Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Computer Incident Response and Product Security: Operating an Incident Response Team
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
Computer Security and Statistical Databases
By William Stallings
Aug 17, 2007
Bill Stallings looks at the unique security issues that relate to statistical databases.
Configuration for Transparently Redundant Firewalls
Sep 21, 2001
It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
Configuring OpenSSH for the Solaris Operating Environment
Mar 22, 2002
This article deals with server and client configurations, key management, and integration into existing environments for the Solaris Operating Environment (OE).
Configuring SSL on BEA WebLogic Server 8.1
Apr 29, 2005
Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
Configuring the Cisco PIX Firewall for CA Site-to-Site
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
Configuring the PIX Firewall for SSH (Secure Shell)
Feb 15, 2002
Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
Configuring the Secure Shell
Nov 12, 2004
This chapter will help you configure SSH for your company to the security specifications of your particular network.
Content Security with Check Point Firewall-1
Oct 29, 2004
Content Security provides additional control over what can be accessed through your firewalls. In this sample chapter, Dameon D. Welch-Abernathy explains how to manage content security with Check Point Firewall-1.
Converting Sendmail to Postfix, Part One: Why Convert?
Dec 28, 2001
If you have a UNIX or Linux-based mail server, Postfix may be of interest to you. Read this first in a two-part series to find out why.
Converting Sendmail to Postfix, Part Two: Configuring Postfix
Dec 28, 2001
How do you use the mail server Postfix? This second of two articles covers some basic configuration scenarios.
Core Elements of the Cisco Self-Defending Network Strategy
May 27, 2005
Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
Core Java Security: Class Loaders, Security Managers, and Encryption
Apr 16, 2008
Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
Corporate Governance, Business Continuity Planning, and Disaster Recovery
Dec 1, 2005
To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
Covert Java: Hacking Non-Public Methods and Variables of a Class
Jun 4, 2004
Learn to hack non-public methods and variables of a class. Alex Kalinovsky covers the problem of encapsulation, accessing packages and protected class members, and accessing private class members.
Covert Java: Obfuscating Classes
Jul 30, 2004
Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
Cracking Wi-Fi Protected Access (WPA), Part 1
Mar 4, 2005
In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
Cracking Wi-Fi Protected Access (WPA), Part 2
Mar 11, 2005
Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
Creating a Secure Development Framework
Aug 27, 2004
Business applications can be weak spots in an otherwise secure network, but in this article, Glyn Geoghegan explains how to keep your applications as secure the rest of your IT infrastructure.
Creating an Information Security Policy
Nov 16, 2001
Scott Barman discusses how to create an information security policy that can be the basis for sound virus protection on your organization's network.

<< < Prev Page 4 5 6 7 8 Next >