[Asis-l] From Ethical Hacking I and II to Meeting Patron Expectations with Next Generation Web Sites

Margaret Delaney delanema at oplin.org
Fri May 21 16:15:37 EDT 2004


These are just three of over 30 technology and management learning sessions
at Ohio's premier library technology conference "tech connections 5 : secure
and defend...the WILD side of technology!", June 7-8, 2004 at the Fawcett
Conference Center - OSU, Columbus, Ohio.

PLEASE NOTE: Will you need overnight accommodations? The "tech connections 5
group" overnight accommodations special rate is secured through Tuesday, May
25, 2004. If need to make overnight accommodations, details are available
through the tech connections 5 Web site at
http://www.rls.lib.oh.us/tc5/generaldetails.htm.

Ethical Hacking I - System Exploitation using Stack-Based Buffer Overflows
Jack Koziol, InfoSec Institute [ http://www.infosecinstitute.com/ ]
--Learn the intimate details of the bane of modern computing --- the
stack-based buffer overflow. Get a feel for traditional exploitation
techniques as well as more modern ones including the elusive Off-By-One
Overflow and Integer Overflow. See a buffer overrun exploited live as a
Windows 2000 server is compromised and interactive desktop access is
established remotely. Leave with a toolkit CD-ROM to run the demo in your
own home.

Ethical Hacking II - Covert Channels
Jack Koziol, InfoSec Institute [ http://www.infosecinstitute.com/ ]
--Modern security infrastructure is designed to discover, detect and
mitigate harmful security breaches. IDSs, IPSs, Firewalls and routers all
are designed to provide good intel to security pros. The hacking community
has responded with covert channels, a means and method to disguise malicious
behavior using encrypted or otherwise hard to detect tunnels. Traditional
protocol tunnels such as ICMP, Ack, ESP, and Frag tunnels are detailed as
well. Leave with a toolkit CD-ROM to run the demo in your own home.

Meeting Patron Expectations with Next Generation Web Sites
Frank Cervone, Assistant University Librarian for Information Technology,
Northwestern University [ http://www.cervone.com/ ]
--The rate of change is changing, so we need to continually scan the
environment in order to understand what our patrons expect from us. One
expectation that has changed significantly in the last few years is that web
sites should be very easy to use and information must be found readily.
Recent research has uncovered some very interesting things about how people
use web sites and what they have come to expect both in design and services.
Join us for an interesting (and sometimes humorous) exploration of how
federated searching, individualized content, and new trends in usability are
providing a road map for the development of "Next Generation Library
Websites".

The tech connections 5 Web site provides further conference details
including online registration at http://www.rls.lib.oh.us/tc5/.

We hope to see you at tech connections 5! Conference registration is open
through June 1.

Since 1999, tech connections has been a collaborative endeavor between
Ohio's Regional Library Systems - CAMLS, GCLC, MOLO, NOLA, NORWELD, OVAL,
SOLO.

"This year's tech connections conference is nicely enhanced for conference
participants thanks to the receipt of an LSTA grant from the Institute of
Museum and Library Services through the State Library of Ohio."

Margaret L. Delaney, Continuing Education Coordinator
Ohio Valley Area Libraries Regional Library System (OVAL)
252 West Thirteenth Street, Wellston, OH 45692
740-384-2103 x 2 ~ 740-384-2106 fax
http://www.oval.lib.oh.us ~ mailto:ceoval at oplin.org






More information about the Asis-l mailing list