: Mac OS X Snow
Leopard is a definitive, expert-driven update of the popular,
slash-dotted first edition and was written in part as a companion to the
SANS Institute course for Mac OS X. It contains detailed Mac OS X
security information, and walkthroughs on securing systems, including
the new Snow Leopard operating system. Using the SANS Institute course
as a sister, this book caters to both the beginning home user and the
seasoned security professional not accustomed to the Mac, establishing
best practices for Mac OS X for a wide audience." |
20. |
Wireless and Mobile Networks SecurityThe introduction of the book says, "This
book provides a thorough examination and analysis of cutting-edge
research and security solutions in wireless and mobile networks. It
begins with coverage of the basic security concepts and fundamentals
which underpin and provide the knowledge necessary for understanding and
evaluating security issues, challenges, and solutions. This material
will be of invaluable use to all those working in the network security
field, and especially to the many people entering the field. The next
area of focus is on the security issues and available solutions
associated with off-the-shelf wireless and mobile technologies such as
Bluetooth, WiFi, WiMax, 2G, and 3G." |
21. |
Hacking Exposed, 6th EditionThe introduction of the book says, "Meet
the formidable demands of security in today's hyperconnected world with
expert guidance from the world-renowned Hacking Exposed team. Following
the time-tested "attack-countermeasure" philosophy, this 10th
anniversary edition has been fully overhauled to cover the latest
insidious weapons in the hacker's extensive arsenal. New and updated
material!" |
22. |
Cisco ASA, 2nd EditionThe introduction of the book says, "Cisco
ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security
Appliance, Second Edition, is Cisco's authoritative practitioner's guide
to planning, deploying, managing, and troubleshooting security with
Cisco ASA. Written by two leading Cisco security experts, this book
presents each Cisco ASA solution in depth, offering comprehensive sample
configurations, proven troubleshooting methodologies, and debugging
examples. Readers will learn about the Cisco ASA Firewall solution and
capabilities; secure configuration and troubleshooting of site-to-site
and remote access VPNs; Intrusion Prevention System features built into
Cisco ASA's Advanced Inspection and Prevention Security Services Module
(AIP-SSM); and Anti-X features in the ASA Content Security and Control
Security Services Module (CSC-SSM). This new edition has been updated
with detailed information on the latest ASA models and features." |
23. |
Cloud Security and PrivacyThe introduction of the book says, "You
may regard cloud computing as an ideal way for your company to control
IT costs, but do you know how private and secure this service really is?
Not many people do. With Cloud Security and Privacy, you'll learn
what's at stake when you trust your data to the cloud, and what you can
do to keep your virtual infrastructure and web applications secure. This
book offers you sound advice from three well-known authorities in the
tech security world." |
24. |
Beautiful SecurityThe introduction of the book says, "In
Beautiful Security today's security experts offer a collection of
essays that describe bold and extraordinary methods to secure computer
systems in the face of ever-increasing threats. You'll learn how new and
more aggressive security measures work -- and where they will lead us.
This far-reaching discussion takes you into the techniques, technology,
ethics, and laws at the center of the biggest revolution in the history
of network security." |
25. |
Security MonitoringThe introduction of the book says, "How
well does your enterprise stand up against today's sophisticated
security threats? In this book, security experts from Cisco Systems
demonstrate how to detect damaging security incidents on your global
network -- first by teaching you which assets you need to monitor
closely, and then by helping you develop targeted strategies and
pragmatic techniques to protect them. These recommendations will help
you select and deploy the very best tools to monitor your own enterprise
network." |
26. |
The Myths of SecurityThe introduction of the book says, "If
you think computer security has improved in recent years, Myths of
Security will shake you out of your complacency. Longtime security
professional John Viega reports on the sorry state of security with
concrete suggestions for professionals and individuals confronting the
issue. Provocative, insightful, and often controversial, The Myths of
Security addresses IT professionals who deal with security issues, and
speaks to Mac and PC users who spend time online." |
27. |
End-to-End Network SecurityThe introduction of the book says, "End-to-End
Network Security is designed to counter the new generation of complex
threats. Adopting this robust security strategy defends against highly
sophisticated attacks that can occur at multiple locations in your
network. The ultimate goal is to deploy a set of security capabilities
that together create an intelligent, self-defending network that
identifies attacks as they occur, generates alerts as appropriate, and
then automatically responds." |
28. |
Spring Security 3.1The introduction of the book says, "Learn
to leverage the power of Spring Security to keep intruders at bay
through simple examples that illustrate real world problems. Each sample
demonstrates key concepts allowing you to build your knowledge of the
architecture in a practical and incremental way. Filled with samples
that clearly illustrate how to integrate with the technologies and
frameworks of your choice." |
29. |
Microsoft SQL Server 2012 Security CookbookThe introduction of the book says, "Practical,
focused recipes for securing your SQL Server database. Master the
latest techniques for data and code encryption, user authentication and
authorization, protection against brute force attacks, denial-of-service
attacks, and SQL Injection, and more. A learn-by-example recipe-based
approach that focuses on key concepts to provide the foundation to solve
real world problems." |
30. |
Android Apps SecurityThe introduction of the book says, "Android
Apps Security provides guiding principles for how to best design and
develop Android apps with security in mind. It explores concepts that
can be used to secure apps and how developers can use and incorporate
these security features into their apps. This book will provide
developers with the information they need to design useful,
high-performing, and secure apps that expose end-users to as little risk
as possible." |
31. |
Moodle SecurityThe introduction of the book says, "Moodle
Security will show you how to make sure that only authorized users can
access the information on your Moodle site. This may seem simple, but,
every day, systems get hacked and information gets lost or misused.
