Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

661 Items

Sort by Date | Title

Top 10 Social Engineering Tactics
By Andrew Whitaker
Jun 11, 2009
Andrew Whitaker explains some of these common social engineering tactics used today to gain unauthorized access or acquire confidential information.
The Tools and Mindset of Cyber Stalkers
By Felicia Donovan, Kristyn Bernier
Jun 10, 2009
This chapter shares not only the tools of cyber criminals, but in the case of cyber stalkers, it explains how they think.
Network Security Using Cisco IOS IPS
By Catherine Paquet
Jun 8, 2009
This chapter describes the functions and operations of IDS and IPS systems.
IPv6 Internet Security for Your Network
By Eric Vyncke, Scott Hogg
Jun 4, 2009
This chapter covers how to secure your network when it is connected to the IPv6 Internet.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
By Linda Leung, Jamey Heary
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
Deploying Disney: How Social Engineers Take Advantage of Childhood Lessons
By Chris Nickerson
May 20, 2009
Security consultant Chris Nickerson points out that teaching from animated characters may make it easier for social attackers to get at your mind.
Information Security Bookshelf, Part 2 (2009 Edition)
By Ed Tittel
May 18, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security, part 2 of 2.
Software [In]security: Twitter Security
By Gary McGraw
May 15, 2009
Gary McGraw details Twitter's fundamental security vulnerabilities.
Information Security Bookshelf, Part 1 (2009 Edition)
By Ed Tittel
May 8, 2009
Ed Tittel compiles a collection of pointers to useful and informative books on information security.
Passwords: So Important, Yet So Misused
By John Traenkenschuh
May 1, 2009
Microsoft MVP and CISSP-ISSAP John Traenkenschuh illustrates basic password best practices.
Software [In]security: Software Security Comes of Age
By Gary McGraw
Apr 16, 2009
Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
SQL Server Forensic Investigation Scenario
By Kevvie Fowler
Apr 13, 2009
This chapter walks through an actual forensic investigation scenario, showing the logical progression of events during an investigation.
Chained Exploits: Discover What Your Boss Is Looking At
By Andrew Whitaker, Keatron Evans, Jack B. Voth
Apr 10, 2009
Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 3 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 31, 2009
Leo A. Wrobel and Sharon M. Wrobel conclude this series with a discussion of an alarming fact (disasters are on the rise) and what might be an even more alarming conclusion for disaster recovery planners (yep, you're responsible).
Are Private-Sector Organizations Responsible for Failing to Plan for Natural Disasters? (Part 2 of 3)
By Leo Wrobel, Sharon Wrobel
Mar 23, 2009
Contingency planners must adopt those new technologies - or be held responsible for failure to do so. How do these issues affect your role in emergency planning for your organization?
Software [In]security: The Building Security In Maturity Model (BSIMM)
By Gary McGraw, Brian Chess, Sammy Migues
Mar 16, 2009
The creators of the Building Security In Maturity Model describe the benefits of using it as a yardstick for measuring your own software security initiative.
Software [In]security: Nine Things Everybody Does: Software Security Activities from the BSIMM
By Gary McGraw, Brian Chess, Sammy Migues
Feb 9, 2009
Examine the nine common software security activities that make up the Building Security In Maturity Model (BSIMM).
Top 5 Security Resolutions for New PCs
By Randy Nash
Jan 28, 2009
Randy Nash discusses common security practices we should all follow when setting up new gear.
Wherever You Go, There They Are: The Perils of Cross-Site Tracking
By Greg Conti
Jan 23, 2009
Greg Conti examines the practice of cross-site tracking and offers ways to block, or at least minimize, it.
Securing PHP Web Applications: Cross-Site Scripting
By Tricia Ballad, William Ballad
Jan 22, 2009
In this chapter, the authors cover a special type of injection attack called cross-site scripting, or XSS.

<< < Prev Page 5 6 7 8 9 Next >