Wireless Network Security
by admin on Nov.22, 2009, under Download, IT
CONTENTS OF Wireless Network Security
Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
Part II: Security in Ad Hoc Network
Katrin Hoeper and Guang Gong
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
Part IV: Security in Wireless LANs
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
Part V: Security in Sensor Networks
Jelena Misic and Vojislav B. Misic
Preface
Yang Xiao, Xuemin Shen, and Ding-Zhu Du
Part I: Security in General Wireless/Mobile Networks
- Chapter 1: High Performance Elliptic Curve Cryptographic Co-processor
- Chapter 2: An Adaptive Encryption Protocol in Mobile Computing
Part II: Security in Ad Hoc Network
- Chapter 3: Pre-Authentication and Authentication Models in
Katrin Hoeper and Guang Gong
- Chapter 4: Promoting Identity-Based Key Management in
Jianping Pan, Lin Cai, and Xuemin (Sherman) Shen
- Chapter 5: A Survey of Attacks and Countermeasures in
Bing Wu, Jianmin Chen, Jie Wu, and Mihaela Cardei
- Chapter 6: Secure Routing in Wireless Ad-Hoc Networks
- Chapter 7: A Survey on Intrusion Detection in
Tiranuch Anantvalee and Jie Wu
Part III: Security in Mobile Cellular Networks
- Chapter 8: Intrusion Detection in Cellular Mobile Networks
- Chapter 9: The Spread of Epidemics on Smartphones
Part IV: Security in Wireless LANs
- Chapter 10: Cross-Domain Mobility-Adaptive Authentication
- Chapter 11: AAA Architecture and Authentication
Minghui Shi, Humphrey Rutagemwa, Xuemin (Sherman) Shen,
Jon W. Mark, Yixin Jiang, and Chuang Lin
- Chapter 12: An Experimental Study on Security Protocols in WLANs
Part V: Security in Sensor Networks
- Chapter 13: Security Issues in Wireless Sensor Networks
Jelena Misic and Vojislav B. Misic
- Chapter 14: Key Management Schemes in Sensor Networks
- Chapter 15: Secure Routing in Ad Hoc and Sensor Networks
TOAD.(Tool for Oracle Application Developers).Handbook part 2
by admin on Nov.22, 2009, under Download, IT
Chapter 6. Using TOAD for Non-Routine DBA Tasks
Chapter 7. Generating Database Reports via TOAD
Chapter 8. Exporting Table Data
Chapter 9. Using Other Powerful TOAD Tools
Chapter 10. Knowing the TOAD World and Its Add-ons
- Creating a New Database
- Starting and Stopping Databases
- Examining Oracle and NLS Parameters
- Estimating Table and Index Sizes
- Analyzing Tables and Indexes
- Rebuilding a Table
- Rebuilding Multiple Indexes
- Repairing Tables with Chained Rows
- Pinning PL/SQL Code in the SGA
- Generating Schema Scripts
- Comparing Schema Differences
- Monitoring a Database Instance
- Examining Server Statistics
- Examining Control Files
- Managing Redo Log Files
- Examining Redo Log File Switches
- Mining Redo Log Files
- Monitoring a UNIX Server
- Tuning the UNIX Kernel
- Tuning the Windows Registry
- Summary
Chapter 7. Generating Database Reports via TOAD
- Running Standard Database Reports
- Creating HTML Schema Doc Generator Reports
- Running DBA Scripts to Create Reports
- Summary
Chapter 8. Exporting Table Data
- Overview
- Formatting Data for Reporting/Non-Oracle Data Loads
- Formatting Data as INSERT Statements
- Formatting Multiple Table Data as INSERT Statements
- Using the Export Utility Wizard
- Summary
Chapter 9. Using Other Powerful TOAD Tools
- Browsing Master-Detail Data
- Modeling Complex SQL Visually
- Generating Entity Relationship Diagrams
- Registering External Programs
- Comparing Files for Differences
- Using FTP and Network Utilities
- Editing Oracle TNS Name Files
- Tracing Execution Using TKPROF
- Subsetting Production Data
- Managing SQL Scripts Made Easy
- Summary
Chapter 10. Knowing the TOAD World and Its Add-ons
- Knowing the World According to TOAD
- Using Formatter Plus for PL/SQL
- Using the Knowledge Xpert Products
- Using SQLab Xpert Tuning
- Using Benchmark Factory
- Using QDesigner
- Summary
TOAD.(Tool for Oracle Application Developers).Handbook part 1
by admin on Nov.22, 2009, under Download, IT
Chapter 1. Setting Up TOAD for Successful Use
Chapter 2. Using TOAD's Schema Browser
Chapter 3. TOAD SQL Editor
Chapter 4. TOAD Procedure Editor
Chapter 5. Using TOAD for Routine DBA Tasks
