Building CISCO Networks for Windows 2000

Building CISCO Networks for Windows 2000
Author: Syngress
Publisher: Elsevier
Total Pages: 600
Release: 2000-10-17
Genre: Computers
ISBN: 0080476139

Microsoft Corporation, the world's largest software vendor, and Cisco Systems, the world's largest internetworking vendor, have jointly developed a common software interface for managing Cisco hardware on Microsoft networks: Cisco Network Services for Active Directory (CNS/AD). Until now, network administrators have been forced to master two completely different product interfaces to effectively manage their networks. Configuring Cisco Network Services for Active Directory is the first book announced for this enormous Information Technology audience. This book is a practical guide to managing CNS/AD. It focuses on how to promote system efficiency and improve network service by using CNS/AD to centralize network management, using the directory as a repository for all policies that govern network usage. The book also describes how to manage Cisco Internetworking Operating System (IOS) networking features and network resources in the same unified way as other enterprise resources, such as user access controls, files, and printers.* This book coincides with the launch of Windows 2000 Server, the host system for the product* This new technology promises to reduce administrative overheads* Over 500,000 Microsoft and Cisco certification guides from Syngress have been sold over the last two years.* Cisco is red hot, and this is the merging of its technologies with Microsoft!

ASP Configuration Handbook

ASP Configuration Handbook
Author: Syngress
Publisher: Elsevier
Total Pages: 657
Release: 2001-06-08
Genre: Computers
ISBN: 0080475930

Understanding ASPs: The new Internet business.Application Service Providers (ASPs) appeal to small businesses by offering a wide variety of web-hosted software programs including e-commerce, communications, project management, financial, word processing and human resourse applications. ASPs offer inexpensive use of software and the ability to share access among people in different locations. There is a huge buzz in the computing industry about ASPs and many ISPs (Internet Service Providers) are gearing up to become ASPs. These companies are in need of a guide - this is the first book to focus on how a company can become an ASP.ASP Configuration Handbook: A Guide for ISPs covers all the business issues surrounding the transformation of an Internet Service Provider to an Application Service Provider, as well as the technical issues associated with offering applications to customers.

Building Cisco Remote Access Networks

Building Cisco Remote Access Networks
Author: Wayne Lawson
Publisher: Elsevier
Total Pages: 609
Release: 2000-11-15
Genre: Computers
ISBN: 0080476147

An increasing number of companies are designing and implementing Remote Access Networks, which allow users who are not physically connected to a Wide Area Network (WAN) or Local Area Network (LAN) to access the network's servers, applications and databases or to participate in video conferencing and conference calls. The ability for a remote user to function as if they were in the next office dramatically improves overall efficiency while reducing total cost of ownership. Cisco Systems, the world's largest internetworking vendor, is the pioneer of the enabling technologies for Remote Access Networks. This book will identify and explain all of the Cisco products necessary for designing and building a remote access network and integrating it with legacy systems.This book is a professional reference detailing all of the strategies, tactics and methods for designing, configuring and maintaining Cisco Remote Access Networks. It will include thorough discussions of all Cisco Access Servers and routers.* Demand for information on remote access networks is growing quickly at corporate and administrator level* Cisco remote access networks appeal to businesses as they provide efficient and secure connectivity at reduced cost* Book includes thorough discussions of all Cisco Access Servers and routers

Hack Proofing Your Web Applications

Hack Proofing Your Web Applications
Author: Syngress
Publisher: Elsevier
Total Pages: 625
Release: 2001-06-18
Genre: Computers
ISBN: 0080478131

From the authors of the bestselling Hack Proofing Your Network! OPEC, Amazon, Yahoo! and E-bay: If these large, well-established and security-conscious web sites have problems, how can anyone be safe? How can any programmer expect to develop web applications that are secure? Hack Proofing Your Web Applications is the only book specifically written for application developers and webmasters who write programs that are used on web sites. It covers Java applications, XML, ColdFusion, and other database applications. Most hacking books focus on catching the hackers once they've entered the site; this one shows programmers how to design tight code that will deter hackers from the word go. Comes with up-to-the-minute web based support and a CD-ROM containing source codes and sample testing programs Unique approach: Unlike most hacking books this one is written for the application developer to help them build less vulnerable programs

