Home > Articles > Security > Network Security
Network Security
663 Items
Sort by Date | Title
- Software [In]security: Measuring Software Security
- Jun 18, 2009
- Gary McGraw and Jim Routh describe the value positioning of a successful software security initiative instituted at a large financial services firm.
|
- Cisco IOS XR Security
- Jun 15, 2009
- This chapter discusses the security aspects of the Cisco IOS XR operating system.
|
- Top 10 Social Engineering Tactics
- Jun 11, 2009
- Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
|
- The Tools and Mindset of Cyber Stalkers
- Jun 10, 2009
- This chapter shares not only the tools of cyber criminals, but in the case of cyber stalkers, it explains how they think.
|
- Network Security Using Cisco IOS IPS
- Jun 8, 2009
- This chapter describes the functions and operations of IDS and IPS systems.
|
- IPv6 Internet Security for Your Network
- Jun 4, 2009
- This chapter covers how to secure your network when it is connected to the IPv6 Internet.
|
- Online Security: A Quest to Be One Step Ahead of the Bad Guys
- May 29, 2009
- Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
|
- Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
- May 20, 2009
- Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
|
- Information Security Bookshelf, Part 2 (2009 Edition)
- May 18, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
|
- Software [In]security: Twitter Security
- May 15, 2009
- Gary McGraw details Twitter's fundamental security vulnerabilities.
|
- Information Security Bookshelf, Part 1 (2009 Edition)
- May 8, 2009
- Ed Tittel compiles a collection of pointers to useful and informative books on information security.
|
- Passwords: So Important, Yet So Misused
- May 1, 2009
- Microsoft MVP and CISSP-ISSAP John Traenkenschuh illustrates basic password best practices.
|
- Software [In]security: Software Security Comes of Age
- Apr 16, 2009
- Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
|
- SQL Server Forensic Investigation Scenario
- Apr 13, 2009
- This chapter walks through an actual forensic investigation scenario, showing the logical progression of events during an investigation.
|
- Chained Exploits: Discover What Your Boss Is Looking At
- Apr 10, 2009
- Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
- Mar 31, 2009
- Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
|
- Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
- Mar 23, 2009
- Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
|
- Software [In]security: The Building Security In Maturity Model (BSIMM)
- Mar 16, 2009
- The creators of the Building Security In Maturity Model describe the benefits of using it as a yardstick for measuring your own software security initiative.
|
- Software [In]security: Nine Things Everybody Does: Software Security Activities from the BSIMM
- Feb 9, 2009
- Examine the nine common software security activities that make up the Building Security In Maturity Model (BSIMM).
|
- Top 5 Security Resolutions for New PCs
- Jan 28, 2009
- Randy Nash discusses common security practices we should all follow when setting up new gear.
|