ARRAY(0xc772d9fc)
 

Amazon Customer

"haddad_i"
 
Helpful votes received on reviews: 100% (1 of 1)
Location: Montreal, Canada
In My Own Words:
http://www.cs.concordia.ca/~grad/i_haddad
 

Reviews

Top Reviewer Ranking: 410,441 - Total Helpful Votes: 1 of 1
Defend I.T.: Security by Example by Ajay Gupta
Defend I.T. is a collection of case studies from the authors experiences in the field. The case studies are representative of the vast array of security consulting engagements they see in the computer security, forensics, and data privacy arena.
It consists entirely of case studies, and that is different. It covers topics ranging from war dialing, wireless security, computer viruses, computer forensics, HIPAA assessment and social engineering. People tend to relate better and comprehend more when issues are presented as real life examples.
Information Security is a challenging area. Organizations face security issues every day, but due to the need for confidentiality around… Read more
Know Your Enemy: Learning about Security Threats (&hellip by Honeynet Project  The
5.0 out of 5 stars Very good book!, July 9 2004
One of most exciting areas to emerge in information security has been in the area of honeynets. These are networks designed to be compromised and capture all of the tools and activity of attackers
The Honeynet Project is a volunteer organization dedicated to researching and learning cyber-threats, and sharing our lessons learned. The project is made up of 30 security professionals around the world. They learn about cyber-threats by deploying networks around the world to be compromised. Once compromised, they capture all of the attacker's tools and activity, analyze, and learn from that. The value to this research is there is very little theory involved, they are capturing and… Read more
Understanding and Deploying LDAP Directory Service&hellip by Timothy A. Howes Ph.D.
Background:
LDAP (Lightweight Directory Access Protocol) is a software protocol that enables locating organizations, individuals, and other resources such as files and devices in a network, whether it is a public Internet or a corporate Intranet.
As LDAP adoption and deployment is increasing, the expanded second edition of "Understanding and Deploying LDAP Directory Services" is published with more materials from the authors on the protocol and how to apply it effectively in different network environments.
Book Organization:
The book consists of twenty-six chapters divided into six major parts:
- Directory services overview and history
- Designing… Read more