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit

Cisco CCNA/CCENT Exam 640-802, 640-822, 640-816 Preparation Kit
Author: Dale Liu
Publisher: Syngress
Total Pages: 849
Release: 2009-06-30
Genre: Computers
ISBN: 0080879683

Three exams, two certifications, one complete Cisco training solution for networking professionals! The CCNA exam is an entry-level IT certification from Cisco Systems for professionals installing and maintaining route and switched networks. The current exam material covers networking concepts along with new and updated content on network security fundamentals and the basics of wireless networking. This book can be used as a study guide for either track you choose to receive your CCNA – the single exam, 640-802 or the combined 640-822 and 640-816, and for the CCENT certification which a student will receive upon completion of the 640-822 exam. The author team has arranged the content so that you can easily identify the objectives for each half of the combined exam. - Layout of the guide parallels the CCNA/CCENT exam objectives for ease of study - Details all aspects of the exams including security and wireless networking essentials - Covers everything from introductory to advanced topics—keeping the beginner and intermediate IT professional in mind - Chapter ending questions and answers allow for graduated learning - Two practice exams on the accompanying DVD help eliminate test-day jitters

E-Mail Virus Protection Handbook

E-Mail Virus Protection Handbook
Author: Syngress
Publisher: Elsevier
Total Pages: 511
Release: 2000-11-06
Genre: Computers
ISBN: 0080477534

The E-mail Virus Protection Handbook is organised around specific e-mail clients, server environments, and anti-virus software. The first eight chapters are useful to both users and network professionals; later chapters deal with topics relevant mostly to professionals with an emphasis on how to use e-mail filtering software to monitor all incoming documents for malicious behaviour. In addition, the handbook shows how to scan content and counter email address forgery attacks. A chapter on mobile code applications, which use Java applets and Active X controls to infect email and, ultimately, other applications and whole systems is presented. The book covers spamming and spoofing: Spam is the practice of sending unsolicited email to users. One spam attack can bring down an entire enterprise email system by sending thousands of bogus messages or "mailbombing," which can overload servers. Email spoofing means that users receive messages that appear to have originated from one user, but in actuality were sent from another user. Email spoofing can be used to trick users into sending sensitive information, such as passwords or account numbers, back to the spoofer. - Highly topical! Recent events such as the LoveBug virus means the demand for security solutions has never been higher - Focuses on specific safeguards and solutions that are readily available to users

Managing Cisco Network Security

Managing Cisco Network Security
Author: Syngress Media, Inc. Staff
Publisher: Gulf Professional Publishing
Total Pages: 510
Release: 2000
Genre: Computers
ISBN: 9781928994176

"Configuring Cisco IP Security" covers the full range of Cisco Secure hardware and software solutions--including PIX Firewall, Intrusion Detection System and Authentication Agent--to help engineers and administrators protect their ISPs, corporate networks and e-commerce sites. 50 illustrations, 70 screen shots, 10 worksheets.

Building DMZs For Enterprise Networks

Building DMZs For Enterprise Networks
Author: Syngress
Publisher: Elsevier
Total Pages: 831
Release: 2003-08-04
Genre: Computers
ISBN: 0080476260

This book covers what an administrator needs to plan out and integrate a DMZ into a network for small, medium and Enterprise networks. In most enterprises the perception is that a firewall provides a hardened perimeter. However, the security of internal networks and hosts is usually very soft. In such an environment, a non-DMZ system that is offering services to the Internet creates the opportunity to leapfrog to other hosts in the soft interior of your network. In this scenario your internal network is fair game for any attacker who manages to penetrate your so-called hard perimeter.- There are currently no books written specifically on DMZs- This book will be unique in that it will be the only book that teaches readers how to build a DMZ using all of these products: ISA Server, Check Point NG, Cisco Routers, Sun Servers, and Nokia Security Appliances.- Dr. Thomas W. Shinder is the author of the best-selling book on Microsoft's ISA, Configuring ISA Server 2000. Customers of the first book will certainly buy this book.

Configuring Windows 2000 Server Security

Configuring Windows 2000 Server Security
Author: Thomas W. Shinder
Publisher: Syngress Press
Total Pages: 438
Release: 2000
Genre: Computers
ISBN:

This work provides information about the Microsoft Windows 2000 operating system security devices, including security management using the Microsoft Security Configuratin Tool Set, support for IP security, the Encrypting File System, Public Key Infrastructure, smart cards and Kerberos. 4