Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)

Rating: 
Amazon Price: N/A (as of May 27, 2017 19:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security

Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing.
Continue reading “Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)”

Hadoop Security: Protecting Your Big Data Platform

Rating: 
Amazon Price: N/A (as of May 27, 2017 08:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As more corporations turn to Hadoop to store and process their most valuable data, the risk of a potential breach of those systems increases exponentially. This practical book not only shows Hadoop administrators and security architects how to protect Hadoop data from unauthorized access, it also shows how to limit the ability of an attacker to corrupt or modify data in the event of a security breach.

Authors Ben Spivey and Joey Echeverria provide in-depth information about the security features available in Hadoop, and organize them according to common computer security concepts. You’ll also get real-world examples that demonstrate how you can apply these concepts to your use cases.Understand the challenges of securing distributed systems, particularly HadoopUse best practices for preparing Hadoop cluster hardware as securely as possibleGet an overview of the Kerberos network authentication protocolDelve into authorization and accounting principles as they apply to HadoopLearn how to use mechanisms to protect data in a Hadoop cluster, both in transit and at restIntegrate Hadoop data ingest into enterprise-wide security architectureEnsure that security architecture reaches all the way to end-user access

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Rating: 
Amazon Price: N/A (as of May 26, 2017 20:56 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Continue reading “Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World”

Build Your Own Security Lab: A Field Guide for Network Testing

Rating: 
Amazon Price: $50.00 $45.99 You save: $4.01 (8%). (as of May 27, 2017 19:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If your job is to design or implement IT security solutions or if you’re studying for any security certification, this is the how-to guide you’ve been looking for. Here’s how to assess your needs, gather the tools, and create a controlled environment in which you can experiment, test, and develop the solutions that work. With liberal examples from real-world scenarios, it tells you exactly how to implement a strategy to secure your systems now and in the future.

Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Rating: 
Amazon Price: N/A (as of May 27, 2017 01:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.