Home > Articles > Security

Security

722 Items

Sort by Date | Title

Overcoming the Internet
Jul 6, 2001
Sean Walton describes some of the more harrowing Internet problems and the "solutions" undertaken by some companies.
Protecting Web Sites by Guarding the Exits
Jun 22, 2001
Security expert Avi Rubin suggests we protect web servers the way some department stores protect against shoplifters: Watch the exits.
Security Considerations for Remote Electronic Voting over the Internet
Jun 22, 2001
Many U.S. citizens think electronic voting will solve our tabulation trials. But can we guarantee an accurate result?
Assessing Your Security Needs
Jun 15, 2001
Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
Implementing Security, Part I: Hardening your Windows Servers
Jun 15, 2001
In this first of two articles on implementing security processes, Joseph Dries helps you develop a laundry list of basic security processes to implement on your production Windows NT and 2000 servers.
Implementing Security, Part II: Hardening Your UNIX/Linux Servers
Jun 15, 2001
In this second of two articles on implementing security processes, Joseph Dries discusses UNIX/Linux hardening, protecting your servers from network-based TCP/IP attacks, and utilizing centralized logging servers.
An Introduction to Snort: A Lightweight Intrusion Detection System
Jun 15, 2001
In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
Implementing Snort: A Lightweight Intrusion Detection System
Jun 15, 2001
In this second of a two-part series of articles on Snort, the multiplatform Intrusion Detection System, Joseph Dries walks you through the complicated steps of its implementation.
Introducing Microsoft ISA Server 2000
May 25, 2001
Microsoft product expert Curt Simmons introduces you to ISA Server, Microsoft's new Internet acceleration and security product.
Secret Key Assurances
May 18, 2001
The authors review the concept of assurances in cryptography and examine three other necessary electronic data assurances -- authentication, integrity, and nonrepudiation.
Pioneering Public Key: Public Exchange of Secret Keys
May 18, 2001
Learn the answer to the secret key delivery problem has plagued cryptographers, governments, and kings for thousands of years.
Understanding Locks and Keys in Cryptography
May 18, 2001
Cryptography is both the lock and the combination (or key) that can be used to help protect your data. There are a variety of cryptographic methods and keys. Together, the method and the key determine cryptographic security.
Resource Inventory
May 12, 2001

In this sample chapter, IT security expert Donald Pipkin addresses the resource inventory aspect of information security ...

What to Do After the Break-in: Preparing an Incident Report for Law Enforcement
May 11, 2001
When you're the victim of cybercrime, it's important to cover your bases with solid documentation and contact with law enforcement officials. Kyle Cassidy walks you through the steps to take to ensure your best chance of a successful case.
Using Apache with SSL
May 11, 2001
One of the best additions that you can make to your server room is to include the Apache Web server on a Linux machine. In this article, Robert Napier explains how to build your own secure Apache server with the Secure Socket Layer (SSL) protocol.
Public Key Technology in Windows 2000
Mar 30, 2001
Windows 2000 has a built-in PKI infrastructure. Here, the authors discuss PKI architecture, interoperability issues, and applications that use Windows 2000’s PKI infrastructure.
CryptoNugget
Feb 23, 2001
Cryptography is a minor hobby of author Richard Heathfield. He has written this article in much the same way that he might have written for his book, C Unleashed, and he hopes you'll find it diverting and send you to the book for more!
Basic Virtual Private Network Deployment
Jan 19, 2001
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
Internet Security for Your LAN
Dec 13, 2000
The Internet is often called cyberspace to both distinguish and compare it from the real-world space we live in. There are unfortunate parallels in cyberspace to the evils in the real world, so you need to be concerned about attacks on your computers ...
Security Concepts
Dec 13, 2000
Learn the most common sources of intrusion attempts, and what types of security you need to prevent intruders from gaining unauthorized access to or use of your computing infrastructure.

<< < Prev Page 33 34 35 36 37 Next >