Home > Articles > Security

Security

722 Items

Sort by Date | Title

An Overview of Computer Security
Jan 3, 2005
Information Flow
Jan 3, 2005
CCSP CSI Exam Certification: SAFE IP Telephony Design
Dec 30, 2004
This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
Cisco Network Security Fundamentals: Wireless Security
Dec 30, 2004
This chapter covers wireless security—what it is, how it works, how it is configured, what threatens it, and what policies can be designed to secure it.
Letting The Telecommuters Into The Network
Dec 23, 2004
You worked hard to keep the space rabble out of your network. Now make sure the good guys can get in.
Reverse Engineering and Program Understanding
Dec 23, 2004
Reverse engineering is a powerful tool that hackers can use to compromise the security of your business. Learn how this works in this chapter from Greg Hoglund and Gary McGraw.
The Doc Lockbox: Information Rights Management in Word 2003
Dec 23, 2004
Laurie Rowell shows an easy way to provide extra levels of protection for your Microsoft Word documents. With information rights management (IRM), you can strongarm anyone who tries to access your files without your express permission, or graciously grant access to read, copy, print, and even edit your deathless prose.
Network Sniffers: Is Open Source Right for You?
Dec 17, 2004
There are commercial-grade sniffers available from manufacturers such as Fluke, Network General, and others. While these hardware tools can provide a much deeper level of analysis, you can build an inexpensive network sniffer using open source software and a low-end Intel PC. This chapter reviews several open source Ethernet sniffers.
What Is Network Security Monitoring?
Dec 17, 2004
Network Security Monitoring is the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. This chapter examines these aspects in detail.
Why Your Data Is at Risk
Dec 17, 2004
Randy Nash discusses various methods by which critical data may be attacked. He compares the risks to data as it traverses a network (data on the wire) with attacks directed at a data repository (data at rest).
ASP.NET 2.0 Security
Dec 10, 2004
This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
Developing Your Information Security Program
Dec 10, 2004
This chapter introduces the core concepts that you should consider when building a new security program or improving an existing one. Both of these tasks require a solid plan and diligent attention to details. Using the methodologies introduced in this chapter, you can begin to create that plan.
Physical Security in the CISSP Exam
Dec 10, 2004
This chapter provides sample questions from the CISSP exam with a focus on physical security, including extensive explanations for the correct answers.
Getting Familiar with Cisco Secure Access Control Server
Dec 3, 2004
This chapter covers the basics of the Cisco Secure Access Control Server interface, and familiarizes you with the very simplest of actions in this medium.
Introduction to Infrastructure Security
Nov 24, 2004
This sample chapter explains Infrastructure Security with an eye towards passing the Security+ exam. Included are sample exam questions to help you practice for the exam.
Security Advocacy and Awareness: Creating A Secure Culture
Nov 24, 2004
All your efforts at securing your network are for naught if your users don't cooperate. This article will provide you with the tools you need to create a secure culture for your organization.
Why Sguil Is the Best Option for Network Security Monitoring Data
Nov 24, 2004
There are many ways to correlate and integrate data from multiple sources in UNIX, but this chapter explains why Sguil is the best option for Network Security Monitoring data, and how to implement this system.
Developing Secure Applications Through Aspect-Oriented Programming
Nov 18, 2004
This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
Secure Authentication Features in Windows XP
Nov 18, 2004
Connecting users to your network requires more than plugging in a network cable. In this book chapter, you'll learn the specifics of authentication under Windows XP: the process of verifying the identity of the user attempting to access a computer or other network resource. Find out the inner workings of Windows XP Professional, whether you need total authentication services or interoperability with Windows NT, Windows 2000, and Windows 2003.
Configuring the Secure Shell
Nov 12, 2004
This chapter will help you configure SSH for your company to the security specifications of your particular network.

<< < Prev Page 18 19 20 21 22 Next >