Showing posts with label Books. Show all posts
Showing posts with label Books. Show all posts

MCSA/MCSE Self-Paced Training Kit (Exams 70-292 and 70-296): Managing, Maintaining, Planning, and Implementing a Microsoft® Windows Server™ 2003 Environ

Managing, Maintaining, Planning, and Implementing a Microsoft® 
Windows Server™ 2003 Environ ( 70 - 292  70-296 )
Upgrade your MCSA or MCSE certification—and your job skills—to Windows Server 2003 with this official Microsoft study guide for Exams 70-292 and 70-296. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions to maximize your performance on the upgrade exams.

The Readiness Review Suite powered by MeasureUp provides 850 challenging questions on CD for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies.

You also get expert exam tips plus a full review section inside the book that covers all objectives and subobjectives for both exams, including:

MCSA/MCSE Exam 70-292

Implement, manage, and maintain

# Users, computers, and groups

# Access to resources

# Software update services

# Remote access and Web server

# Disaster recovery

# Name resolution

# Network security

MCSE Exam 70-296


Plan, implement, and maintain:

# Server roles and server security

# Network infrastructure

# Server availability

# Network security and security infrastructure

# Active Directory infrastructure

Download:  Hotfile

MCTS Self-Paced Training Kit (Exam 70-297):Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure

Designing a Microsoft Windows Server 2003 Active Directory and Network Infrastructure  70 - 297

The Microsoft Certified Systems Engineer (MCSE) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium-sized to large companies. An MCSE candidate should have at least one year of experience implementing and administering a network operating system in environments that have the following characteristics:
  • 250 to 5,000 or more users
  • Three or more physical locations
  • Three or more domain controllers
  • Network services and resources such as messaging, database, file and print, proxy server, firewall, Internet, intranet, remote access, and client computer management
  • Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet
In addition, an MCSE candidate should have at least one year of experience in the following areas:

MCTS Self-Paced Training Kit (Exam 70-662): Configuring Microsoft® Exchange Server 2010

Configuring Microsoft® Exchange Server 2010 70 - 662

Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-662, the required exam for the new MCTS certification: Microsoft Exchange Server 2010, Configuring. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most—including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options. It also provides real-world scenarios, case study examples, and troubleshooting labs for the skills and expertise you can use on the job. Work at your own pace through the lessons and lab exercises. This official study guide covers installing Exchange servers; configuring Exchange recipients and public folders, client access (including Microsoft Outlook® Web Access), and message transport; monitoring databases, mail flow, and connectivity; generating reports; implementing high availability and recovery; and configuring message compliance and security. Then assess yourself using the 200 practice questions on CD, featuring multiple customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers—including pointers back to the book for further study. You also get an exam discount voucher—making this kit an exceptional value and a great career investment.

MCTS Self-Paced Training Kit (Exam 70-293): Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

 Planning and Maintaining a Microsoft Windows Server 2003 Network Infrastructure  70 - 293

The Microsoft Certified Systems Engineer (MCSE) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium-sized to large companies. An MCSE candidate should have at least one year of experience implementing and administering a network operating system in environments that have the following characteristics:
  • 250 to 5,000 or more users
  • Three or more physical locations
  • Three or more domain controllers
  • Network services and resources such as messaging, database, file and print, proxy server, firewall, Internet, intranet, remote access, and client computer management
  • Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet
In addition, an MCSE candidate should have at least one year of experience in the following areas:

MCTS Self-Paced Training Kit (Exam 70-291) Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 
Network Infrastructure 70 - 291.