Imagine the consequences if that were to happen in your school. The
straightforward examples in this book will help you to lock down those
access routes one door at a time." |
32. |
Application Security for the Android PlatformThe introduction of the book says, "With
the Android platform fast becoming a target of malicious hackers,
application security is crucial. This concise book provides the
knowledge you need to design and implement robust, rugged, and secure
apps for any Android device. You'll learn how to identify and manage the
risks inherent in your design, and work to minimize a hacker̢۪s
opportunity to compromise your app and steal user data. How is the
Android platform structured to handle security? What services and tools
are available to help you protect data? Up until now, no single resource
has provided this vital information. With this guide, you'll learn how
to address real threats to your app, whether or not you have previous
experience with security issues" |
33. |
Expert Oracle and Java SecurityThe introduction of the book says, "Expert
Oracle and Java Security: Programming Secure Oracle Database
Applications with Java provides resources that every Java and Oracle
database application programmer needs to ensure that they have guarded
the security of the data and identities entrusted to them. You'll learn
to consider potential vulnerabilities, and to apply best practices in
secure Java and PL/SQL coding. Author David Coffin shows how to develop
code to encrypt data in transit and at rest, to accomplish single
sign-on with Oracle proxy connections, to generate and distribute
two-factor authentication tokens from the Oracle server using pagers,
cell phones (SMS), and e-mail, and to securely store and distribute
Oracle application passwords. Early chapters lay the foundation for
effective security in an Oracle/Java environment. Each of the later
chapters brings example code to a point where it may be applied as-is to
address application security issues. Templates for applications are
also provided to help you bring colleagues up to the same secure
application standards. If you are less familiar with either Java or
Oracle PL/SQL, you will not be left behind; all the concepts in this
book are introduced as to a novice and addressed as to an expert." |
34. |
Network Security AuditingThe introduction of the book says, "This
complete new guide to auditing network security is an indispensable
resource for security network, and IT professionals, and for the
consultants and technology partners who serve them. Cisco network
security expert Chris Jackson begins with a thorough overview of the
auditing process, including coverage of the latest regulations,
compliance issues, and industry best practices. The author then
demonstrates how to segment security architectures into domains and
measure security effectiveness through a comprehensive systems
approach." |
35. |
Hacking Exposed Web Applications, 3rd EditionThe introduction of the book says, "Protect
your Web applications from malicious attacks by mastering the weapons
and thought processes of today's hacker. Written by recognized security
practitioners and thought leaders, Hacking Exposed Web Applications,
Third Edition is fully updated to cover new infiltration methods and
countermeasures. Find out how to reinforce authentication and
authorization, plug holes in Firefox and IE, reinforce against injection
attacks, and secure Web 2.0 features. Integrating security into the Web
development lifecycle (SDL) and into the broader enterprise information
security program is also covered in this comprehensive resource." |
36. |
Hacking Exposed Wireless, 2nd EditionThe introduction of the book says, "Protect
your wireless systems from crippling attacks using the detailed
security information in this comprehensive volume. Thoroughly updated to
cover today's established and emerging wireless technologies, Hacking
Exposed Wireless, second edition reveals how attackers use readily
available and custom tools to target, infiltrate, and hijack vulnerable
systems. This book discusses the latest developments in Wi-Fi,
Bluetooth, ZigBee, and DECT hacking, and explains how to perform
penetration tests, reinforce WPA protection schemes, mitigate packet
injection risk, and lock down Bluetooth and RF devices. Cutting-edge
techniques for exploiting Wi-Fi clients, WPA2, cordless phones,
Bluetooth pairing, and ZigBee encryption are also covered in this fully
revised guide." |
37. |
Computer Security - ESORICS 2013The introduction of the book says, "This
book constitutes the refereed proceedings of the 18th European
Symposium on Computer Security ESORICS 2013, held in Egham, UK, in
September 2013. The 43 papers included in the book were carefully
reviewed and selected from 242 papers. The aim of ESORICS is to further
the progress of research in computer security by establishing a European
forum for bringing together researchers in this area, by promoting the
exchange of ideas with system developers and by encouraging links with
researchers in related areas. The papers cover all topics related to
security privacy and trust in computer systems and networks." |
38. |
Advances in Security of Information and Communication NetworksThe introduction of the book says, "This
book constitutes the refereed proceedings of the International
Conference on Advances in Security of Information and Communication
Networks, SecNet 2013, held in Cairo, Egypt, in September 2013. The 21
revised full papers presented were carefully reviewed and selected from
