Jeff Abrahamson on 22 Jan 2004 20:51:03 -0000 |
FYI. -Jeff ----- Forwarded message from "Murray, Joan" ----- Date: Thu, 22 Jan 2004 15:24:30 -0500 Subject: New Security Books on the Way To: "Murray, Joan" <Joan.Murray@awl.com> [164 lines, 1017 words, 6870 characters] Top characters: eoitasnr Dear User Group Leader- Happy 2004! To greet the new year Addison-Wesley and Prentice Hall PTR will be sending two complimentary review copies each of four new security titles. We are sending one as a review copy, for one of your members to review (on your site, Amazon, B&N or any other appropriate location), and the other to use however your organization finds most useful such as, door prize, raffle, library, etc. The books are: Malware: Fighting Malicious Code by Edward Skoudis (ISBN 0-13-101405-6) A Field Guide to Wireless LANs for Administrators and Power Users by Thomas Maufer (ISBN 0-13-101406-4) Essential Check Point FireWall-1 NG: An Installation, Configuration and Troubleshooting Guide by Dameon D. Welch-Abernathy (ISBN 0321180615) Biometrics and Network Security by Paul Reid (ISBN 0-13-101549-4) Also, if you or any of your members plan on attending RSA 2004 in San Francisco Feb. 23-27, please stop by our booth (1637). We would love to meet you. COMING SOON: Exploiting Software by Greg Hoglund and Gary McGraw (ISBN 0201786958, Feb. 2004) and Wi-Fo by Andrew Vladimirov (ISBN 0321202171, March 2004) Also, be on the lookout for an updated User Group Program Kit offering new benefits, review opportunities, and discounts for your group. Descriptions of the books noted above follow: 1) Malware: Fighting Malicious Code by Edward Skoudis (ISBN 0-13-101405-6) Malicious code is a set of instructions that runs on your computer and makes your system do something that you do not want it to do. It can delete sensitive configuration files from your hard drive, render your computer inoperable; infect your computer and use it as a distribution device to spread viruses to all of your buddies' computers. Malicious code in the hands of a crafty attacker is becoming even more of a problem because many of the factors fueling the evolution of the computer industry are making our systems even more vulnerable to malicious code. <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" /> One of the most popular chapters in Ed's previous book, Counter Hack was the chapter on malicious code. Readers continued to ask for more on this critical topic. Malware: Fighting Malicious Code focuses on one of the most interesting and rapidly developing areas of computer attacks. Features: * Real-world tools needed to prevent, detect, and handle malicious code attacks. * Computer infection from viruses, worms, Trojan Horses etc., collectively known as malware is a growing cost problem for businesses. * Discover how attackers install malware and how you can peer through their schemes to keep systems safe. * Bonus malware code analysis laboratory. 2) A Field Guide to Wireless LANs for Administrators and Power Users by Thomas Maufer (ISBN 0-13-101406-4) This book is an 802.11 deployment guide for business and home use that demystifies the alphabet soup of IEEE standards and explains the features and benefits of each with regard to speeds and feeds. Wireless LANs are becoming increasingly popular and companies have begun setting up wireless "hot spots" in places where business users congregate, such as airports, hotels, and conference centers. Home users are setting up LANs at home, since most homes don't have networking jacks in every room. This book explains how to configure a wireless LAN, as well as how the technology works. Windows and Linux configurations, as well as various forms of 802.11 cards, including PCs with integrated 802.11, PC Cards, and PCI cards, are covered. The book also tackles security, explaining what can be done to secure a wireless LAN. >From the savvy home user to the administrator, this book is designed to save time in configuring wireless LAN and getting the most out of it. Key Features: Covers use of all wireless standards 802.11a,b,g,i. Strong coverage of wireless LAN security that you don't need a cryptography degree to understand. Example configurations provided for Linux and Windows environment. 3) Essential Check Point FireWall-1 NG: An Installation, Configuration and Troubleshooting Guide by Dameon D. Welch-Abernathy (ISBN 0321180615). This book explains how to build, implement, and maintain Check Point FireWall-1 NG, the follow-on to the world's best-selling firewall product. It's packed with tools, tricks, tips, and checklists not found anywhere else. Every major feature of FireWall-1 NG is covered. Filled with screen shots and sample configurations, this book features step-by-step instructions that can be replicated easily on standard equipment. Features: * An update to the best-selling book Essential Check Point FireWall-1--80% new material. * Real-world solutions and techniques necessary for planning, installing, and deploying the next generation (NG) Check Point FireWall--the world's best-selling firewall product. * Written by Dameon Welch-Abernathy, a.k.a. PhoneBoy--the foremost authority on FW-1 NG. "This book is an update to an already classic work. Dameon has taken his original definitive guide and updated it thoroughly for NG. No other book on the market is informed by his depth of experience with Check Point. Accept no substitutes!" --Matthew Gast, Trapeze Networks 4) Biometrics and Network Security by Paul Reid (ISBN 0-13-101549-4) The biggest vulnerability in most enterprise networks is the authentication system--especially if it relies solely on passwords. And a result, many companies are looking to combine password authentication with other authentication methods, most especially biometrics. The few biometrics books that do exist are overview books aimed at management and/or are not written by biometric specialists. This book is unique in its coverage of how to design and implement a successful biometric solution for a network. Features: -By providing increased security and convenience, biometrics has begun to see widespread deployment in network applications. -Contains guidelines, applications, and procedures for implementing biometrics. -Explains finger, voice, hand geometry, face, and eye biometrics--for each covers how a biometric is captured and stored, and how it can be spoofed/faked. Thank you and we look forward to working with you in 2004! ++++++++++++++++++++ Joan Murray User Group Liaison for Networking and Security Addison-Wesley Professional/ Prentice Hall PTR 75 Arlington Street, Ste. 300 Boston, MA 02116 [...] ++++++++++++++++++++ **************************************************************************** This email may contain confidential material. If you were not an intended recipient, please notify the sender and delete all copies. We may monitor email to and from our network. **************************************************************************** ----- End forwarded message ----- -- Jeff Jeff Abrahamson <http://www.purple.com/jeff/> GPG fingerprint: 1A1A BA95 D082 A558 A276 63C6 16BF 8C4C 0D1D AE4B Attachment:
pgpqHFzdb33sR.pgp
|
|