The Microsoft Certified Systems Administrator (MCSA) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium to large companies. An MCSA candidate should have 6 to 12 months of experience administering client and network operating systems in environments that have the following characteristics:
  • 250 to 5,000 or more users
  • Three or more physical locations
  • Three or more domain controllers
  • Network services and resources such as messaging, database, file and print, proxy server, firewall, Internet, intranet, remote access, and client computer management
  • Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet

MCTS Self-Paced Training Kit (Exam 70-290):Managing and Maintaining a Microsoft Windows Server 2003 Environment

Managing and Maintaining a Microsoft Windows Server 2003 Environment -70 - 290 

The Microsoft Certified Systems Administrator (MCSA) on Windows Server 2003 credential is intended for IT professionals who work in the typically complex computing environment of medium to large companies. An MCSA candidate should have 6 to 12 months of experience administering client and network operating systems in environments that have the following characteristics:
  • 250 to 5,000 or more users
  • Three or more physical locations
  • Three or more domain controllers
  • Network services and resources such as messaging, database, file and print, proxy server, firewall, Internet, intranet, remote access, and client computer management
  • Connectivity requirements such as connecting branch offices and individual users in remote locations to the corporate network and connecting corporate networks to the Internet


MCSA/MCSE Self-Paced Training Kit (Exam 70-270): Installing, Configuring, and Administering Microsoft® Windows® XP Professional

MCSA/MCSE Self-Paced Training Kit (Exam 70-270) 

Ace your preparation for the skills measured by MCP Exam 70-270—and on the job—with this official Microsoft study guide, now fully updated for Windows XP Service Pack 2 with Advanced Security Technologies plus other key topics. Work at your own pace through a system of lessons, hands-on exercises, troubleshooting labs, and review questions. 

The Readiness Review Suite on CD, featuring advanced technology from MeasureUp, provides 425 challenging questions for in-depth self-assessment and practice. You can choose timed or untimed testing mode, generate random tests, or focus on specific objectives. You get detailed explanations for right and wrong answers—including a customized learning path that describes how and where to focus your studies. 

Maximize your performance on the exam by learning how to:

Perform an installation or upgrade, including remote deployment

Configure and customize the desktop environment

Administer disks, device drivers, printers, file systems, and other resources

Manage TCP/IP networking and support remote and mobile users

Monitor, troubleshoot, and tune system performance

NEW!—Administer security settings and services, including the advances in Windows XP Service Pack


Hack Attacks Revealed

 John Chirillo."Hack Attacks Revealed"
Wiley|ISBN 0-471-41624-X | 837 pages | PDF|2002 | 6.9 MB|English|Rar


The primary objective of this book is to lay a solid foundation from which to explore the world of security. Simply, this book tells the truth about hacking, to bring awareness about the so-called Underground, the hacker?s community, and to provide the tools for doing so.

The difference between this book and other technical manuscripts is that it is written from a hacker?s perspective. The internetworking primers in Parts 1 and 2, coupled with Chapter 6, ?The Hacker?s Technology Handbook, will educate you about the technologies required to delve into security and hacking. These chapters can be skimmed if your background is technically sound, and later used as references.

TABLE OF CONTENT:
Chapter 01 Understanding Communication Protocols
Chapter 02 NetWare and NetBIOS Technology
Chapter 03 Understanding Communication Mediums
Chapter 04 Well-Known Ports and Their Services
Chapter 05 Discovery and Scanning Techniques
Chapter 06 The Hacker?s Technology Handbook
Chapter 07 Hacker Coding Fundamentals
Chapter 08 Port, Socket, and Service Vulnerability Penetrations
Chapter 09 Gateways and Routers and Internet Server Daemons
Chapter 10 Operating Systems
Chapter 11 Proxies and Firewalls
Chapter 12 TigerSuite: The Complete Internetworking Security Toolbox
Appendix A IP Reference Table and Subnetting Charts
Appendix B Well-Known Ports and Services
Appendix C All-Inclusive Ports and Services
Appendix D Detrimental Ports and Services
Appendix E What?s on the CD


http://hotfile.com/dl/92030433/3cf956b/Hack_Attacks_Revealed.rar.html 

Wi-Foo - The Secrets of Wireless Hacking

Wi-Foo - The Secrets of Wireless Hacking
Addison-Wesley Professional | 2004 | English | 592 pages | CHM | 6,72 MB
The definitive guide to penetrating and defending wireless networks. Straight from the field, this is the definitive guide to hacking wireless networks. Authored by world-renowned wireless security auditors, this hands-on, practical guide covers everything you need to attack -- or protect -- any wireless network.

The authors introduce the 'battlefield,' exposing today's 'wide open' 802.11 wireless networks and their attackers. One step at a time, you'll master the attacker's entire arsenal of hardware and software tools: crucial knowledge for crackers and auditors alike. Next, you'll learn systematic countermeasures for building hardened wireless 'citadels''including cryptography-based techniques, authentication, wireless VPNs, intrusion detection, and more.
Coverage includes:

* Step-by-step walkthroughs and explanations of typical attacks
* Building wireless hacking/auditing toolkit: detailed recommendations, ranging from discovery tools to chipsets and antennas
* Wardriving: network mapping and site surveying
* Potential weaknesses in current and emerging standards, including 802.11i, PPTP, and IPSec
* Implementing strong, multilayered defenses
* Wireless IDS: why attackers aren't as untraceable as they think
* Wireless hacking and the law: what's legal, what isn't


 http://hotfile.com/dl/92020710/705a596/The_secrets_of_wi-fi_hacking.rar.html

Hack Proof Your Wireless Network

Hack Proof Your Wireless Network
TYPE : PDF | LANG : English | PAGE : 513 | ISBN: 1928994598 | Size: 5.52 MB

Market comes a wave of stories about snoops intercepting sensitive LAN traffic from out in the company parking lot or across the concourse at the airport. Hack Proofing Your Wireless Network takes a look at strategies for defending wireless LANs–those based on Bluetooth and IEEE 802.11a as well as WiFi–against signal interception and other attacks peculiar to their wireless nature. Unfortunately, there's also a lot of background information on WiFi (as well as on security principles in general), and this is related to wireless network security only tangentially

Dissecting the Hack

Dissecting the Hack: The F0rb1dd3n Network
Syngress | 2009-10-01 | ISBN: 159749478X | 448 pages | PDF | 13 MB

Dissecting the Hack is one heck of a ride! Hackers, IT professionals, and Infosec aficionados will find a gripping story that takes the reader on a global trip through the world of computer security exploits. One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats.
Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book!
* Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their code
* Introduces basic hacking techniques in real life context for ease of learning
* Presented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

Kismet Hacking

Kismet Hacking
The only book on the industry standard for examining wireless network traffic
!

Kismet Hacking brings together the premiere wireless security experts to outline how to successfully use the top wireless tool, Kismet. As wireless networking continues to spread in home, corporate and government use, and as Linux continues to replace Windows for many advanced users, Kismet is increasingly the tool that they rely upon. Now with the introduction of Kismet NewCore, people who are using Kismet for applications from wireless network design to wireless security, have an improved version of their favorite wireless application. Kismet Hacking is for both new users who are just starting to use Kismet and those who have been using Kismet for years. Vital user information on getting the most out of wireless Linux setups is contained here. This book covers everything a Kismet user would need to know about Kismet, from the basic installation to advanced subjects such as creating Wireless Intrusion Detection Systems.
Product Details
* Paperback: 258 pages
* Publisher: Syngress; Pap/Onl edition (June 25, 2008)
* Language: English
* ISBN-10: 1597491179
* ISBN-13: 978-1597491174

Ethereal Packet Sniffing



Ethereal Packet Sniffing By Angela Orebaugh 
Publisher: Syngress 2004 | 550 Pages | ISBN: 1932266828 | CHM | 18 MB


This book provides system administrators with all of the information as well as software they need to run Ethereal Protocol Analyzer on their networks. There are currently no other books published on Ethereal, so this book will begin with chapters covering the installation and configuration of Ethereal. From there the book quickly moves into more advanced topics such as optimizing Ethereal's performance and analyzing data output by Ethereal.

Ethereal is an extremely powerful and complex product, capable of analyzing over 350 different network protocols. As such, this book also provides readers with an overview of the most common network protocols used, as well as analysis of Ethereal reports on the various protocols. The last part of the book provides readers with advanced information on using reports generated by Ethereal to both fix security holes and optimize network performance. 



Download:http://hotfile.com/dl/91992889/2a3db55/Ethereal_Packet_Sniffing.rar.html