Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
May 19, 2008
Seth Fogie takes an exploratory look at the XO to see what’s inside and provides a few pointers for preparing it for "enhancement."
Software [In]security: Securing Web 3.0
May 15, 2008
Gary McGraw warns that we haven't yet solved (or even considered) some of the serious security issues involved with Web 3.0.
Bluetooth Security Risks in Business
May 9, 2008
Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
Failures of Information Security: Observing the World and Asking Why
Apr 28, 2008
Andrew Stewart and Adam Shostack delve into some of the most apparent failures of information security.
Core Java Security: Class Loaders, Security Managers, and Encryption
Apr 16, 2008
Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
FISMA: Compliance vs. Security
Apr 14, 2008
Randy Nash asks this question: Does FISMA make our agencies any more secure?
Software [In]security: Paying for Secure Software
Apr 7, 2008
Gary McGraw kicks off his new monthly column by showing how the added costs of developing secure software can be more than offset by lower TCO down the road.
CCENT Exam Prep: General Network Security
Apr 2, 2008
This chapter describes common attacks and shows how to mitigate those threats based on the requirements of both the 640-802 CCNA and 640-822 ICND1 exams.
Crime, War, and B.S. in the Electronic Universe
Mar 21, 2008
Michael Kemp warns of a more insidious threat than actual information attacks: pandering to the fear of these attacks.
FlexiSPY Mobile Spyware: Monitoring Solution or Security Nightmare?
Mar 14, 2008
Seth Fogie takes a look at the mobile spyware app FlexiSPY and shows where the mobile malware world could be headed.
Tools and Strategies for Securing Hardware
Mar 14, 2008
This sample chapter discusses specific hardware security problems and provides tools and strategies for keeping your hardware secure.
CCNA Exam Cram: Advanced Catalyst Switch Operations and Configuration
Feb 29, 2008
Quick, concise information and study tips for Spanning Tree Protocol, VLANs, inter-switch connectivity using trunks, and Inter-VLAN routing options.
Scanning Tools: How Many Do We Really Need?
Feb 8, 2008
Randy Nash shares his opinion on the need for scanning tools.
C Language Issues for Application Security
Jan 25, 2008
How you use C could adversely affect an application's security and robustness.
The Real Cost of Insecure Software: The Foundation of Civilization
Dec 28, 2007
David Rice discusses the perilous state of software security in this introduction to his book, Geekonomics.
Visualization: How to Present Security Data to Get Your Point Across
Dec 21, 2007
Learn how to present security data in a style that truly gets your point across.
The Benefits of Hacking Embedded Devices
Dec 14, 2007
Paul Asadoorian describes why you'd want to "hack" embedded devices and which hardware and firmware choices are the best.
Pandemic Outbreak and the Impact of Quarantine on Business Operations
Dec 7, 2007
Randy Nash looks at the historical impact of pandemic outbreaks, the preparation and planning that has taken place, and the potential impact that could be expected.
Endpoint Security: What's Missing?
Nov 30, 2007
Mark Kadrich describes a new process that will help us understand how our network technology interacts with our security technology.
Game Hacking 101
Nov 21, 2007
Gary McGraw and Greg Hoglund describe discuss techniques to prevent piracy and cheating in online games.

<< < Prev Page 8 9 10 11 12 Next >