Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Data Leakage During a Time of Economic Recession
May 25, 2011
Brad Bowers looks at some of the causes of data leakage and how a weak economy may increase the risks.
Data Loss and Full Disk Encryption
May 30, 2008
Randy Nash discusses the patterns of data loss, security policy, full disk vs. folder encryption, and vulnerabilities related to volatile memory.
Data Theft: How Big a Problem?
Jun 30, 2008
Michael Miller discusses how data theft happens, where the data goes, and to what extent it is a problem.
DB2 Universal Database Security
Dec 23, 2003
Nine percent of the DB2 UDB V8.1 Family Fundamentals certification exam (Exam 700) is designed to test your knowledge about the mechanisms DB2 Universal Database uses to protect data and database objects against unauthorized access and modification. This chapter introduces you to the authorization levels and privileges of the DB2 Universal Database.
Defending Your Log Files
Sep 28, 2001
To mount an effective security defense, preventing attackers from altering logs is critical. Ed Skoudis shows you some tactics to employ here.
Deitel Presents An Introduction to Denial-of-Service Attacks in Perl
May 1, 2002
Deitel™ introduces Perl security and Denial-of-Service attacks. Readers should be familiar with Perl programming, regular expressions, basic CGI, basic file processing and an understanding of HTTP requests and responses.
Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
May 20, 2009
Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
Deploying Secure Internet Connectivity with Cisco ASA and PIX Firewalls
Aug 5, 2005
This chapter provides you with the necessary information to use the ASDM Startup Wizard to perform the initial configuration of your network. It provides a step-by-step procedure explaining how to use the ASDM Startup Wizard to set up the initial configuration for your ASA/PIX Security Appliance.
Designing Strategies for Security Management
Jul 23, 2004
With an eye towards passing the MSCE 70-298 Exam, Bill Ferguson and Ed Tittel explain the ins and outs of managing network security, and the tools that you can use to maintain security on a Windows Server 2003 Network. Included are several sample questions with detailed answers to help you prepare for the exam.
Desktop Search Tools - A Security Investigator's New Best Friend
Oct 26, 2007
John Tränkenschuh gives a brief demonstration of a desktop search tool that can be used by security professionals.
Details Emerge on the First Windows Mobile Virus (Part 1 of 3)
Sep 3, 2004
This three-part series by Cyrus Peikari, Seth Fogie, and Ratter/29A discusses the development of viruses for the Windows Mobile platform. Part 1 describes the first, WinCE4.Dust.
Details Emerge on the First Windows Mobile Virus (Part 2 of 3)
Sep 10, 2004
In part II we hear from Ratter, the author of the first proof-of-concept virus for Windows Mobile. He begins by tracing the history of how he came into virus research.
Details Emerge on the First Windows Mobile Virus (Part 3 of 3)
Sep 17, 2004
This series concludes with Ratter describing the creation of WinCE4.Dust.
Detecting DDOS and Other Security Problems
Feb 6, 2004
Some developers think the problem of DDOS attacks has no solution, but you can reduce your risk with a unique application of existing technology. John Mueller shows you how you can detect a breach in your application before it becomes a major problem, so at least you can close the door on intruders.
Detecting Signs of Intrusion
Dec 28, 2001
This sample chapter should help you detect intrusions by looking for unexpected or suspicious behavior and "fingerprints" of known intrusion methods.
Developing a Continuity-of-Operations Plan
Jul 26, 2002
September 11, 2001 put a whole new spin on "rainy days" and heightened our awareness as to what really needs to be done to prepare for the unexpected. Learn about a methodology for developing an effective continuity-of-operations plan to meet any eventuality.
Developing a Security Policy
Mar 15, 2002
Security policy development is a frequently overlooked component of overall security architectures. This article details the importance of security policies and the basic steps involved in their creation.
Developing Network Security Strategies
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
Developing Secure Applications Through Aspect-Oriented Programming
Nov 18, 2004
This chapter provides helpful information on using aspect-oriented programming to develop security components for distributed applications. The effectiveness of AOP technology is demonstrated with two application-level security problems that illustrate the utility of this technology.
Developing Your Information Security Program
Dec 10, 2004
This chapter introduces the core concepts that you should consider when building a new security program or improving an existing one. Both of these tasks require a solid plan and diligent attention to details. Using the methodologies introduced in this chapter, you can begin to create that plan.

<< < Prev Page 6 7 8 9 10 Next >