Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Dial Backup for IPSec Tunnels
Sep 21, 2001
Network availability in a VPN environment can be significantly enhanced through support of redundant communications links, either in the form of VPNs through other ISPs or, as discussed in this article, via dial backup.
Digital Cryptography: A Subtle Art
Aug 30, 2002
Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
Dissecting Snort
Sep 12, 2003
Learn the function of the internal components of Snort to help you customize the system to your network and help you avoid some of the common Snort pitfalls.
Donald Pipkin's Security Tips for the Week of December 16th
Dec 13, 2002
Take a tip from Don Pipkin, HP security expert and author of "Halting the Hacker: A Practical Guide to Computer Security".
Donald Pipkin's Security Tips for the Week of December 23rd
Dec 20, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Donald Pipkin's Security Tips for the Week of December 2nd
Nov 29, 2002
Systems and network managers — combat potentially costly security threats with advice from HP security expert Don Pipkin.
Donald Pipkin's Security Tips for the Week of December 9th
Dec 6, 2002
See the big picture with security expert Don Pipkin, and weigh the risks and benefits to develop the most sensible security for your organization.
Donald Pipkin's Security Tips for the Week of November 25th
Nov 22, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
DoS Attacks! How to Protect Your Windows 2003 Server
Mar 4, 2005
As long as there are TCP/IP packet transmissions, those pesky DoS (denial of service) attacks are here to stay. You'd better understand how these attacks happen and learn to harden your Windows 2003 Server against them. Jesse Smith gives you information and encouragement.
EAP Authentication Protocols for WLANs
Feb 18, 2005
This chapter examines the authentication methods: EAP, PEAP, LEAP, and the newer, emerging paradigm EAP-FAST, and weighs the pros and cons of each, in terms of standardization maturity and effectiveness.
Ed Skoudis' Favorite Computer Books
Apr 25, 2003
Find out what books are sitting on renowned SANS security lecturer Ed Skoudis' bookshelf.
Effective Incident Response: The Puzzle in Action
Feb 27, 2004
This chapter focuses on the operational aspects of computer incident response. The authors describe considerations that should be given to specific incident-handling procedures. This information can then be used to write computer incident policies and procedures.
EFS Issues in Windows XP/2003
Jun 25, 2004
Compared to Windows 2000, the new implementation of the Encrypting File System (EFS) in Windows XP/2003 has some pitfalls. Zubair Alexander examines these issues and provides some pointers for planning an EFS strategy for your business environment.
Email Security Policies
Feb 1, 2002
The insecure nature of email requires special policy considerations. From archiving to content guidelines, organizations have much to consider when writing email policies.
Emerging Trends in RFID
Feb 11, 2005
This chapter takes stock of where RFID technology stands today, discusses the recent innovations around RFID, and examines key factors that will influence its evolution.
Encrypting E-Mail Data
Aug 27, 2001
The GNU Privacy Guard's quick-and-dirty encryption capabilities have made it an international success with many popular e-mail clients. In this article, Aron Hsiao teaches you how to use this tool for encrypting e-mail.
Encryption 101: Keys, Algorithms and You
Feb 15, 2011
Mike Chapple shows how to protect confidential information via encryption, and teaches the basics when it comes to selecting an encryption technology.
Endpoint Security: What's Missing?
Nov 30, 2007
Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
Enterprise Java Security Fundamentals
Apr 30, 2004
The J2EE security model addresses authentication, authorization, delegation, and data integrity for the components that make up a J2EE environment. This environment includes J2EE applications—Web components, such as servlets and JSP files, EJB components, Java 2 connectors, and JavaMail—and secure interoperability requirements. If all that sounds like buzzword bingo to you, then this sample book chapter will help you grasp the essentials.
Evaluating Your Firewall
Feb 11, 2005
John Traenkenschuh considers some of the basic problems confronting firewall administrators. What's the point of having a firewall, if it can't keep intruders out? And what are some of the business and networking issues that cause firewalls to fail at their duty?

<< < Prev Page 7 8 9 10 11 Next >