UNIX Network Programming

Titre : UNIX Network Programming
Auteur : W. Richard Stevens
Éditeur : Addison-Wesley Professional
ISBN-13 : 0131411551
Libération : 2004

Télécharger Lire en ligne



* *Previous editions sold over 160,000 units! Second Edition (1998) sold over 53,000 in retail alone! *Updates coverage of programming standards, debugging techniques, and covers Operating Systems including Red Hat 9, Solaris 9, HP-UX, Free BSD 4.8/5.0, AIX 5.x, and Mac OS X. *Bill Fenner (AT/T Labs) and Andrew Rudoff (SUN) carry on the tradition of this great work.

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

Networked Graphics

Titre : Networked Graphics
Auteur : Anthony Steed
Éditeur : Elsevier
ISBN-13 : 0080922236
Libération : 2009-10-30

Télécharger Lire en ligne



Networked Graphics equips programmers and designers with a thorough grounding in the techniques used to create truly network-enabled computer graphics and games. Written for graphics/game/VE developers and students, it assumes no prior knowledge of networking. The text offers a broad view of what types of different architectural patterns can be found in current systems, and readers will learn the tradeoffs in achieving system requirements on the Internet. It explains the foundations of networked graphics, then explores real systems in depth, and finally considers standards and extensions. Numerous case studies and examples with working code are featured throughout the text, covering groundbreaking academic research and military simulation systems, as well as industry-leading game designs. Everything designers need to know when developing networked graphics and games is covered in one volume - no need to consult multiple sources. The many examples throughout the text feature real simulation code in C++ and Java that developers can use in their own design experiments. Case studies describing real-world systems show how requirements and constraints can be managed.

The TCP IP Guide

Titre : The TCP IP Guide
Auteur : Charles M. Kozierok
Éditeur : No Starch Press
ISBN-13 : 9781593270476
Libération : 2005

Télécharger Lire en ligne



Up to date and accessible, this comprehensive reference to the TCP/IP networking protocols will become a valuable resource for any IT professional and an excellent text for students.

Android Security Internals

Titre : Android Security Internals
Auteur : Nikolay Elenkov
Éditeur : No Starch Press
ISBN-13 : 9781593276416
Libération : 2014-10-14

Télécharger Lire en ligne



There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now. In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security sys­tem. Elenkov describes Android security archi­tecture from the bottom up, delving into the imple­mentation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration. You’ll learn: –How Android permissions are declared, used, and enforced –How Android manages application packages and employs code signing to verify their authenticity –How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks –About Android’s credential storage system and APIs, which let applications store cryptographic keys securely –About the online account management framework and how Google accounts integrate with Android –About the implementation of verified boot, disk encryption, lockscreen, and other device security features –How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.

Bulletproof SSL and TLS

Titre : Bulletproof SSL and TLS
Auteur : Ivan Ristic
Éditeur : Feisty Duck
ISBN-13 : 9781907117046
Libération : 2014

Télécharger Lire en ligne



Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and impersonation attacks. In this book, you’ll find just the right mix of theory, protocol detail, vulnerability and weakness information, and deployment advice to get your job done: - Comprehensive coverage of the ever-changing field of SSL/TLS and Internet PKI, with updates to the digital version - For IT security professionals, help to understand the risks - For system administrators, help to deploy systems securely - For developers, help to design and implement secure web applications - Practical and concise, with added depth when details are relevant - Introduction to cryptography and the latest TLS protocol version - Discussion of weaknesses at every level, covering implementation issues, HTTP and browser problems, and protocol vulnerabilities - Coverage of the latest attacks, such as BEAST, CRIME, BREACH, Lucky 13, RC4 biases, Triple Handshake Attack, and Heartbleed - Thorough deployment advice, including advanced technologies, such as Strict Transport Security, Content Security Policy, and pinning - Guide to using OpenSSL to generate keys and certificates and to create and run a private certification authority - Guide to using OpenSSL to test servers for vulnerabilities - Practical advice for secure server configuration using Apache httpd, IIS, Java, Nginx, Microsoft Windows, and Tomcat This book is available in paperback and a variety of digital formats without DRM.

TCP IP Essentials

Titre : TCP IP Essentials
Auteur : Shivendra S. Panwar
Éditeur : Cambridge University Press
ISBN-13 : 052160124X
Libération : 2004-11-18

Télécharger Lire en ligne



A hands-on textbook on TCP/IP technologies, showing how the protocols are implemented in practice.

Web Performance Tuning

Titre : Web Performance Tuning
Auteur : Patrick Killelea
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 059600172X
Libération : 2002

Télécharger Lire en ligne



This handbook is for anyone responsible for a Web site, from the person running a personal site off a Linux PC at home up to large corporate site managers who wants to improve their performance right now.

Practical UNIX and Internet Security

Titre : Practical UNIX and Internet Security
Auteur : Simson Garfinkel
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781449310127
Libération : 2003-02-21

Télécharger Lire en ligne



When Practical Unix Security was first published more than a decade ago, it became an instant classic. Crammed with information about host security, it saved many a Unix system administrator from disaster. The second edition added much-needed Internet security coverage and doubled the size of the original volume. The third edition is a comprehensive update of this very popular book - a companion for the Unix/Linux system administrator who needs to secure his or her organization's system, networks, and web presence in an increasingly hostile world.Focusing on the four most popular Unix variants today--Solaris, Mac OS X, Linux, and FreeBSD--this book contains new information on PAM (Pluggable Authentication Modules), LDAP, SMB/Samba, anti-theft technologies, embedded systems, wireless and laptop issues, forensics, intrusion detection, chroot jails, telephone scanners and firewalls, virtual and cryptographic filesystems, WebNFS, kernel security levels, outsourcing, legal issues, new Internet protocols and cryptographic algorithms, and much more.Practical Unix & Internet Security consists of six parts: Computer security basics: introduction to security problems and solutions, Unix history and lineage, and the importance of security policies as a basic element of system security. Security building blocks: fundamentals of Unix passwords, users, groups, the Unix filesystem, cryptography, physical security, and personnel security. Network security: a detailed look at modem and dialup security, TCP/IP, securing individual network services, Sun's RPC, various host and network authentication systems (e.g., NIS, NIS+, and Kerberos), NFS and other filesystems, and the importance of secure programming. Secure operations: keeping up to date in today's changing security world, backups, defending against attacks, performing integrity management, and auditing. Handling security incidents: discovering a break-in, dealing with programmed threats and denial of service attacks, and legal aspects of computer security. Appendixes: a comprehensive security checklist and a detailed bibliography of paper and electronic references for further reading and research. Packed with 1000 pages of helpful text, scripts, checklists, tips, and warnings, this third edition remains the definitive reference for Unix administrators and anyone who cares about protecting their systems and data from today's threats.

TCP IP and Related Protocols

Titre : TCP IP and Related Protocols
Auteur : Uyless D. Black
Éditeur : McGraw-Hill Companies
ISBN-13 : UOM:39015040151428
Libération : 1998

Télécharger Lire en ligne



This is an introduction for TCP/IP users. Designed for relative newcomers and experienced network professionals alike. It explains the basics through IPv6 (the latest TCP/IP release) from a user's perspective.