Secrets Stolen, Fortunes Lost


The threats of economic espionage and intellectual property (IP) theft are global, stealthy, insidious, and increasingly common. According to the U.S. Commerce Department, IP theft is estimated to top $250 billion annually and also costs the United States approximately 750,000 jobs. The International Chamber of Commerce puts the global fiscal loss at more than $600 billion a year.Secrets Stolen, Fortunes Lost offers both a fascinating journey into the underside of the Information Age, geopolitics, and global economy, shedding new light on corporate hacking, industrial espionage, counterfeiting and piracy, organized crime and related problems, and a comprehensive guide to developing a world-class defense against these threats. You will learn what you need to know about this dynamic global phenomenon (how it happens, what it costs, how to build an effective program to mitigate risk and how corporate culture determines your success), as well as how to deliver the message to the boardroom and the workforce as a whole. This book serves as an invaluable reservoir of ideas and energy to draw on as you develop a winning security strategy to overcome this formidable challenge.* It’s Not &quote;Someone Else’s Problem: Your Enterprise is at RiskIdentify the dangers associated with intellectual property theft and economic espionage* The Threat Comes from Many SourcesDescribes the types of attackers, threat vectors, and modes of attack* The Threat is RealExplore case studies of real-world incidents in stark relief* How to Defend Your EnterpriseIdentify all aspects of a comprehensive program to tackle such threats and risks* How to Deliver the Message: Awareness and EducationAdaptable content (awareness and education materials, policy language, briefing material, presentations, and assessment tools) that you can incorporate into your security program now

Windows 2000 Configuration Wizards


Developers are used to working with Wizards, component-like products that allow them to create certain elements — like dialog buttons — quickly and easily while they are coding applications. With the launch of Windows 2000, Microsoft has announced a new set of Wizards that will help administrators and users configure and set up Windows 2000 Professional (the Windows NT 4 Workstation successor) and Windows 2000 Server (the Windows NT 4 Server successor). Windows 2000 Setup and Configuration Wizards covers all the available Wizards, with an emphasis on those new to Windows 2000. Each Wizard is broken down by dialog box, with explanations of all options and required elements so administrators will know what to be prepared with.In addition, coverage of new services that will speed configuration and set up (like the Windows Installer) will be covered. * This is the first book to focus on Wizards and Windows 2000 automated components* Network administrators and developers will save time using this book

Managing Windows 2000 Network Services


Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Microsoft Windows 2000 Server (the predecessor to Windows NT 4 Server) integrates network services for companies and administrators to set up and manage networks, remote access and extranets, as well as to manage other communications. Managing Windows 2000 Network Services will be the first book to focus exclusively on networking and integrated voice, video, and data on networks. Readers will learn how to deploy and integrate all Windows 2000 networking technologies within an enterprise network.* The publication of the book will be with or soon after the release of Windows 2000* Focuses completely on Network Services

IP Addressing & Subnetting INC IPV6


Internetworking Protocol (IP) addresses are the unique numeric identifiers required of every device connected to the Internet. They allow for the precise routing of data across very complex worldwide internetworks. The rules for their format and use are governed by the Internet Engineering Task Force (IETF) of the The Internet SOCiety (ISOC). In response to the exponential increase in demand for new IP addresses, the IETF has finalized its revision on IP addressing as IP Version 6, also know as IPng (ng = Next Generation). Key hardware vendors such as Cisco and major Internet Service Providers such as America Online have already announced plans to migrate to IP Version 6.IP address allocation within an organization requires a lot of long-term planning. This timely publication addresses the administrator and engineer’s need to know how IP 6 impacts their enterprise networks* Ideal for companies planning a phased migration from IP 4 to IP 6* Timely publication: The IETF standard was finalized in early 1999 and will begin to be implemented in late 1999/2000. The current IP Version 4 address set will be exhausted by 2003* The book will focus on planning and configuring networks and devices for IP 6. Specifically, it will cover how to: * Increase the IP address size from 32 bits to 128 bits * Support more levels of addressing hierarchy * Support an increased number of addressable nodes * Support simpler auto-configuration of addresses * Improve the scalability of multicast routing by adding a &quote;scope&quote; field to multicast addresses * Use a new &quote;anycast address&quote; to send a packet to any one of a group of nodes

DBAs Guide to Databases Under Linux


In an effort to increase its marketshare and threat to Windows NT, Oracle8 was ported to Linux in late 1998, opening the popular database to an additional 10 million Linux users worldwide. The availability of Oracle8 enables current Linux users to deploy enterprise-class applications at low cost and provides an alternative to Microsoft Windows NT. This book covers that marriage of the most popular database and the fastest growing operating system.* Complete coverage. Covers both Oracle8i and Oracle8i Lite, as well as Oracle Applications, Oracle Applications Server, and Oracle Developer* Organizations and Oracle database administrators will be looking for information on Linux as is gets adopted — this book fits the bill* Covers two growth markets and fills a need for information not covered elsewhere

