156 captures
04 Jan 2004 - 12 Dec 2025
Dec JAN Feb
04
2003 2004 2005
success
fail

About this capture

COLLECTED BY

Organization: Alexa Crawls

Starting in 1996, Alexa Internet has been donating their crawl data to the Internet Archive. Flowing in every day, these data are added to the Wayback Machine after an embargo period.

Collection: Alexa Crawls DU

Crawl data donated by Alexa Internet. This data is currently not publicly accessible
TIMESTAMPS

The Wayback Machine - http://web.archive.org/web/20040104115223/http://syngress.oreilly.com:80/
 
O'Reilly Syngress
oreilly.comO'Reilly NetworkSafari BookshelfConferences Register | Log in/out | View Cart   
  Books     O'Reilly Gear     Newsletters     Press Room     Jobs     About O'Reilly  

 
Perl
Java
Python
C/C++
Scripting
Web
Digital Media
Web Services
XML
Oracle
SysAdm/Networking
Security
Databases
Linux/Unix
Macintosh/OS X
Windows
.NET
Open Source
Wireless
Bioinformatics
Hacks
Head First
Cookbooks
In a Nutshell
CD Bookshelves
Pocket References
The Missing Manuals
LinuxDevCenter.com
MacDevCenter.com
ONDotnet.com
ONJava.com
ONLamp.com
OpenP2P.com
Perl.com
WebServices.XML.com
XML.com
No Starch Press
Paraglyph Press
Syngress Publishing
Events
Meerkat News
Ask Tim
tim.oreilly.com
From the Editors List
Letters
Beta Chapters
Newsletters
Open Books
Academic
Corporate
Government
About O'Reilly
International
Media Kit
Contact Us
Catalog Request
User Groups
Writing for O'Reilly
How to Order
Bookstores


Syngress Books

Syngress Publishing is an independent publisher of print and electronic reference materials for information technology professionals seeking skill enhancement and career advancement. Security specialists rely on Syngress books for outstanding coverage of security topics. Administrators find Syngress study guides to be reliable sources for all their certification needs. Distributed throughout Europe, Asia, South America, and the U.S., Syngress titles have been translated into 20 languages. The company's pioneering customer support program, , extends the value of every Syngress title with regular information updates and author-driven forums.

Syngress: The Definition of a Serious Security Library


Syngress Publishing Book List
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet
bullet

Featured Books
 

New Titles

 
Special Ops: Windows Server 2003 Host and Network Security
Special Ops: Windows Server 2003 will be a first-to-market book providing indispensable information for security professionals using Microsoft's newest flagship operating system. With the recent focus Microsoft has placed on the security of its products, industry will be looking to Windows Server 2003 as key evidence of a commitment to providing "trustworthy computing." In addition to a strategic outlook at this operating system, this book will cover methodical ways to apply Windows Server 2003 to the enterprise as well as a tactical evaluation of the product features.
Hacking the Code: Auditor's Guide to Writing Secure Code for the Web
More of a programmer's guide than a security guide, Hacking the Code explains how certain code can be attacked, shows how readers should edit the code, and offers case studies and examples for doing so. The book establishes policies for object input, and shows how to audit existing code for potential security problems.
Special Ops: Infrastructure and Network Security with Routers, Switches, Firewalls, and Ids
The only publication that provides security and Information Technology (IT) professionals an in depth and comprehensive view of network devices, protocols and architectures. It builds on concepts presented in the original Special Ops book and provide detailed guidance on real world network threats and exposures. While most network security books focus on ancillary topics-such as operating systems, RDBMS, groupware, and other applications-this edition in the Special Ops series will concentrate strictly on the nuts and bolts of networks, such as routers, firewalls, Intrusion Detection Systems (IDS) and the networking protocols that work in congress with them. Special Ops: Infrastructure will have over 200 pages dedicated to the most up to-date network layer attacks and mitigation techniques across an wide assortment of vendors and not just the typical attention paid to market leaders such as Cisco and Checkpoint. This expanded breadth will help reach a wider range of network engineers who may not have the budget to purchase and install best-of-breed hardware, but want to know how to make the most out of what they do have. In addition, this book provides detailed network architecture and design techniques to help lessen the impact or feasibility of potential attacks.
 

