- An Overview of Computer Security
- Jan 3, 2005
|
- Information Flow
- Jan 3, 2005
|
- CCSP CSI Exam Certification: SAFE IP Telephony Design
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
- Cisco Network Security Fundamentals: Wireless Security
- Dec 30, 2004
- This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
|
- Letting The Telecommuters Into The Network
- Dec 23, 2004
- You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.
|
- Reverse Engineering and Program Understanding
- Dec 23, 2004
- Reverse engineering is a powerful tool that hackers can use to compromise the security of your business. Learn how this works in this chapter from Greg Hoglund and Gary McGraw.
|
- The Doc Lockbox: Information Rights Management in Word 2003
- Dec 23, 2004
- Laurie Rowell shows an easy way to provide extra levels of protection for your Microsoft Word documents. With information rights management (IRM), you can strongarm anyone who tries to access your files without your express permission, or graciously grant access to read, copy, print, and even edit your deathless prose.
|
- Network Sniffers: Is Open Source Right for You?
- Dec 17, 2004
- There are commercial-grade sniffers available from manufacturers such as Fluke, Network General, and others. While these hardware tools can provide a much deeper level of analysis, you can build an inexpensive network sniffer using open source software and a low-end Intel PC. This chapter reviews several open source Ethernet sniffers.
|
- What Is Network Security Monitoring?
- Dec 17, 2004
- Network Security Monitoring is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. This chapter examines these aspects in detail.
|
- Why Your Data Is at Risk
- Dec 17, 2004
- Randy Nash discusses various methods by which critical data may be attacked. He compares the risks to data as it traverses a network (data on the wire) with attacks directed at a data repository (data at rest).
|
- ASP.NET 2.0 Security
- Dec 10, 2004
- This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
|
- Developing Your Information Security Program
- Dec 10, 2004
- This chapter introduces the core concepts that you should consider when building a new security program or improving an existing one. Both of these tasks require a solid plan and diligent attention to details. Using the methodologies introduced in this chapter, you can begin to create that plan.
|
- Physical Security in the CISSP Exam
- Dec 10, 2004
- This chapter provides sample questions from the CISSP exam with a focus on physical security, including extensive explanations for the correct answers.
|
- Getting Familiar with Cisco Secure Access Control Server
- Dec 3, 2004
- This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
|
- Introduction to Infrastructure Security
- Nov 24, 2004
- This sample chapter explains Infrastructure Security with an eye towards passing the Security+ exam. Included are sample exam questions to help you practice for the exam.
|
- Security Advocacy and Awareness: Creating A Secure Culture
- Nov 24, 2004
- All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
|
- Why Sguil Is the Best Option for Network Security Monitoring Data
- Nov 24, 2004
- There are many ways to correlate and integrate data from multiple sources in UNIX, but this chapter explains why Sguil is the best option for Network Security Monitoring data, and how to implement this system.
|
- Developing Secure Applications Through Aspect-Oriented Programming
- Nov 18, 2004
- This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
|
- Secure Authentication Features in Windows XP
- Nov 18, 2004
- Connecting users to your network requires more than plugging in a network cable. In this book chapter, you'll learn the specifics of authentication under Windows XP: the process of verifying the identity of the user attempting to access a computer or other network resource. Find out the inner workings of Windows XP Professional, whether you need total authentication services or interoperability with Windows NT, Windows 2000, and Windows 2003.
|
- Configuring the Secure Shell
- Nov 12, 2004
- This chapter will help you configure SSH for your company to the security specifications of your particular network.
|