Demo Blog

Wireless Network Security

by admin on Nov.22, 2009, under ,

CONTENTS OF Wireless Network Security

Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
  • Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor
Jonathan Lutz and M. Anwarul Hasan
  • Chapter 2: An Adaptive Encryption Protocol in Mobile Computing
Hanping Lufei and Weisong Shi
Part II: Security in Ad Hoc Network
  • Chapter 3: Pre-Authentication and Authentication Models in
Ad Hoc Networks
Katrin Hoeper and Guang Gong
  • Chapter 4: Promoting Identity-Based Key Management in
Wireless Ad Hoc Networks
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
  • Chapter 5: A Survey of Attacks and Countermeasures in
Mobile Ad Hoc Networks
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
  • Chapter 6: Secure Routing in Wireless Ad-Hoc Networks
Venkata C. Giruka and Mukesh Singhal
  • Chapter 7: A Survey on Intrusion Detection in
Mobile Ad Hoc Networks
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
  • Chapter 8: Intrusion Detection in Cellular Mobile Networks
Bo Sun, Yang Xiao, and Kui Wu
  • Chapter 9: The Spread of Epidemics on Smartphones
Bo Zheng, Yongqiang Xiong, Qian Zhang, and Chuang Lin
Part IV: Security in Wireless LANs
  • Chapter 10: Cross-Domain Mobility-Adaptive Authentication
Hahnsang Kim and Kang G. Shin
  • Chapter 11: AAA Architecture and Authentication
for Wireless LAN Roaming
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
  • Chapter 12: An Experimental Study on Security Protocols in WLANs
Avesh Kumar Agarwal and Wenye Wang
Part V: Security in Sensor Networks
  • Chapter 13: Security Issues in Wireless Sensor Networks
used in Clinical Information Systems
Jelena Misic and Vojislav B. Misic
  • Chapter 14: Key Management Schemes in Sensor Networks
Venkata Krishna Rayi, Yang Xiao, Bo Sun, Xiaojiang (James) Du, and Fei Hu
  • Chapter 15: Secure Routing in Ad Hoc and Sensor Networks
Xu (Kevin) Su, Yang Xiao, and Rajendra V. Boppana
0 comments more...

TOAD.(Tool for Oracle Application Developers).Handbook part 2

by admin on Nov.22, 2009, under ,

Chapter 6. Using TOAD for Non-Routine DBA Tasks
  • Creating a New Database
  • Starting and Stopping Databases
  • Examining Oracle and NLS Parameters
  • Estimating Table and Index Sizes
  • Analyzing Tables and Indexes
  • Rebuilding a Table
  • Rebuilding Multiple Indexes
  • Repairing Tables with Chained Rows
  • Pinning PL/SQL Code in the SGA
  • Generating Schema Scripts
  • Comparing Schema Differences
  • Monitoring a Database Instance
  • Examining Server Statistics
  • Examining Control Files
  • Managing Redo Log Files
  • Examining Redo Log File Switches
  • Mining Redo Log Files
  • Monitoring a UNIX Server
  • Tuning the UNIX Kernel
  • Tuning the Windows Registry
  • Summary

Chapter 7. Generating Database Reports via TOAD

  • Running Standard Database Reports
  • Creating HTML Schema Doc Generator Reports
  • Running DBA Scripts to Create Reports
  • Summary

Chapter 8. Exporting Table Data
  • Overview
  • Formatting Data for Reporting/Non-Oracle Data Loads
  • Formatting Data as INSERT Statements
  • Formatting Multiple Table Data as INSERT Statements
  • Using the Export Utility Wizard
  • Summary

Chapter 9. Using Other Powerful TOAD Tools
  • Browsing Master-Detail Data
  • Modeling Complex SQL Visually
  • Generating Entity Relationship Diagrams
  • Registering External Programs
  • Comparing Files for Differences
  • Using FTP and Network Utilities
  • Editing Oracle TNS Name Files
  • Tracing Execution Using TKPROF
  • Subsetting Production Data
  • Managing SQL Scripts Made Easy
  • Summary

Chapter 10. Knowing the TOAD World and Its Add-ons
  • Knowing the World According to TOAD
  • Using Formatter Plus for PL/SQL
  • Using the Knowledge Xpert Products
  • Using SQLab Xpert Tuning
  • Using Benchmark Factory
  • Using QDesigner
  • Summary

0 comments more...