Firewall Policies and VPN Configurations


A firewall is as good as its policies and the security of its VPN connections. The latest generation of firewalls offers a dizzying array of powerful options; they key to success is to write concise policies that provide the appropriate level of access while maximizing security. This book covers the leading firewall products: Cisco PIX, Check Point NGX, Microsoft ISA Server, Juniper’s NetScreen Firewall, and SonicWall. It describes in plain English what features can be controlled by a policy, and walks the reader through the steps for writing the policy to fit the objective. Because of their vulnerability and their complexity, VPN policies are covered in more depth with numerous tips for troubleshooting remote connections.* The only book that focuses on creating policies that apply to multiple products.* Included is a bonus chapter on using Ethereal, the most popular protocol analyzer, to monitor and analyze network traffic.* Shows what features can be controlled by a policy, and walks you through the steps for writing the policy to fit the objective at hand

Webmasters Guide To The Wireless Internet


The wireless Web is a reality — don’t get left behind!The wireless Web is not a future dream. It is here today. Already, more than 20 million people have access the Internet through PDAs, mobile phones, pagers and other wireless devices. What will people find on the Wireless Internet? This is the question that every Webmaster and Web developer is being challenged to answer. The Webmaster’s Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA.The rapid expansion of wireless devices presents a huge challenge for Webmasters — this book addresses that need for reliable informationThere are lots of books for wireless developers — this is the first designed specifically for Webmasters Looks at security issues in a Wireless environment

Windows 2000 Server System Administration Handbook


Many organizations and network administrators are looking for information on Windows 2000 and its new features. IT professionals responsible for installing, configuring, and managing Microsoft products will be highly motivated to migrate to this new technology, based on its promise of reducing administrative overhead.Windows 2000 Server System Administration Handbook will help NT4 professionals to administer and support the Windows 2000 Server operating system. NT administrators will be able to differentiate the features and technology changes from Windows NT 4.0 to Windows 2000. In the handbook, readers will find a complete overview of the product, catered to their needs. * This book coincides with the launch of Windows 2000 Server, the host system for the product.* Includes the following:* Detailed coverage of Active Directory, Microsoft Management Console, and new Windows 2000 hardware support * Implementing new Windows 2000 security options* Upgrading a network to Windows 2000

XML Net Developers Guide


Compete with the big players in today’s E-commerce marketplaceElectronic Data Interchange (EDI) has long been the standard for large business enterprises to communicate in the B2B marketplace. However, EDI is a difficult technology — the cost and support of EDI standards is often too much for a small or medium business enterprise to bear. To compete in the current E-commerce marketplace, many organizations are beginning to take an interest in the interoperability that exists between XML (Extensible Markup Language) and EDI. XML .NET Developers Guide is written for information technology professionals responsible for supporting data management in both small and large organizations. This book appeals to both individuals working with an existing EDI environment, and small to medium businesses looking to increase their market presence by competing with current EDI players using XML/EDI.XML/EDI is quickly becoming an industry standard, however there is a noticeable lack of quality reference material for programmers looking to adopt these standards.You can take it with you. The book comes with Syngress’ revolutionary Wallet CD containing a printable HTML version of the book, all of the source code, and demo versions of popular XML/EDI translation tools Up to the minute web-based support with solutions@syngress.com

Troubleshooting Windows 2000 TCP/IP


TCP/IP is a set of proposals developed to allow cooperating computers to share resources across a network. Some of the largest networks today are built on the TPC/IP protocol suite. Understanding how TCP/IP is &quote;supposed&quote; to work is not enough for today’s network managers. In this book, readers will learn to prevent, detect, troubleshoot and correct TCP/IP network problems. By using products such as distributed sniffers, field metering tools and protocol analyses, network managers can learn a lot about what is going on in (or wrong in) an internetwork and be able to troubleshoot a live TPC/IP network. This book focuses specifically on identifying problem areas, including identifying and correcting protocol errors, DNS route problems, application faults and slow response times.Syngress have sold over 700,000 Microsoft and Cisco certification guides in the last two years. Most of the administrators buying these will be interested in this book.* TPC/IP is a very popular topic; readers will welcome a guide to troubleshooting and repairing problems* Tackles monitoring the network using protocol analyses* Teaches effective methods of baselining and trend analysis