Jeff Abrahamson on 22 Jan 2004 20:51:03 -0000


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[PLUG] Upcoming books


FYI.

-Jeff


----- Forwarded message from "Murray, Joan"  -----

Date: Thu, 22 Jan 2004 15:24:30 -0500
Subject: New Security Books on the Way
To: "Murray, Joan" <Joan.Murray@awl.com>

  [164 lines, 1017 words, 6870 characters]  Top characters: eoitasnr

Dear User Group Leader-

Happy 2004!

To greet the new year Addison-Wesley and Prentice Hall PTR will be sending
two complimentary review copies each of four new security titles.  We are
sending one as a review copy, for one of your members to review (on your
site, Amazon, B&N or any other appropriate location), and the other to use
however your organization finds most useful such as, door prize, raffle,
library, etc.

The books are:
Malware: Fighting Malicious Code by Edward Skoudis (ISBN 0-13-101405-6)
A Field Guide to Wireless LANs for Administrators and Power Users by Thomas
Maufer (ISBN 0-13-101406-4) 
Essential Check Point FireWall-1 NG:  An Installation, Configuration and
Troubleshooting Guide by Dameon D. Welch-Abernathy (ISBN 0321180615)
Biometrics and Network Security by Paul Reid (ISBN 0-13-101549-4)

Also, if you or any of your members plan on attending RSA 2004 in San
Francisco Feb. 23-27, please stop by our booth (1637).  We would love to
meet you.

COMING SOON: 
Exploiting Software by Greg Hoglund and Gary McGraw (ISBN 0201786958, Feb.
2004) and Wi-Fo by Andrew Vladimirov (ISBN 0321202171, March 2004) Also, be
on the lookout for an updated User Group Program Kit offering new benefits,
review opportunities, and discounts for your group.

Descriptions of the books noted above follow:

1) Malware: Fighting Malicious Code by Edward Skoudis (ISBN 0-13-101405-6)
Malicious code is a set of instructions that runs on your computer and makes
your system do something that you do not want it to do.  It can delete
sensitive configuration files from your hard drive, render your computer
inoperable; infect your computer and use it as a distribution device to
spread viruses to all of your buddies' computers. Malicious code in the
hands of a crafty attacker is becoming even more of a problem because many
of the factors fueling the evolution of the computer industry are making our
systems even more vulnerable to malicious code. <?xml:namespace prefix = o
ns = "urn:schemas-microsoft-com:office:office" />

One of the most popular chapters in Ed's previous book, Counter Hack was the
chapter on malicious code. Readers continued to ask for more on this
critical topic.  Malware: Fighting Malicious Code focuses on one of the most
interesting and rapidly developing areas of computer attacks. 

 

Features:

*	

	Real-world tools needed to prevent, detect, and handle malicious
code attacks.
*	

	Computer infection from viruses, worms, Trojan Horses etc.,
collectively known as malware is a growing cost problem for businesses.
*	

	Discover how attackers install malware and how you can peer through
their schemes to keep systems safe.
*	

	Bonus malware code analysis laboratory.


2) A Field Guide to Wireless LANs for Administrators and Power Users by
Thomas Maufer (ISBN 0-13-101406-4) This book is an 802.11 deployment guide
for business and home use that demystifies the alphabet soup of IEEE
standards and explains the features and benefits of each with regard to
speeds and feeds. Wireless LANs are becoming increasingly popular and
companies have begun setting up wireless "hot spots" in places where
business users congregate, such as airports, hotels, and conference centers.
Home users are setting up LANs at home, since most homes don't have
networking jacks in every room. This book explains how to configure a
wireless LAN, as well as how the technology works. Windows and Linux
configurations, as well as various forms of 802.11 cards, including PCs with
integrated 802.11, PC Cards, and PCI cards, are covered. The book also
tackles security, explaining what can be done to secure a wireless LAN.
>From the savvy home user to the administrator, this book is designed to save
time in configuring wireless LAN and getting the most out of it. 


Key Features:

Covers use of all wireless standards 802.11a,b,g,i. 
Strong coverage of wireless LAN security that you don't need a cryptography
degree to understand. 
Example configurations provided for Linux and Windows environment.

3) Essential Check Point FireWall-1 NG:  An Installation, Configuration and
Troubleshooting Guide by Dameon D. Welch-Abernathy (ISBN 0321180615). This
book explains how to build, implement, and maintain Check Point FireWall-1
NG, the follow-on to the world's best-selling firewall product. It's packed
with tools, tricks, tips, and checklists not found anywhere else. Every
major feature of FireWall-1 NG is covered. Filled with screen shots and
sample configurations, this book features step-by-step instructions that can
be replicated easily on standard equipment. 

Features:

*	

	An update to the best-selling book Essential Check Point
FireWall-1--80% new material.
*	

	Real-world solutions and techniques necessary for planning,
installing, and deploying the next generation (NG) Check Point FireWall--the
world's best-selling firewall product.
*	

	Written by Dameon Welch-Abernathy, a.k.a. PhoneBoy--the foremost
authority on FW-1 NG.

"This book is an update to an already classic work. Dameon has taken his
original definitive guide and updated it thoroughly for NG. No other book on
the market is informed by his depth of experience with Check Point. Accept
no substitutes!" --Matthew Gast, Trapeze Networks

4) Biometrics and Network Security by Paul Reid (ISBN 0-13-101549-4)

The biggest vulnerability in most enterprise networks is the authentication
system--especially if it relies solely on passwords. And a result, many
companies are looking to combine password authentication with other
authentication methods, most especially biometrics. The few biometrics books
that do exist are overview books aimed at management and/or are not written
by biometric specialists. This book is unique in its coverage of how to
design and implement a successful biometric solution for a network.
Features:
-By providing increased security and convenience, biometrics has begun to
see widespread deployment in network applications.
-Contains guidelines, applications, and procedures for implementing
biometrics.
-Explains finger, voice, hand geometry, face, and eye biometrics--for each
covers how a biometric is captured and stored, and how it can be
spoofed/faked.

Thank you and we look forward to working with you in 2004!

++++++++++++++++++++
Joan Murray
User Group Liaison for Networking and Security
Addison-Wesley Professional/ Prentice Hall PTR
75 Arlington Street, Ste. 300
Boston, MA  02116
[...]
++++++++++++++++++++ 


****************************************************************************
This email may contain confidential material.
If you were not an intended recipient, 
please notify the sender and delete all copies.
We may monitor email to and from our network.

****************************************************************************



----- End forwarded message -----

-- 
 Jeff

 Jeff Abrahamson  <http://www.purple.com/jeff/>
 GPG fingerprint: 1A1A BA95 D082 A558 A276  63C6 16BF 8C4C 0D1D AE4B

Attachment: pgpqHFzdb33sR.pgp
Description: PGP signature