Sunday, October 14, 2007

Security books

The Hacker CrackDown

If you're a computer cop, a hacker, or an electronic civil liberties activist, you are the target audience for this book. I wrote this book because I wanted to help you, and help other people understand you and your unique, uhm, problems. I wrote this book to aid your activities, and to contribute to the public discussion of important political issues. In giving the text away in this fashion, I am directly contributing to the book's ultimate aim: to help civilize cyberspace.
Read and download





Secure your email server with Linux:
A white paper on Open Source and ISV based solutions to protecting your email servers from various attacks.

Part 1. Open Source Solutions for Network Security Chapter 1. Understanding and planning e-mail server security Chapter 2. Linux installation Chapter 3. Locking down the Linux firewall partition Chapter 4. E-mail Security tools installation and configuration Part 2. ISV Solutions Chapter 5. StoneGate Firewall and VPN for iSeries Chapter 6. MPP Service Provider Edition: Foundation of E-mail Filtering Services Chapter 7. Bytware's StandGuard Anti-Virus for Linux Appendix A. Tips and techniques
Download


Securing Linux Production Systems
- A Practical Guide to Basic Security in Linux Production Environments
Read now


Maximum Security: A Hacker's Guide to Protecting Your Internet site and Network
I want to write a few words about this book and how it should be used. This book is not strictly an instructional, or "How To" book. Its purpose is to get you started on a solid education in Internet security. As such, it is probably constructed differently from any computer book you have ever read. Although this book cannot teach you everything you need to know, the references contained within this book can.
Read now


Handbook of Applied Cryptography

CRC Press
ISBN: 0-8493-8523-7
October 1996, 816 pages
  • Chapter 1 - Overview of Cryptography
  • Chapter 2 - Mathematics Background
  • Chapter 3 - Number-Theoretic Reference Problems
  • Chapter 4 - Public-Key Parameters
  • Chapter 5 - Pseudorandom Bits and Sequences
  • Chapter 6 - Stream Ciphers
  • Chapter 7 - Block Ciphers
  • Chapter 8 - Public-Key Encryption
  • Chapter 9 - Hash Functions and Data Integrity
  • Chapter 10 - Identification and Entity Authentication
  • Chapter 11 - Digital Signatures
  • Chapter 12 - Key Establishment Protocols
  • Chapter 13 - Key Management Techniques
  • Chapter 14 - Efficient Implementation
  • Chapter 15 - Patents and Standards
  • Appendix - Bibliography of Papers from Selected Cryptographic Forums
  • References
  • Index
Read and Download

No comments: