- Core Elements of the Cisco Self-Defending Network Strategy
- May 27, 2005
- Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
|
- Protecting Your Privacy and Blocking Spam in Thunderbird
- May 27, 2005
- Find out how to Thunderbird protects you from spam as well as securing your privacy in this sample chapter.
|
- Searching for Substance: Search Engines Searching Me
- May 20, 2005
- Nigel McFarlane posits that the days of the free ride when searching the Internet are ending. Search engines have become such ubiquitous tools that we use them without thought. In the future, though, they're more likely to use us.
|
- The Characteristics of Spam Email
- May 20, 2005
- The first step to fighting spam is knowing how to recognize it and, by extension, write code that recognizes it. Unfortunately, spammers realize this and work hard to circumvent detection. This chapter details the many ways that spam filters recognize spam, as well as the ways spammers have gotten around these filters.
|
- CISA Exam Cram: Technical Infrastructure and Operational Practices and Infrastructure
- May 12, 2005
- As an IS auditor, you will need to understand the technical infrastructure of the organization, the IS organizational structure, and the operational practices including working with networking devices, servers and operating systems, data storage systems, applications, and the standards and protocols associated with network communication. This chapter will help you prepare for the CISA exam with detailed examples and sample questions.
|
- File System Forensic Analysis: PC-based Partitions
- May 12, 2005
- This chapter dives into the details of the partition systems used in personal computers from DOS partitions, to Apple partitions, to removable media. Find out how it works in this sample chapter.
|
- Layer 2 VPN Architectures: Understanding Any Transport over MPLS
- May 12, 2005
- This chapter provides an overview of LDP, including LDP components and operations that are related to pseudowire emulation over MPLS along with an explanation of the control signaling and data switching details of AToM.
|
- An Executive's Information Security Challenge
- May 6, 2005
- Security isn't just an issue for network administrators to deal with. Everyone from the mail clerk to the executive board needs to be aware of information security issues. This chapter details the issues involved in information security as it affects executives.
|
- Configuring SSL on BEA WebLogic Server 8.1
- Apr 29, 2005
- Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
|
- Inside Network Perimeter Security: Stateful Firewalls
- Apr 29, 2005
- The firewall provides a secured method of controlling what information moves in to or out of a defined ingress/egress point of your network. The stateful firewall adds intelligence to the packet-filtering method of network communication control. Find out about stateful firewalls in this sample chapter.
|
- Inside Network Perimeter Security: Proxy Firewalls
- Apr 22, 2005
- This chapter describes the basics of proxy firewalls and how they may fit into your security architecture. Although proxies are not as popular as they once were, they can still offer value when deployed appropriately. This chapter will help you to understand how proxies work, what their strengths and weaknesses are, and when you may want to use them.
|
- Inside Network Perimeter Security: Packet Filtering
- Apr 15, 2005
- This chapter discusses the many ways that packet filtering can be used as a means to secure the perimeter of your network. It also weighs the positive and negative points of using a packet filter as the means to control traffic flow based on address and port, and the weaknesses of the packet-filtering technology.
|
- Linux Kernel Process Management
- Apr 15, 2005
- This chapter looks at the famed operating system abstraction of the process. Topics covered include the generalities of the process, why it is important, and the relationship between processes and threads. Specifically, this chapter covers how Linux stores and represents processes.
|
- Perimeter Security Fundamentals
- Apr 8, 2005
- Your network security is being evaluated on a weekly if not daily basis. If you're smart, you're the one doing the evaluating. This chapter will help you to understand why perimiter security is vital to your network, and why you should test it before someone else does.
|
- How to Protect Yourself from Identity Theft
- Apr 1, 2005
- Identity theft is becoming easier and easier as more and more people shop online. Find out how to protect yourself from identity thieves in this sample chapter.
|
- Policy, Personnel, and Equipment as Security Enablers
- Apr 1, 2005
- Policy plays an integral role in security effectiveness. Educating users on their responsibility to enhance security can have a twofold effect: It ensures that deployed equipment can perform tasks with greater effectiveness, and it creates an environment that encourages and supports individual responsibility.
|
- RFIDs: Technology Friend or Foe?
- Apr 1, 2005
- David Gulbransen takes a look at the technology behind RFIDs, what advances will mean in terms of convenience to consumers, and the potential threats to privacy that have many industry leaders concerned about the technology getting out of hand.
|
- Advanced Code Evolution Techniques and Computer Virus Generator Kits
- Mar 25, 2005
- In this chapter you will learn about the advanced self-protection techniques computer virus writers have developed over the years to fight back against scanners. In particular, you will learn about encrypted, oligomorphic, polymorphic, and advanced metamorphic computer viruses. Finally, we will look at computer virus generator kits that use similar techniques to create different-looking virus variants.
|
- Interview with John Coggeshall, Internationally Respected Developer and Technical Consultant for Zend Technologies
- Mar 18, 2005
- Stephen Ibaraki interviews John Coggeshall, a Technical Consultant for Zend Technologies and the author of two published books and over 100 articles on PHP technologies. John discusses the most common PHP problems and solutions, and the five more important things he's learning about programming.
|
- More About PC Health Care
- Mar 18, 2005
- The more programs you install and uninstall, the more artifacts are left behind that can cause problems on your system later. This chapter will help you maintain your PC and keep it cleared of these leftover files that can cause strange behaviors.
|