Use visualization software to analyze your network traffic and identify security vulnerabilities
Featured chapter download
Security Data Visualization creates graphical windows into the world of computer security data, revealing fascinating and useful insights into networking, cryptography and file structures. In this chapter download, learn how to use various visualization techniques to analyze live Internet traffic collected from a home ISP connection. Work through slices of the traffic based on port and protocol until you have examined all the packets. Learn what network attacks look like and how to assess your network for vulnerabilities with visualization software.
New chapter downloads
Secure your e-mail with OpenPGP
While Pretty Good Privacy (PGP) usually works impressively to secure e-mail communications, but it isn't always easy to configure and can be very tricky to troubleshoot. In this chapter download from PGP & GPG: E-mail for the Practical Paranoid, learn how to use public keys, private keys, and digital signatures to calibrate your desired level of e-mail privacy in OpenPGP.
Something for nothing: Take a lighter look at spam scams
The Spam Letters is a collection of entertaining and illuminating correspondence with the people who send out mass junk e-mailings (aka spam). Compiled from the nearly 200 entries written by Jonathan Land, The Spam Letters taunts, prods, and parodies the faceless salespeople in your inbox, giving you a chuckle at their expense. This chapter download from the book focuses on phishing scams.
Explore functional programming techniques in Ruby
There may be no better way to learn how to program than by dissecting real, representative code samples. Accordingly, Ruby by Example analyzes a series of Ruby scripts, examining how the code works, explaining the concepts it illustrates, and showing how to modify it to suit your needs. In this chapter download, focus on learning some key functional programming techniques in Ruby.
Use the QtSql module to build Qt applications that work with various relational database management systems
It's difficult to imagine many applications being able to function without relational databases to back them up. For this reason, Qt provides a range of classes in the QtSql module that work with various relational database management systems. Learn how to use the QtSql module to build Qt applications that work with different relational database management systems. Explore the structure of the QtSql module, selecting the appropriate driver, making a connection, making queries, transactions, embedded databases, using SQL model classes with Interview, and displaying query results.
Special feature: Microsoft Office
Perennial favorites
Cisco CCNA self-study: Fundamentals of IP
This chapter download presents the core concepts behind OSI Layer 3. This coverage includes IP addressing, IP routing, and some protocols useful to IP's effort to deliver packets end to end through a network.
Hacking Windows-specific services on Windows Server 2003
Learn how to fight common hacking methods, such as password guessing, eavesdropping on authentication, subverting authentication via rogue server or man-in-the-middle (MITM) attacks, and attacking vulnerabilities in Windows-specific services.
Save your sanity with these fixes for Windows XP multimedia annoyances
This chapter excerpt from Fixing Windows XP Annoyances: How to Fix the Most Annoying Things About the Windows OS shows you how to fix the most annoying multimedia problems; problems that are probably all too familiar to you.
Desktops NetNote
This newsletter will help you stay up to date on OS migration, PC troubleshooting, hardware needs analysis, and driver configuration. Click the "Sign Me Up" button to automatically subscribe.
White Papers from our partners