Wireless Network Security
August 09, 2010CONTENTS OF Wireless Network Security
Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
- Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor
- Chapter 2: An Adaptive Encryption Protocol in Mobile Computing
Part II: Security in Ad Hoc Network
- Chapter 3: Pre-Authentication and Authentication Models in
Katrin Hoeper and Guang Gong
- Chapter 4: Promoting Identity-Based Key Management in
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
- Chapter 5: A Survey of Attacks and Countermeasures in
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
- Chapter 6: Secure Routing in Wireless Ad-Hoc Networks
- Chapter 7: A Survey on Intrusion Detection in
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
- Chapter 8: Intrusion Detection in Cellular Mobile Networks
- Chapter 9: The Spread of Epidemics on Smartphones
Part IV: Security in Wireless LANs
- Chapter 10: Cross-Domain Mobility-Adaptive Authentication
- Chapter 11: AAA Architecture and Authentication
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
- Chapter 12: An Experimental Study on Security Protocols in WLANs
Part V: Security in Sensor Networks
- Chapter 13: Security Issues in Wireless Sensor Networks
Jelena Misic and Vojislav B. Misic
- Chapter 14: Key Management Schemes in Sensor Networks
- Chapter 15: Secure Routing in Ad Hoc and Sensor Networks
Continue reading...
TOAD.(Tool for Oracle Application Developers).Handbook part 2
Chapter 6. Using TOAD for Non-Routine DBA Tasks
- Creating a New Database
- Starting and Stopping Databases
- Examining Oracle and NLS Parameters
- Estimating Table and Index Sizes
- Analyzing Tables and Indexes
- Rebuilding a Table
- Rebuilding Multiple Indexes
- Repairing Tables with Chained Rows
- Pinning PL/SQL Code in the SGA
- Generating Schema Scripts
- Comparing Schema Differences
- Monitoring a Database Instance
- Examining Server Statistics
- Examining Control Files
- Managing Redo Log Files
- Examining Redo Log File Switches
- Mining Redo Log Files
- Monitoring a UNIX Server
- Tuning the UNIX Kernel
- Tuning the Windows Registry
- Summary
Chapter 7. Generating Database Reports via TOAD
- Running Standard Database Reports
- Creating HTML Schema Doc Generator Reports
- Running DBA Scripts to Create Reports
- Summary
Chapter 8. Exporting Table Data
- Overview
- Formatting Data for Reporting/Non-Oracle Data Loads
- Formatting Data as INSERT Statements
- Formatting Multiple Table Data as INSERT Statements
- Using the Export Utility Wizard
- Summary
Chapter 9. Using Other Powerful TOAD Tools
- Browsing Master-Detail Data
- Modeling Complex SQL Visually
- Generating Entity Relationship Diagrams
- Registering External Programs
- Comparing Files for Differences
- Using FTP and Network Utilities
- Editing Oracle TNS Name Files
- Tracing Execution Using TKPROF
- Subsetting Production Data
- Managing SQL Scripts Made Easy
- Summary
Chapter 10. Knowing the TOAD World and Its Add-ons
- Knowing the World According to TOAD
- Using Formatter Plus for PL/SQL
- Using the Knowledge Xpert Products
- Using SQLab Xpert Tuning
- Using Benchmark Factory
- Using QDesigner
- Summary
Continue reading...
