Thursday, January 22, 2009

Microsoft Access 2007 Data Analysis or Penetration Testing and Cisco Network Defense

Microsoft Access 2007 Data Analysis

Author: Michael Alexander

Chart a course for more effective data analysis with Access 2007. With this resource, you’ll learn how Access 2007 offers powerful functionality that may be better suited to your data analysis needs. Learn to analyze large amounts of data in meaningful ways, quickly and easily slice it into various views, automate redundant analysis, and save time—all using Access. If you know a bit about table structures and formulas as well as data analysis, start thinking outside the chart.



Table of Contents:
About the Author.

Acknowledgments.

Introduction.

Part I Fundamentals of Data Analysis in Access.

Chapter 1 The Case for Data Analysis in Access.

Chapter 2 Access Basics.

Chapter 3 Beyond Select Queries.

Part II Basic Analysis Techniques.

Chapter 4 Transforming Your Data with Access.

Chapter 5 Working with Calculations and Dates.

Chapter 6 Performing Conditional Analysis.

Part III Advanced Analysis Techniques.

Chapter 7 Understanding and Using SQL.

Chapter 8 Subqueries and Domain Aggregate Functions.

Chapter 9 Running Descriptive Statistics in Access.

Chapter 10 Analyzing Data with Pivot Tables and Pivot Charts.

Part IV Automating Data Analysis.

Chapter 11 Scheduling and Running Batch Analysis.

Chapter 12 Leveraging VBA to Enhance Data Analysis.

Chapter 13 Query Performance, Database Corruption, and Other Final Thoughts.

Part V Appendixes.

Appendix A Data Analyst’s Function Reference.

Appendix B Access VBA Fundamentals.

Appendix C Error Message Reference.

Index.

Read also Entrepreneurship and Small Business Management or Americas Oil Wars

Penetration Testing and Cisco Network Defense

Author: Andrew Whitaker

The practical guide to simulating, detecting, and responding to network attacks

  • Create step-by-step testing plans
  • Learn to perform social engineering and host reconnaissance
  • Evaluate session hijacking methods
  • Exploit web server vulnerabilities
  • Detect attempts to breach database security
  • Use password crackers to obtain access information
  • Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches
  • Scan and penetrate wireless networks
  • Understand the inner workings of Trojan Horses, viruses, and other backdoor applications
  • Test UNIX, Microsoft, and Novell servers for vulnerabilities
  • Learn the root cause of buffer overflows and how to prevent them
  • Perform and prevent Denial of Service attacks

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization’s network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wirelessnetworks.
Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks.
Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources.
“This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade.”
–Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems®



No comments:

Post a Comment