- Network Security First-Step: Firewalls
- Feb 8, 2012
- This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
|
- Cyber Stalking, Fraud, and Abuse
- Feb 1, 2012
- This chapter explores what the various major types of internet fraud are, what the law says, and what you can do to protect yourself.
|
- Software [In]security: vBSIMM Take Two (BSIMM for Vendors Revised)
- Jan 26, 2012
- Gary McGraw and Sammy Migues introduce a revised, compact version of the BSIMM for vendors called vBSIMM, which can be thought of as a foundational security control for vendor management of third-party software providers.
|
- How TCP/IP Works
- Jan 18, 2012
- This chapter describes the TCP/IP protocol system and shows how the components of TCP/IP work together to send and receive data across the network.
|
- ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
- Jan 9, 2012
- Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
|
- Functional Deployment Models and Call Flows for Cisco Unified Customer Voice Portal
- Jan 3, 2012
- This chapter discusses some of Cisco Unified Customer Voice Portal's well-defined and commonly referenced functional deployment models.
|
- Secure Your iPad 2 Now!
- Dec 28, 2011
- Is your iPad 2 reasonably secured right out of the box? Maybe not. Security specialist John Traenkenschuh, CISSP-ISSAP, provides sensible, flexible security patterns for the iPad 2.
|
- Software [In]security: BSIMM versus SAFECode and Other Kaiju Cinema
- Dec 26, 2011
- Gary McGraw and Sammy Migues clarify the intended use of the Building Security In Maturity Model (BSIMM) and compare it to the SAFECode Practices methodology.
|
- CCNA ICND2 Cert Guide: Variable Length Subnet Masks
- Dec 19, 2011
- This chapter introduces VLSM, including VLSM Concepts and Configuration, Finding VLSM Overlaps, Adding New Subnets to an Existing VLSM Design, and Designing a Subnetting Plan Using VLSM.
|
- LAN Network Cable Media and Connectors
- Dec 19, 2011
- This article takes a look at the LAN network cable media that is typically installed in most environments and the different connectors that are often used.
|
- Secure Your Linux Workstation Now!
- Dec 12, 2011
- Security writer John "Tränk" Traenkenschuh, CISSP-ISSAP, explores several easy-to-use security improvements you can make to your Linux workstation, using two very popular distributions as models: Ubuntu 11.10 and Fedora 15.
|
- Network Diagram Creation and Interpretation
- Dec 5, 2011
- This article is intended to be a primer on network diagrams, what the common symbols are, how the symbols are connected and how to interpret the different connectors on a diagram.
|
- PKI: Broken, But Fixable
- Nov 30, 2011
- The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
|
- Software [In]security: Third-Party Software and Security
- Nov 30, 2011
- How do you gauge the security of third-party code? A recent security conference examined that question, and Gary McGraw presents the findings in this article.
|
- Connecting Your MacBook to a Network
- Nov 28, 2011
- In this chapter, you’ll learn how to get your MacBook online including tasks like connecting to wired and wireless networks, iPhones, VPNs and more.
|
- TCP: The Transmission Control Protocol (Preliminaries)
- Nov 24, 2011
- This chapter provides background regarding the issues affecting reliable delivery in general. It shows how those issues play out in TCP and what type of service it provides to Internet applications.
|
- OSI and TCP/IP Model Layers
- Nov 22, 2011
- Because both the OSI and TCP/IP models are still used when describing modern day protocols, this article will take a look at them both, including their layers and how they can be related to each other.
|
- The TCP/IP and OSI Networking Models
- Nov 21, 2011
- This chapter explains the terminology and concepts behind TCP/IP. It also explains the terminology behind the OSI networking model in comparison to TCP/IP.
|
- Secure Your Mac OS X System Now!
- Nov 15, 2011
- John Traenkenschuh, gives his ideas on good security for your Mac OS X computer. Easy to configure and immediately useful, these ideas will help you secure your expensive device and very valuable information.
|
- CCNP: Troubleshooting OSPF
- Nov 14, 2011
- In this article, Anthony Sequeira discusses basic troubleshooting steps for the complex, link-state routing protocol Open Shortest Path First (OSPF).
|