Home > Articles > Security

Security

722 Items

Sort by Date | Title

Core Elements of the Cisco Self-Defending Network Strategy
May 27, 2005
Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
Protecting Your Privacy and Blocking Spam in Thunderbird
May 27, 2005
Find out how to Thunderbird protects you from spam as well as securing your privacy in this sample chapter.
Searching for Substance: Search Engines Searching Me
May 20, 2005
Nigel McFarlane posits that the days of the free ride when searching the Internet are ending. Search engines have become such ubiquitous tools that we use them without thought. In the future, though, they're more likely to use us.
The Characteristics of Spam Email
May 20, 2005
The first step to fighting spam is knowing how to recognize it and, by extension, write code that recognizes it. Unfortunately, spammers realize this and work hard to circumvent detection. This chapter details the many ways that spam filters recognize spam, as well as the ways spammers have gotten around these filters.
CISA Exam Cram: Technical Infrastructure and Operational Practices and Infrastructure
May 12, 2005
As an IS auditor, you will need to understand the technical infrastructure of the organization, the IS organizational structure, and the operational practices including working with networking devices, servers and operating systems, data storage systems, applications, and the standards and protocols associated with network communication. This chapter will help you prepare for the CISA exam with detailed examples and sample questions.
File System Forensic Analysis: PC-based Partitions
May 12, 2005
This chapter dives into the details of the partition systems used in personal computers from DOS partitions, to Apple partitions, to removable media. Find out how it works in this sample chapter.
Layer 2 VPN Architectures: Understanding Any Transport over MPLS
May 12, 2005
This chapter provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
An Executive's Information Security Challenge
May 6, 2005
Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
Configuring SSL on BEA WebLogic Server 8.1
Apr 29, 2005
Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
Inside Network Perimeter Security: Stateful Firewalls
Apr 29, 2005
The firewall provides a secured method of controlling what information moves in to or out of a defined ingress/egress point of your network. The stateful firewall adds intelligence to the packet-filtering method of network communication control. Find out about stateful firewalls in this sample chapter.
Inside Network Perimeter Security: Proxy Firewalls
Apr 22, 2005
This chapter describes the basics of proxy firewalls and how they may fit into your security architecture. Although proxies are not as popular as they once were, they can still offer value when deployed appropriately. This chapter will help you to understand how proxies work, what their strengths and weaknesses are, and when you may want to use them.
Inside Network Perimeter Security: Packet Filtering
Apr 15, 2005
This chapter discusses the many ways that packet filtering can be used as a means to secure the perimeter of your network. It also weighs the positive and negative points of using a packet filter as the means to control traffic flow based on address and port, and the weaknesses of the packet-filtering technology.
Linux Kernel Process Management
Apr 15, 2005
This chapter looks at the famed operating system abstraction of the process. Topics covered include the generalities of the process, why it is important, and the relationship between processes and threads. Specifically, this chapter covers how Linux stores and represents processes.
Perimeter Security Fundamentals
Apr 8, 2005
Your network security is being evaluated on a weekly if not daily basis. If you're smart, you're the one doing the evaluating. This chapter will help you to understand why perimiter security is vital to your network, and why you should test it before someone else does.
How to Protect Yourself from Identity Theft
Apr 1, 2005
Identity theft is becoming easier and easier as more and more people shop online. Find out how to protect yourself from identity thieves in this sample chapter.
Policy, Personnel, and Equipment as Security Enablers
Apr 1, 2005
Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
RFIDs: Technology Friend or Foe?
Apr 1, 2005
David Gulbransen takes a look at the technology behind RFIDs, what advances will mean in terms of convenience to consumers, and the potential threats to privacy that have many industry leaders concerned about the technology getting out of hand.
Advanced Code Evolution Techniques and Computer Virus Generator Kits
Mar 25, 2005
In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
Interview with John Coggeshall, Internationally Respected Developer and Technical Consultant for Zend Technologies
Mar 18, 2005
Stephen Ibaraki interviews John Coggeshall, a Technical Consultant for Zend Technologies and the author of two published books and over 100 articles on PHP technologies. John discusses the most common PHP problems and solutions, and the five more important things he's learning about programming.
More About PC Health Care
Mar 18, 2005
The more programs you install and uninstall, the more artifacts are left behind that can cause problems on your system later. This chapter will help you maintain your PC and keep it cleared of these leftover files that can cause strange behaviors.

<< < Prev Page 16 17 18 19 20 Next >