TOAD.(Tool for Oracle Application Developers).Handbook part 1
Chapter 1. Setting Up TOAD for Successful Use
- Meeting TOAD's Database Connectivity Needs
- Understanding TOAD's Oracle-Based Security
- Creating the All-Important TOAD Schema
- Activating TOAD's "Read-Only" Mode
- Using TOAD's New Advanced Security
- Enabling TOAD's PL/SQL Profiler Support
- Saving and Restoring All Your TOAD Settings
- Summary
Chapter 2. Using TOAD's Schema Browser
- Making Schema Browser Your Startup Screen
- Choosing Among Schema Browser Display Styles
- Enabling or Disabling Schema Browser Tabs
- Configuring Schema Browser Tabs
- Filtering Schema Browser Schemas
- Filtering Schema Browser Objects
- Filtering and Sorting Schema Browser Data
- Using Favorites as a Custom Schema Browser
- Setting Some Advanced Schema Browser Options
- Summary
Chapter 3. TOAD SQL Editor
- Overview
- Predefined Shortcuts
- User-Defined Shortcuts
- Using Variables
- Table and Column Name Select Lists
- Using Aliases and Autoreplacement Substitutions
- SQL Templates
- Code Completion Templates
- Executing SQL Statements
- Executing SQL Scripts
- Editing Result-Set Data
- Saving Result-Set Data
- Printing Result-Set Data
- Examining Explain Plans
- Examining Basic Performance Info
- Using Auto Trace
- SQL*Plus Compatibility
- Scripts That Write Scripts
- Summary
Chapter 4. TOAD Procedure Editor
- Overview
- Predefined Shortcuts
- User-Defined Shortcuts
- Using Variables
- Table and Column Name Select Lists
- Using Aliases and Auto Replacement Substitutions
- SQL Templates
- PL/SQL Object Templates
- Creating a New PL/SQL Object
- Using the PL/SQL Navigator
- Compiling PL/SQL Code
- Executing PL/SQL Code
- Saving PL/SQL Code to Files
- Formatting PL/SQL Code
- Using DBMS_OUTPUT
- Debugging Setup, Requirements, and Parameters
- Basic Debugging PL/SQL Code
- Debugging Breakpoint Options
- Advanced Debugging PL/SQL Code
- Profiling PL/SQL Code
- Setting Up Source Control
- Using Source Control
- Summary
Chapter 5. Using TOAD for Routine DBA Tasks
- Checking Status of All Your Instances
- Checking an Instance's Alert Log File
- Examining Tablespace Usage and Projections
- Checking Tablespaces for Free Space Deficits
- Reviewing Schema Object Extent Allocations
- Checking the Level of Tablespace Fragmentation
- Checking the Overall Health of a Database
- Monitoring SQL Currently in the Shared Pool
- Determining Resource-Intensive Sessions
- Monitoring and Killing User Sessions
- Creating, Altering, and Managing Database Objects
- Scheduling DBA Tasks by Using UNIX Job Scheduler
- Summary
Continue reading...
The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction
The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction
Table of Contents
Chapter 1-Overview of the Oracle RDBMS
- Processes
- The File System
- The Network
- Oracle Patching
- Wrapping Up
- The TNS Protocol
- Getting the Oracle Version
- Wrapping Up
- The Aurora GIOP Server
- The XML Database
- Wrapping Up
- Attacks Against the Crypto Aspects
- Default Usernames and Passwords
- Account Enumeration and Brute Force
- Wrapping Up
- PL/SQL Execution Privileges
- Wrapped PL/SQL
- Working without the Source
- PL/SQL Injection
- Investigating Flaws
- Direct SQL Execution Flaws
- PL/SQL Race Conditions
- Auditing PL/SQL Code
- The DBMS_ASSERT Package
- Some Real-World Examples
- Examples of Exploiting Triggers
- Wrapping Up
- Wrapping Up
- Defeating VPDs with Raw File Access
- General Privileges
- Wrapping Up
- Recognizing the Oracle PL/SQL Gateway
- Verifying the Existence of the Oracle PL/SQL Gateway
- Attacking the PL/SQL Gateway
- Wrapping Up
- Running OS Commands through Java
- Running OS Commands Using DBMS_SCHEDULER
- Running OS Commands Directly with the Job Scheduler
- Running OS Commands Using ALTER SYSTEM
- Wrapping Up
- Accessing the File System Using Java
- Accessing Binary Files
- Exploring Operating System Environment Variables
- Wrapping Up
- Encrypting Data Prior to Exfiltrating
- Attacking Other Systems on the Network
- Java and the Network
- Database Links
- Wrapping Up
Appendix A-Default Usernames and Passwords Continue reading...
Spss 17 full
May 14, 2010
download here
spss 17 full
spss 17 crack
spss 17 free download
Continue reading...
Eviews 6 full crack
download here
eviews 6 free download
eviews 6 crack
eviews download
eviews 7
Continue reading...
Teacher's Handbook of Chemistry
March 17, 2010
Teacher's Handbook of Chemistry Summary:
Global Media | 2009 | ISBN-10: 9380168934 | | ISBN-13: 9789380168937 | 250 pages | PDF | 1,2 MB
download
Continue reading...