TOAD.(Tool for Oracle Application Developers).Handbook part 1

by admin on Nov.22, 2009, under ,

Chapter 1. Setting Up TOAD for Successful Use
  • Meeting TOAD's Database Connectivity Needs
  • Understanding TOAD's Oracle-Based Security
  • Creating the All-Important TOAD Schema
  • Activating TOAD's "Read-Only" Mode
  • Using TOAD's New Advanced Security
  • Enabling TOAD's PL/SQL Profiler Support
  • Saving and Restoring All Your TOAD Settings
  • Summary

Chapter 2. Using TOAD's Schema Browser
  • Making Schema Browser Your Startup Screen
  • Choosing Among Schema Browser Display Styles
  • Enabling or Disabling Schema Browser Tabs
  • Configuring Schema Browser Tabs
  • Filtering Schema Browser Schemas
  • Filtering Schema Browser Objects
  • Filtering and Sorting Schema Browser Data
  • Using Favorites as a Custom Schema Browser
  • Setting Some Advanced Schema Browser Options
  • Summary

Chapter 3. TOAD SQL Editor
  • Overview
  • Predefined Shortcuts
  • User-Defined Shortcuts
  • Using Variables
  • Table and Column Name Select Lists
  • Using Aliases and Autoreplacement Substitutions
  • SQL Templates
  • Code Completion Templates
  • Executing SQL Statements
  • Executing SQL Scripts
  • Editing Result-Set Data
  • Saving Result-Set Data
  • Printing Result-Set Data
  • Examining Explain Plans
  • Examining Basic Performance Info
  • Using Auto Trace
  • SQL*Plus Compatibility
  • Scripts That Write Scripts
  • Summary

Chapter 4. TOAD Procedure Editor

  • Overview
  • Predefined Shortcuts
  • User-Defined Shortcuts
  • Using Variables
  • Table and Column Name Select Lists
  • Using Aliases and Auto Replacement Substitutions
  • SQL Templates
  • PL/SQL Object Templates
  • Creating a New PL/SQL Object
  • Using the PL/SQL Navigator
  • Compiling PL/SQL Code
  • Executing PL/SQL Code
  • Saving PL/SQL Code to Files
  • Formatting PL/SQL Code
  • Using DBMS_OUTPUT
  • Debugging Setup, Requirements, and Parameters
  • Basic Debugging PL/SQL Code
  • Debugging Breakpoint Options
  • Advanced Debugging PL/SQL Code
  • Profiling PL/SQL Code
  • Setting Up Source Control
  • Using Source Control
  • Summary

Chapter 5. Using TOAD for Routine DBA Tasks
  • Checking Status of All Your Instances
  • Checking an Instance's Alert Log File
  • Examining Tablespace Usage and Projections
  • Checking Tablespaces for Free Space Deficits
  • Reviewing Schema Object Extent Allocations
  • Checking the Level of Tablespace Fragmentation
  • Checking the Overall Health of a Database
  • Monitoring SQL Currently in the Shared Pool
  • Determining Resource-Intensive Sessions
  • Monitoring and Killing User Sessions
  • Creating, Altering, and Managing Database Objects
  • Scheduling DBA Tasks by Using UNIX Job Scheduler
  • Summary

0 comments more...

The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction

by admin on Nov.22, 2009, under ,

The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction

Table of Contents
Chapter 1-Overview of the Oracle RDBMS
  • Processes
  • The File System
  • The Network
  • Oracle Patching
  • Wrapping Up
Chapter 2-The Oracle Network Architecture
  • The TNS Protocol
  • Getting the Oracle Version
  • Wrapping Up
Chapter 3-Attacking the TNS Listener and Dispatchers
  • The Aurora GIOP Server
  • The XML Database
  • Wrapping Up
Chapter 4-Attacking the Authentication Process
  • Attacks Against the Crypto Aspects
  • Default Usernames and Passwords
  • Account Enumeration and Brute Force
  • Wrapping Up
Chapter 5-Oracle and PL/SQL
  • PL/SQL Execution Privileges
  • Wrapped PL/SQL
  • Working without the Source
  • PL/SQL Injection
  • Investigating Flaws
  • Direct SQL Execution Flaws
  • PL/SQL Race Conditions
  • Auditing PL/SQL Code
  • The DBMS_ASSERT Package
  • Some Real-World Examples
Chapter 6-Triggers
  • Examples of Exploiting Triggers
  • Wrapping Up
Chapter 7-Indirect Privilege Escalation
  • Wrapping Up
Chapter 8-Defeating Virtual Private Databases
  • Defeating VPDs with Raw File Access
  • General Privileges
  • Wrapping Up
Chapter 9-Attacking Oracle PL/SQL Web Applications
  • Recognizing the Oracle PL/SQL Gateway
  • Verifying the Existence of the Oracle PL/SQL Gateway
  • Attacking the PL/SQL Gateway
  • Wrapping Up
Chapter 10-Running Operating System Commands
  • Running OS Commands through Java
  • Running OS Commands Using DBMS_SCHEDULER
  • Running OS Commands Directly with the Job Scheduler
  • Running OS Commands Using ALTER SYSTEM
  • Wrapping Up
Chapter 11-Accessing the File System
  • Accessing the File System Using Java
  • Accessing Binary Files
  • Exploring Operating System Environment Variables
  • Wrapping Up
Chapter 12-Accessing the Network
  • Encrypting Data Prior to Exfiltrating
  • Attacking Other Systems on the Network
  • Java and the Network
  • Database Links
  • Wrapping Up

Appendix A-Default Usernames and Passwords
0 comments more...

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!