Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

661 Items

Sort by Date | Title

Understanding the New A+ Security Objectives
By Mark Edward Soper
Jan 6, 2010
Mark Edward Soper provides a useful overview of the new Security objectives in both of the A+ Certification exams.
System Protection with SMF
By Sun Microsystems Security Engineers
Dec 22, 2009
This chapter shows you how to configure four programs—NFS, IP filter, FTP, and the Apache2 Web server — as SMF services.
Software [In]security: You Really Need a Software Security Group
By Gary McGraw
Dec 21, 2009
Gary McGraw explains why having a software security group is necessary for a software security initiative.
Top 4 Software Development Protection Techniques and How to Defeat Them
By Christian Collberg, Shawna McAlearney, Jasvir Nagra
Dec 7, 2009
Knowing weaknesses in different protection methods can help you choose the best techniques to safeguard your intellectual property.
Exploiting phpMyadmin: How to Get root in 15 Easy Steps
By Seth Fogie
Nov 20, 2009
Security expert Seth Fogie provides you with a real-world illustration of a how a simple overlooked account can lead to root access.
Software [In]security: BSIMM Europe
By Gary McGraw, David Harper, Matias Madou, Florence Mottay
Nov 10, 2009
Security expert Gary McGraw and team introduce BSIMM Europe and compare some of its initial results to the original BSIMM data.
Software [In]security: Startup Lessons
By Gary McGraw
Oct 22, 2009
Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
Vanish: Email that Disappears After Sending - A Review
By A. Lizard
Oct 1, 2009
Technology expert A. Lizard offers a how-to on Vanish, software the makes your files disappear forever.
Software [In]security: BSIMM Begin
By Gary McGraw, Sammy Migues
Sep 24, 2009
Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
Locking Down a Shared or Public PC with SteadyState
By Eric Geier
Aug 28, 2009
Eric Geier helps you discover how the free Microsoft SteadyState utility can help secure and manage a multiuser PC.
Software [In]security: Attack Categories and History Prediction
By Gary McGraw
Aug 25, 2009
Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
What Is Surreptitious Software?
By Christian Collberg, Jasvir Nagra
Aug 11, 2009
Christian Collberg and Jasvir Nagra discuss the basic techniques used to protect secrets stored in software.
Proactive Intrusion Prevention and Response via Attack Graphs
By Ryan Trost
Jul 27, 2009
This chapter describes the latest advances in an innovative proactive approach to network security called Topological Vulnerability Analysis.
Tips to Secure Your Small Business Wi-Fi Network
By Eric Geier
Jul 21, 2009
Eric Geier presents twelve critical tips to consider when securing a small business wireless network.
Software [In]security: Moving U.S. Cybersecurity Beyond Cyberplatitudes
By Gary McGraw
Jul 16, 2009
Gary McGraw discusses how the current U.S. administration needs to make some important progress on cybersecurity rather than simply offering more platitudes.
Tips to Secure Your Home Wi-Fi Network
By Eric Geier
Jul 10, 2009
Eric Geier points out important steps beyond encryption to secure your home Wi-Fi network.
Why IT Pros Need to Learn About IPv6 Security Now: An Interview with Scott Hogg and Eric Vyncke
By Linda Leung, Scott Hogg, Eric Vyncke
Jul 4, 2009
Linda Leung talks with Scott Hogg and Eric Vyncke about IPv6 transition and security issues.
Network Security Inside and Out: An Interview with Arvind Durai and Ray Blair
By Linda Leung, Ray Blair, Arvind Durai
Jul 1, 2009
Arvind Durai and Ray Blair talk about the current landscape for enterprise security.
Software [In]security: Measuring Software Security
By Gary McGraw, Jim Routh
Jun 18, 2009
Gary McGraw and Jim Routh describe the value positioning of a successful software security initiative instituted at a large financial services firm.
Cisco IOS XR Security
By Dawit Birhanu, Mark Ghattas, Syed Natif Nawaz, Mobeen Tahir
Jun 15, 2009
This chapter discusses the security aspects of the Cisco IOS XR operating system.

<< < Prev Page 4 5 6 7 8 Next >