Home > Articles > Security > Network Security

Network Security

663 Items

Sort by Date | Title

Software [In]security: Measuring Software Security
Jun 18, 2009
Gary McGraw and Jim Routh describe the value positioning of a successful software security initiative instituted at a large financial services firm.
Cisco IOS XR Security
Jun 15, 2009
This chapter discusses the security aspects of the Cisco IOS XR operating system.
Top 10 Social Engineering Tactics
Jun 11, 2009
Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
The Tools and Mindset of Cyber Stalkers
Jun 10, 2009
This chapter shares not only the tools of cyber criminals, but in the case of cyber stalkers, it explains how they think.
Network Security Using Cisco IOS IPS
Jun 8, 2009
This chapter describes the functions and operations of IDS and IPS systems.
IPv6 Internet Security for Your Network
Jun 4, 2009
This chapter covers how to secure your network when it is connected to the IPv6 Internet.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
May 20, 2009
Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
Information Security Bookshelf, Part 2 (2009 Edition)
May 18, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
Software [In]security: Twitter Security
May 15, 2009
Gary McGraw details Twitter's fundamental security vulnerabilities.
Information Security Bookshelf, Part 1 (2009 Edition)
May 8, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security.
Passwords: So Important, Yet So Misused
May 1, 2009
Microsoft MVP and CISSP-ISSAP John Traenkenschuh illustrates basic password best practices.
Software [In]security: Software Security Comes of Age
Apr 16, 2009
Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
SQL Server Forensic Investigation Scenario
Apr 13, 2009
This chapter walks through an actual forensic investigation scenario, showing the logical progression of events during an investigation.
Chained Exploits: Discover What Your Boss Is Looking At
Apr 10, 2009
Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
Mar 31, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
Mar 23, 2009
Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
Software [In]security: The Building Security In Maturity Model (BSIMM)
Mar 16, 2009
The creators of the Building Security In Maturity Model describe the benefits of using it as a yardstick for measuring your own software security initiative.
Software [In]security: Nine Things Everybody Does: Software Security Activities from the BSIMM
Feb 9, 2009
Examine the nine common software security activities that make up the Building Security In Maturity Model (BSIMM).
Top 5 Security Resolutions for New PCs
Jan 28, 2009
Randy Nash discusses common security practices we should all follow when setting up new gear.

<< < Prev Page 5 6 7 8 9 Next >