Upcoming Titles

 
Security Sage's Guide to Hardening the Network Infrastructure (March)
Security Sage's Guide to Hardening the Network Infrastructure focuses on both perimeter and internal networks, giving IT and security administrators a complete picture of how they should design and protect their enterprises. Other books may concentrate on perimeter security or host configuration--yet ignore the infrastructure connecting the two. While others tend to focus on theory and basic security background, this publication will dive right into the content and help provide real solutions to common IT security problems.
Security Sage's Guide to Attacking & Defending Windows Server 2003 (March)
There are likely other books to be written during this same time frame on the security implications of Windows Server 2003. However, if history is any indicator, a large percentage of these will only cover how to install and configure specific features--not give readers the practical knowledge they need to defend their resources from both a management and operational level.
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure (February)
MCSE Designing a Windows Server 2003 Active Directory and Network Infrastructure: Exam 70-297 Study Guide & DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system provides readers 100% coverage of the official Microsoft exam objectives plus test preparation software for the edge needed to pass the exam on the first try.
MCSE Designing Security for a Windows Server 2003 Network (February)
MCSE Designing Security for a Microsoft Windows Server 2003 Network (Exam 70-298) Study Guide and DVD Training System is a one-of-a-kind integration of text, DVD-quality instructor led training, and Web-based exam simulation and remediation. This system provides readers 100% coverage of the official Microsoft exam objectives plus test preparation software for the edge needed to pass the exam on the first try.
Ethereal Packet Sniffing (February)
Ethereal is the premier Open Source protocol analyzer for Windows and Unix, and was recently voted the #2 most popular open source security tool of any kind. This is the first book available on Ethereal, which like most open source tools is extremely popular yet almost completely undocumented. 100,000 new copies of Ethereal are downloaded and installed every month.
Check Point™ Next Generation with Application Intelligence Security (January)
From the authors of Syngress's best-selling Check Point NG Security Administration comes the DEFINITIVE WORK on Check Point's latest product release: Check Point NG Feature Pack 4. No competing book covers every product contained within FP 4 (SMART, SecurePlatform, SecureXL, ClusterXL, and Performance Pack). Although not a Study Guide, this book will cover all objectives on Check Point's CCSA exam and a free exam simulator will be available from syngress.com.
Security Assessment: Case Studies for Implementing the NSA IAM (January)
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information. It also analyzes the impact to an organization if there is a loss of integrity, confidentiality, or availability. This book shows how to do a complete security assessment based on the NSA's guidelines.
Hardware Hacking: (January)
This book focuses on "Hacking" consumer and SOHO electronic devices. Hacking in this sense refers to modifying these devices to perform in a manner not originally intended; not compromising the security of the devices.
Managing and Securing a Cisco® Structured Wireless-Aware Network (January)
This book is essential reading for any network admin, network engineer, or security consultant responsible for the design, deployment and/or management of a Cisco Structured Wireless-Aware Network. It covers all product features, with particular attention to the challenges of integrating legacy Cisco products into a Wireless-Aware network. Specifically, the book will include coverage of Cisco IOS Software-based Cisco Aironet Series access points, Cisco and Cisco Compatible client adapters and the CiscoWorks Wireless LAN Solution Engine (WLSE).
Chris Klaus's Dynamic Threat Protection: (January)
Givea readers invaluable insight into the concepts of "Dynamic Threat Protection" and also teach them to utilize appliances and software from ISS to implement this ground-breaking philosophy. The book will begin with an examination of the security weaknesses inherent in many of today's networks. Form this perspective of vulnerability, readers will then be introduced to the holistic security solutions made possible by ISS's Dynamic Threat Protection methodology, which is as much about ideals as technologies.

O'Reilly Home | Privacy Policy

© 2003, O'Reilly & Associates, Inc.

All trademarks and registered trademarks appearing on oreilly.com are the property of their respective owners.