- Data Leakage During a Time of Economic Recession
- May 25, 2011
- Brad Bowers looks at some of the causes of data leakage and how a weak economy may increase the risks.
|
- Data Loss and Full Disk Encryption
- May 30, 2008
- Randy Nash discusses the patterns of data loss, security policy, full disk vs. folder encryption, and vulnerabilities related to volatile memory.
|
- Data Theft: How Big a Problem?
- Jun 30, 2008
- Michael Miller discusses how data theft happens, where the data goes, and to what extent it is a problem.
|
- DB2 Universal Database Security
- Dec 23, 2003
- Nine percent of the DB2 UDB V8.1 Family Fundamentals certification exam (Exam 700) is designed to test your knowledge about the mechanisms DB2 Universal Database uses to protect data and database objects against unauthorized access and modification. This chapter introduces you to the authorization levels and privileges of the DB2 Universal Database.
|
- Defending Your Log Files
- Sep 28, 2001
- To mount an effective security defense, preventing attackers from altering logs is critical. Ed Skoudis shows you some tactics to employ here.
|
- Deitel Presents An Introduction to Denial-of-Service Attacks in Perl
- May 1, 2002
- Deitel introduces Perl security and Denial-of-Service attacks. Readers should be familiar with Perl programming, regular expressions, basic CGI, basic file processing and an understanding of HTTP requests and responses.
|
- Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
- May 20, 2009
- Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
|
- Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
- Aug 5, 2005
- This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
|
- Designing Strategies for Security Management
- Jul 23, 2004
- With an eye towards passing the MSCE 70-298 Exam, Bill Ferguson and Ed Tittel explain the ins and outs of managing network security, and the tools that you can use to maintain security on a Windows Server 2003 Network. Included are several sample questions with detailed answers to help you prepare for the exam.
|
- Desktop Search Tools - A Security Investigator's New Best Friend
- Oct 26, 2007
- John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
|
- Details Emerge on the First Windows Mobile Virus (Part 1 of 3)
- Sep 3, 2004
- This three-part series by Cyrus Peikari, Seth Fogie, and Ratter/29A discusses the development of viruses for the Windows Mobile platform. Part 1 describes the first, WinCE4.Dust.
|
- Details Emerge on the First Windows Mobile Virus (Part 2 of 3)
- Sep 10, 2004
- In part II we hear from Ratter, the author of the first proof-of-concept virus for Windows Mobile. He begins by tracing the history of how he came into virus research.
|
- Details Emerge on the First Windows Mobile Virus (Part 3 of 3)
- Sep 17, 2004
- This series concludes with Ratter describing the creation of WinCE4.Dust.
|
- Detecting DDOS and Other Security Problems
- Feb 6, 2004
- Some developers think the problem of DDOS attacks has no solution, but you can reduce your risk with a unique application of existing technology. John Mueller shows you how you can detect a breach in your application before it becomes a major problem, so at least you can close the door on intruders.
|
- Detecting Signs of Intrusion
- Dec 28, 2001
- This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
|
- Developing a Continuity-of-Operations Plan
- Jul 26, 2002
- September 11, 2001 put a whole new spin on "rainy days" and heightened our awareness as to what really needs to be done to prepare for the unexpected. Learn about a methodology for developing an effective continuity-of-operations plan to meet any eventuality.
|
- Developing a Security Policy
- Mar 15, 2002
- Security policy development is a frequently overlooked component of overall security architectures. This article details the importance of security policies and the basic steps involved in their creation.
|
- Developing Network Security Strategies
- Oct 4, 2010
- To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
|
- Developing Secure Applications Through Aspect-Oriented Programming
- Nov 18, 2004
- This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
|
- Developing Your Information Security Program
- Dec 10, 2004
- This chapter introduces the core concepts that you should consider when building a new security program or improving an existing one. Both of these tasks require a solid plan and diligent attention to details. Using the methodologies introduced in this chapter, you can begin to create that plan.
|