- Computer Incident Response and Product Security: Operating an Incident Response Team
- Dec 17, 2010
- This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
|
- Computer Security and Statistical Databases
-
By
William Stallings
- Aug 17, 2007
- Bill Stallings looks at the unique security issues that relate to statistical databases.
|
- Configuration for Transparently Redundant Firewalls
- Sep 21, 2001
- It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
|
- Configuring OpenSSH for the Solaris Operating Environment
- Mar 22, 2002
- This article deals with server and client configurations, key management, and integration into existing environments for the Solaris Operating Environment (OE).
|
- Configuring SSL on BEA WebLogic Server 8.1
- Apr 29, 2005
- Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
|
- Configuring the Cisco PIX Firewall for CA Site-to-Site
- Dec 28, 2001
- This sample chapter explains how to configure Cisco Secure PIX Firewall certificate
authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
|
- Configuring the PIX Firewall for SSH (Secure Shell)
- Feb 15, 2002
- Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
|
- Configuring the Secure Shell
- Nov 12, 2004
- This chapter will help you configure SSH for your company to the security specifications of your particular network.
|
- Content Security with Check Point Firewall-1
- Oct 29, 2004
- Content Security provides additional control over what can be accessed through your firewalls. In this sample chapter, Dameon D. Welch-Abernathy explains how to manage content security with Check Point Firewall-1.
|
- Converting Sendmail to Postfix, Part One: Why Convert?
- Dec 28, 2001
- If you have a UNIX or Linux-based mail server, Postfix may be of interest to you. Read this first in a two-part series to find out why.
|
- Converting Sendmail to Postfix, Part Two: Configuring Postfix
- Dec 28, 2001
- How do you use the mail server Postfix? This second of two articles covers some basic configuration scenarios.
|
- Core Elements of the Cisco Self-Defending Network Strategy
- May 27, 2005
- Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
|
- Core Java Security: Class Loaders, Security Managers, and Encryption
- Apr 16, 2008
- Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
|
- Corporate Governance, Business Continuity Planning, and Disaster Recovery
- Dec 1, 2005
- To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.
|
- Covert Java: Hacking Non-Public Methods and Variables of a Class
- Jun 4, 2004
- Learn to hack non-public methods and variables of a class. Alex Kalinovsky covers the problem of encapsulation, accessing packages and protected class members, and accessing private class members.
|
- Covert Java: Obfuscating Classes
- Jul 30, 2004
- Obfuscation can help prevent the hacking of your Java code, but how does it work? Alex Kalinovsky explains the most common methods and how they can help protect your intellectual property in this chapter.
|
- Cracking Wi-Fi Protected Access (WPA), Part 1
- Mar 4, 2005
- In this two-part series, Seth Fogie examines the internals of WPA and demonstrates how this wireless protection method can be cracked with only four packets of data. Part 1 outlines the details of WPA as compared to WEP and builds the foundation for Part 2, in which he describes in detail how WPA-PSK can be cracked.
|
- Cracking Wi-Fi Protected Access (WPA), Part 2
- Mar 11, 2005
- Concluding his two-part series, Seth Fogie describes in detail how WPA-PSK can be cracked.
|
- Creating a Secure Development Framework
- Aug 27, 2004
- Business applications can be weak spots in an otherwise secure network, but in this article, Glyn Geoghegan explains how to keep your applications as secure the rest of your IT infrastructure.
|
- Creating an Information Security Policy
- Nov 16, 2001
- Scott Barman discusses how to create an information security policy that can be the basis for sound virus protection on your organization's network.
|