62 submissions. The papers are organized in topical sections on
networking security; data and information security; authentication and
privacy; security applications." |
39. |
Juniper SRX SeriesThe introduction of the book says, "This
complete field guide, authorized by Juniper Networks, is the perfect
hands-on reference for deploying, configuring, and operating Juniper's
SRX Series networking device. Authors Brad Woodberg and Rob Cameron
provide field-tested best practices for getting the most out of SRX
deployments, based on their extensive field experience. While their
earlier book, Junos Security covered the SRX platform, this book focuses
on the SRX Series devices themselves. You'll learn how to use SRX
gateways to address an array of network requirements—including IP
routing, intrusion detection, attack mitigation, unified threat
management, and WAN acceleration. Along with case studies and
troubleshooting tips, each chapter provides study questions and lots of
useful illustrations." |
40. |
Hands-On Oracle Application Express SecurityThe introduction of the book says, "As
a Rapid Application Development framework, Oracle Application Express
(APEX) allows websites to easily be created based on data within an
Oracle database. Using only a web browser, you can develop and deploy
professional applications that are both fast and secure. However, as
with any website, there is a security risk and threat, and securing APEX
applications requires some specific knowledge of the framework. Written
by well-known security specialists Recx, this book shows you the
correct ways to implement your APEX applications to ensure that they are
not vulnerable to attacks. Real-world examples of a variety of security
vulnerabilities demonstrate attacks and show the techniques and best
practices for making applications secure." |
41. |
Expert Oracle Application Express SecurityThe introduction of the book says, "Expert
Oracle Application Express Security covers all facets of security
related to Oracle Application Express (APEX) development. From basic
settings that can enhance security to preventing SQL Injection and Cross
Site Scripting attacks, Expert Oracle Application Express Security
shows how to secure your APEX applictions and defend them from
intrusion. Security is a process, not an event. Expert Oracle
Application Express Security is written with that theme in mind. Scott
Spendolini, one of the original creators of the product, offers not only
examples of security best practices, but also provides step-by-step
instructions on how to implement the recommendations presented." |
42. |
Pro Spring SecurityThe introduction of the book says, "Security
is a key element in the development of any non-trivial application. The
Spring Security Framework provides a comprehensive set of
functionalities to implement industry-standard authentication and
authorization mechanisms for Java applications. This book is for Java
and Grails developers who would like to secure their applications easily
by applying industry's best practices. I assume a fair knowledge of
Java and a basic knowledge of Spring Dependency Injection." |
43. |
Pro ASP.NET Web API SecurityThe introduction of the book says, "ASP.NET
Web API is a key part of ASP.NET MVC 4 and the platform of choice for
building RESTful services that can be accessed by a wide range of
devices. Everything from JavaScript libraries to RIA plugins, RFID
readers to smart phones can consume your services using
platform-agnostic HTTP. Fortunately, ASP.NET Web API provides a simple,
robust security solution of its own that fits neatly within the ASP.NET
MVC programming model and secures your code without the need for SOAP,
meaning that there is no limit to the range of devices that it can work
with – if it can understand HTTP, then it can be secured by Web API.
These SOAP-less security techniques are the focus of this book." |
44. |
Netcat StarterThe introduction of the book says, "Learn
something new in an Instant! A short, fast, focused guide delivering
immediate results. Downloading, compiling, and installing Netcat on
Windows and Linux platforms. Establish a raw network connection so you
can understand how Netcat processes information using a simplistic chat
interface. Establish and maintain a remote shell / back door on various
operating systems." |
45. |
Cyber Security Policy GuidebookThe introduction of the book says, "Drawing
upon a wealth of experience from academia, industry, and government
service, Cyber Security Policy Guidebook details and dissects, in simple
language, current organizational cyber security policy issues on a
global scale - taking great care to educate readers on the history and
current approaches to the security of cyberspace. It includes thorough
descriptions - as well as the pros and cons - of a plethora of issues,
and documents policy alternatives for the sake of clarity with respect
to policy alone. The Guidebook also delves into organizational
implementation issues, and equips readers with descriptions of the
positive and negative impact of specific policy choices." |
46. |
Nmap 6: Network Exploration and Security Auditing CookbookThe introduction of the book says, "Master
the basic scanning techniques for port scanning and host discovery.
Perform security checks to web applications, mail servers and databases.
Learn how the Nmap Scripting Engine works and develop your own scripts!
100% practical tasks, relevant and explained step-by-step with exact
commands and optional arguments description." |
eBooks courtesy: it-ebooks
|
|
|
|
|
|
|
|
|
|
|
0 comments:
Post a Comment