- Overcoming the Internet
- Jul 6, 2001
- Sean Walton describes some of the more harrowing Internet problems and the "solutions" undertaken by some companies.
|
- Protecting Web Sites by Guarding the Exits
- Jun 22, 2001
- Security expert Avi Rubin suggests we protect web servers the way some department stores protect against shoplifters: Watch the exits.
|
- Security Considerations for Remote Electronic Voting over the Internet
- Jun 22, 2001
- Many U.S. citizens think electronic voting will solve our tabulation trials. But can we guarantee an accurate result?
|
- Assessing Your Security Needs
- Jun 15, 2001
- Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
|
- Implementing Security, Part I: Hardening your Windows Servers
- Jun 15, 2001
- In this first of two articles on implementing security processes, Joseph Dries helps you develop a laundry list of basic security processes to implement on your production Windows NT and 2000 servers.
|
- Implementing Security, Part II: Hardening Your UNIX/Linux Servers
- Jun 15, 2001
- In this second of two articles on implementing security processes, Joseph Dries discusses UNIX/Linux hardening, protecting your servers from network-based TCP/IP attacks, and utilizing centralized logging servers.
|
- An Introduction to Snort: A Lightweight Intrusion Detection System
- Jun 15, 2001
- In this first of a two-part series of articles on Snort, Joseph Dries introduces you to this Intrusion Detection System and tells you the advantages of deploying it.
|
- Implementing Snort: A Lightweight Intrusion Detection System
- Jun 15, 2001
- In this second of a two-part series of articles on Snort, the multiplatform Intrusion Detection System, Joseph Dries walks you through the complicated steps of its implementation.
|
- Introducing Microsoft ISA Server 2000
- May 25, 2001
- Microsoft product expert Curt Simmons introduces you to ISA Server, Microsoft's new Internet acceleration and security product.
|
- Secret Key Assurances
- May 18, 2001
- The authors review the concept of assurances in cryptography and examine three other necessary electronic data assurances -- authentication, integrity, and nonrepudiation.
|
- Pioneering Public Key: Public Exchange of Secret Keys
- May 18, 2001
- Learn the answer to the secret key delivery problem has plagued cryptographers, governments, and kings for thousands of years.
|
- Understanding Locks and Keys in Cryptography
- May 18, 2001
- Cryptography is both the lock and the combination (or key) that can be used to help protect your data. There are a variety of cryptographic methods and keys. Together, the method and the key determine cryptographic security.
|
- Resource Inventory
- May 12, 2001
In this sample chapter, IT security expert Donald Pipkin addresses the resource inventory aspect of information security ...
|
- What to Do After the Break-in: Preparing an Incident Report for Law Enforcement
- May 11, 2001
- When you're the victim of cybercrime, it's important to cover your bases with solid documentation and contact with law enforcement officials. Kyle Cassidy walks you through the steps to take to ensure your best chance of a successful case.
|
- Using Apache with SSL
- May 11, 2001
- One of the best additions that you can make to your server room is to include the Apache Web server on a Linux machine. In this article, Robert Napier explains how to build your own secure Apache server with the Secure Socket Layer (SSL) protocol.
|
- Public Key Technology in Windows 2000
- Mar 30, 2001
- Windows 2000 has a built-in PKI infrastructure. Here, the authors discuss PKI architecture, interoperability issues, and applications that use Windows 2000’s PKI infrastructure.
|
- CryptoNugget
- Feb 23, 2001
- Cryptography is a minor hobby of author Richard Heathfield. He has written this article in much the same way that he might have written for his book, C Unleashed, and he hopes you'll find it diverting and send you to the book for more!
|
- Basic Virtual Private Network Deployment
- Jan 19, 2001
- Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
|
- Internet Security for Your LAN
- Dec 13, 2000
- The Internet is often called cyberspace to both distinguish and compare it from the real-world space we live in. There are unfortunate parallels in cyberspace to the evils in the real world, so you need to be concerned about attacks on your computers ...
|
- Security Concepts
- Dec 13, 2000
- Learn the most common sources of intrusion attempts, and what types of security you need to prevent intruders from gaining unauthorized access to or use of your computing infrastructure.
|