Special Ops: Host and Network Security for Microsoft Unix and Oracle Ebook

Host and Network Security for Microsoft Unix and Oracle: Host and Network Security for Microsoft Unix and Oracle

Publication: Syngress
Is my Device Supported?

You're about to purchase a Downloadable Ebook

Hi, sorry for the interruption!
We're repeating some important information here to ensure that you're making an informed purchase. Please review it.

  • Don't get caught unaware. Preview ebook and open the sample ebook on each of your intended devices before continuing.
  • You will need a Free 3rd-party application that can read the intermediate .acsm file you will receive as download. PDF/Epub format is downloaded automatically by the application thereafter. Please install the necessary software first on your intended device of use.
  • - Printing is permitted.
    - You can copy text from file.
  • Refund Policy
    Refunds are not allowed after the ebook is opened so please open the ebook directly on your intended device. Refund requests should be recieved within 7 days after download is made available. Of course, if you get an incorrect ebook ( different from what is mentioned in the title) or if the ebook doesn't open on the initial device, then we'll assist with fixing the issue or get you a refund if a timely fix isn't available.
  • Customer Service
    We currently only provide ticket (online form submission) or email support. Rest assured that you're in good hands; customers like our professional service!
I have previewed the ebook and read the requirements and terms.

Language: English
Publication Date: March 2003
File Size: 11595 Kbytes

Restrictions set by Publisher:
- Text-to-speech feature not available.
- Printing is permitted.
- You can copy text from file.
- Free application Adobe Digital Editions, Aldiko reader, or Bluefire reader required .
$53.55 $72.95
( 26.59% savings )
Great Prices, Always!
Change Region
ISBN: 9780080481050   Should I buy this Ebook?   Write a Review


Special Ops: Internal Network Security Guide is the solution for the impossible 24-hour IT work day. By now, most companies have hardened their perimeters and locked out the “bad guys,” but what has been done on the inside? This book attacks the problem of the soft, chewy center in internal networks. We use a two-pronged approach-Tactical and Strategic-to give readers a complete guide to internal penetration testing. Content includes the newest vulnerabilities and exploits, assessment methodologies, host review guides, secure baselines and case studies to bring it all together. We have scoured the Internet and assembled some of the best to function as Technical Specialists and Strategic Specialists. This creates a diversified project removing restrictive corporate boundaries. The unique style of this book will allow it to cover an incredibly broad range of topics in unparalleled detail. Chapters within the book will be written using the same concepts behind software development. Chapters will be treated like functions within programming code, allowing the authors to call on each other’s data. These functions will supplement the methodology when specific technologies are examined thus reducing the common redundancies found in other security books.

This book is designed to be the “one-stop shop” for security engineers who want all their information in one place. The technical nature of this may be too much for middle management; however technical managers can use the book to help them understand the challenges faced by the engineers who support their businesses.

Ø Unprecedented Team of Security Luminaries. Led by Foundstone Principal Consultant, Erik Pace Birkholz, each of the contributing authors on this book is a recognized superstar in their respective fields. All are highly visible speakers and consultants and their frequent presentations at major industry events such as the Black Hat Briefings and the 29th Annual Computer Security Institute Show in November, 2002 will provide this book with a high-profile launch.
Ø The only all-encompassing book on internal network security. Windows 2000, Windows XP, Solaris, Linux and Cisco IOS and their applications are usually running simultaneously in some form on most enterprise networks. Other books deal with these components individually, but no other book provides a comprehensive solution like Special Ops. This book’s unique style will give the reader the value of 10 books in 1.


Demystifying the IPsec Puzzle ebook cover
Save 11.12%
Security Fundamentals for E-Commerce ebook cover
Save 11.33%
How To Do Everything With Your Pocket PC, 2nd Edition ebook cover
Save 18.37%
Optical Networking ebook cover
Save 22.91%

Should you buy this Ebook?

We've put together a collection of resources to help you make a decision regarding whether you should buy this Ebook from us.

  1. Is your device one of these? Ebook reading software will work on the following devices: Windows, Mac, Android 2.2+ Devices, IPad (iOS 3+), IPhone (iOS 3+), Kindle Fire. Several other devices are also supported by the software.
  2. Compare prices. Our price is $53.55. If you would like to research our competitors to see their prices. Here're some places to look:
  3. Why should you buy Ebooks from onlinebookplace.com?

    We've had 1000s of downloads so far and with over 300000+ Ebooks to choose from, onlinebookplace.com is becoming a favorite Ebook Store for many. Allow us to win you over with our competitive pricing, upfront policies and diligent customer service.

    We're Upfront:

    • Every Ebook page on onlinebookplace.com has information on restrictions that publishers have placed on the Ebook along with a clear indication of software required to read the Ebooks.
    • If ratings for an Ebook are available from one of several sources online, then we've attempted to get those to help you make a better purchasing decision about the Ebook. Reviews from Goodreads (a popular reviews site) are provided on the same if they're available.
    • In most cases, we've also attempted to get you links to the Ebook on our competitor's site so that you can compare prices with relative ease.
    • We use McAfee to scan for any vulnerabilities in the system to ensure that any information that you give us does not fall into the wrong hands.
    • We use Paypal, a trusted 3rd party payment provider to accept Payments -- your payment information doen't reside with us. Any information that does end up with us is safe.

After installing the appropriate app for your device, try a Sample Download (Sherlock Holmes from Project Gutenberg) before purchase. The sample is only for checking device compatibility.

Check below for device compatibility and any free 3rd-party software requirements. Choice of what ebook reading app to use is yours, we only present a few common apps that several customers of ours have preferred. You should be able to transfer your purchase to more than one (upto 6) compatible devices as long as your ebook-reading apps have been registered with the same Adobe ID before opening the file.


Windows/Mac PC or Laptop

Free app Adobe Digital Editions required. Note that this software is not the same as Adobe Reader.


Android 2.1+

Free app Aldiko Reader or Bluefire Reader required.

Kindle Fire (and any Android based Kindle models)

Free Kindle Android app Bluefire Reader required.


IPad or IPhone

Free app Bluefire Reader required. Kindly review their tutorial for the requirement (note that while they're talking about library ebooks, same applies to your purchased .acsm file) -- feel free to use the sample download for testing. Tutorial .

Other E-Reader

Several Other devices supported

Devices like Nook are supported via the free application Adobe Digital Editions . This software is not the same as Adobe Reader. Please check compatibility of your device before purchase.

Hot deal!
Special Ops: Host and Network Security for Microsoft Unix and Oracle