- Meeting TOAD's Database Connectivity Needs
- Understanding TOAD's Oracle-Based Security
- Creating the All-Important TOAD Schema
- Activating TOAD's "Read-Only" Mode
- Using TOAD's New Advanced Security
- Enabling TOAD's PL/SQL Profiler Support
- Saving and Restoring All Your TOAD Settings
- Summary
Chapter 2. Using TOAD's Schema Browser
- Making Schema Browser Your Startup Screen
- Choosing Among Schema Browser Display Styles
- Enabling or Disabling Schema Browser Tabs
- Configuring Schema Browser Tabs
- Filtering Schema Browser Schemas
- Filtering Schema Browser Objects
- Filtering and Sorting Schema Browser Data
- Using Favorites as a Custom Schema Browser
- Setting Some Advanced Schema Browser Options
- Summary
Chapter 3. TOAD SQL Editor
- Overview
- Predefined Shortcuts
- User-Defined Shortcuts
- Using Variables
- Table and Column Name Select Lists
- Using Aliases and Autoreplacement Substitutions
- SQL Templates
- Code Completion Templates
- Executing SQL Statements
- Executing SQL Scripts
- Editing Result-Set Data
- Saving Result-Set Data
- Printing Result-Set Data
- Examining Explain Plans
- Examining Basic Performance Info
- Using Auto Trace
- SQL*Plus Compatibility
- Scripts That Write Scripts
- Summary
Chapter 4. TOAD Procedure Editor
- Overview
- Predefined Shortcuts
- User-Defined Shortcuts
- Using Variables
- Table and Column Name Select Lists
- Using Aliases and Auto Replacement Substitutions
- SQL Templates
- PL/SQL Object Templates
- Creating a New PL/SQL Object
- Using the PL/SQL Navigator
- Compiling PL/SQL Code
- Executing PL/SQL Code
- Saving PL/SQL Code to Files
- Formatting PL/SQL Code
- Using DBMS_OUTPUT
- Debugging Setup, Requirements, and Parameters
- Basic Debugging PL/SQL Code
- Debugging Breakpoint Options
- Advanced Debugging PL/SQL Code
- Profiling PL/SQL Code
- Setting Up Source Control
- Using Source Control
- Summary
Chapter 5. Using TOAD for Routine DBA Tasks
- Checking Status of All Your Instances
- Checking an Instance's Alert Log File
- Examining Tablespace Usage and Projections
- Checking Tablespaces for Free Space Deficits
- Reviewing Schema Object Extent Allocations
- Checking the Level of Tablespace Fragmentation
- Checking the Overall Health of a Database
- Monitoring SQL Currently in the Shared Pool
- Determining Resource-Intensive Sessions
- Monitoring and Killing User Sessions
- Creating, Altering, and Managing Database Objects
- Scheduling DBA Tasks by Using UNIX Job Scheduler
- Summary
The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction
by admin on Nov.22, 2009, under Download, IT
The Oracle Hacker's Handbook-Hacking and Defending Oracle Introduction
Table of Contents
Chapter 1-Overview of the Oracle RDBMS
Appendix A-Default Usernames and Passwords
Table of Contents
Chapter 1-Overview of the Oracle RDBMS
- Processes
- The File System
- The Network
- Oracle Patching
- Wrapping Up
- The TNS Protocol
- Getting the Oracle Version
- Wrapping Up
- The Aurora GIOP Server
- The XML Database
- Wrapping Up
- Attacks Against the Crypto Aspects
- Default Usernames and Passwords
- Account Enumeration and Brute Force
- Wrapping Up
- PL/SQL Execution Privileges
- Wrapped PL/SQL
- Working without the Source
- PL/SQL Injection
- Investigating Flaws
- Direct SQL Execution Flaws
- PL/SQL Race Conditions
- Auditing PL/SQL Code
- The DBMS_ASSERT Package
- Some Real-World Examples
- Examples of Exploiting Triggers
- Wrapping Up
- Wrapping Up
- Defeating VPDs with Raw File Access
- General Privileges
- Wrapping Up
- Recognizing the Oracle PL/SQL Gateway
- Verifying the Existence of the Oracle PL/SQL Gateway
- Attacking the PL/SQL Gateway
- Wrapping Up
- Running OS Commands through Java
- Running OS Commands Using DBMS_SCHEDULER
- Running OS Commands Directly with the Job Scheduler
- Running OS Commands Using ALTER SYSTEM
- Wrapping Up
- Accessing the File System Using Java
- Accessing Binary Files
- Exploring Operating System Environment Variables
- Wrapping Up
- Encrypting Data Prior to Exfiltrating
- Attacking Other Systems on the Network
- Java and the Network
- Database Links
- Wrapping Up
Appendix A-Default Usernames and Passwords