- Forming and Managing an Incident Response Team
- Mar 22, 2002
- This sample chapter delves into forming and managing an incident response team - what a response team is, the rationale for forming an incident response team, major issues that must be addressed, and special management considerations.
|
- Fuzzing Frameworks
- Nov 16, 2007
- The authors of Fuzzing explore a number of open source fuzzing frameworks available today, including SPIKE, Autodafé, and GPF.
|
- Gaining Access to Target Systems Using Application and Operating System Attacks
- Nov 21, 2007
- This sample chapter explores basic and advanced techniques for gaining access by manipulating applications and operating systems.
|
- Game Hacking 101
- Nov 21, 2007
- Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.
|
- Getting Owned: The USB Keystroke Injection Attack
- Oct 6, 2010
- What do you call a USB-based device that can bypass all AV and autorun policies? Although most would consider it a perfect mischievous attack vector, Hyundai has used it as a tool to build customer loyalty. This leaves Seth Fogie wondering: Are people planning to use this technology maliciously?
|
- Home Network Vulnerabilities: Spam, Cookies, Pop-Ups, Spyware, and Scams
- Jul 1, 2005
- In addition to viruses and worms, there are some other annoying programs and files out there that you need to protect your home network from. This chapter focuses on spam, cookies, spyware, and scams—what they are, how they work, and how to get rid of or at least control them.
|
- Honeynet Project: The Battleground
- Nov 2, 2001
- This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes the genesis of the Honeynet Project.
|
- Honeynet Project: What a Honeynet Is
- Nov 2, 2001
- This sample chapter from Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community describes how Honeynet operating systems and applications are identical to real systems, which lets the Honeynet Project group ...
|
- Identity Theft: Criminal Behavior Meets the Information Age
- Aug 20, 2004
- In our consumer culture/information society, identity is the key to getting credit, which helps with large-ticket purchases such as cars, homes, and a college education. But the free flow of information has made it easier for the seedier side of human nature to show its ugly face, as criminals get sophisticated enough to steal your very person.
|
- Information Gathering: Who Wants to Know What about Whom?
- Apr 19, 2002
- How much are you willing to pay for convenience? Not just money and time, but information? Two privacy experts help you decide how much information is too much information to give.
|
- Information Security Bookshelf, Part 1 (2009 Edition)
- May 8, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security.
|
- Information Security Bookshelf, Part 2 (2009 Edition)
- May 18, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
|
- Information Security Bookshelf: Part 1 (2011 Edition)
- Dec 6, 2010
- In this first part of a two-part series on information security books, Ed Tittel compiles a collection of pointers to useful and informative books on information security.
|
- Information Security Bookshelf: Part 2 (2011 Edition)
- Dec 13, 2010
- In this second part of a two-part series on information security books, Ed Tittel compiles a collection of pointers to useful and informative books on information security.
|
- Installing and Configuring TrueCrypt for Full Disk Encryption
- Nov 24, 2008
- Security expert Randy Nash describes how he deployed a FDE solution using the free, cross-platform, and open-source solution from TrueCrypt.
|
- Introducing Microsoft ISA Server 2000
- May 25, 2001
- Microsoft product expert Curt Simmons introduces you to ISA Server, Microsoft's new Internet acceleration and security product.
|
- Is There a Security Problem in Computing?
- Dec 29, 2006
- This sample chapter examines what kinds of vulnerabilities computing systems are prone to. It then considers why these vulnerabilities are exploited, who is involved, and how to prevent possible attacks on systems.
|
- It’s The End Of The World As We Know It: Why HTML Encoded e-Mail Is A Terrible Idea
- Mar 8, 2002
- Are you frustrated with HTML-encoded email? The products listed in this article by Kyle Cassidy and Joseph Dries are just a sampling of some of the solutions that are available to protect you and your privacy.
|
- Joy Riders: Mischief That Leads to Mayhem
- Oct 30, 2000
- Richard Power delves beyond the media hysteria surrounding Internet crime. He provides case studies of several important cybercrimes from the last few years, many of which have surprisingly escaped public notice. This chapter examines three cases of ...
|
- Learn Host-Based Intrusion Detection
- Apr 5, 2002
- Follow the step-by-step examples to learn how to use five major host-based intrusion detection tools: TCP Wrappers, xinetd, Tripwire, Swatch, and PortSentry.
|