Home > Articles > Security > Software Security

Software Security

124 Items

Sort by Date | Title

An Overview of Computer Security
Jan 31, 2003
Break down computer security into each of its components and see how each one contributes to a vulnerable system or network.
Donald Pipkin's Security Tips for the Week of December 23rd
Dec 20, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Donald Pipkin's Security Tips for the Week of December 16th
Dec 13, 2002
Take a tip from Don Pipkin, HP security expert and author of "Halting the Hacker: A Practical Guide to Computer Security".
Donald Pipkin's Security Tips for the Week of December 9th
Dec 6, 2002
See the big picture with security expert Don Pipkin, and weigh the risks and benefits to develop the most sensible security for your organization.
Donald Pipkin's Security Tips for the Week of December 2nd
Nov 29, 2002
Systems and network managers — combat potentially costly security threats with advice from HP security expert Don Pipkin.
Donald Pipkin's Security Tips for the Week of November 25th
Nov 22, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Stuart McClure's Daily Security Tips for the Week of November 18th
Nov 15, 2002
Combat potentially costly security threats with advice from security expert and Foundstone CTO Stu McClure.
Stuart McClure's Daily Security Tips for the Week of November 11th
Nov 8, 2002
Take a tip from Stuart McClure, the lead author of the best-selling, critically acclaimed security book, "Hacking Exposed." This week, Stu shares some web security tips for systems and network managers.
Stuart McClure's Daily Security Tips for the Week of November 4th
Nov 1, 2002
Systems and network managers — combat potentially costly security threats with advice from Foundstone's Stu McClure.
Warez All that Pirated Software Coming From?
Nov 1, 2002
In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay.
Stuart McClure's Daily Security Tips for the Week of October 28th
Oct 25, 2002
More hot tips from world-renowned security expert Stuart McClure! This week, Stu shares some web security tips for developers and network managers.
Stuart McClure's Daily Security Tips for the Week of October 21st
Oct 18, 2002
Take a tip from Stuart McClure, the lead author of the best-selling, critically acclaimed security book, "Hacking Exposed." This week, Stu shares some web security tips for vendors and developers.
Digital Cryptography: A Subtle Art
Aug 30, 2002
Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
Deitel Introduces the Java Cryptography Extension
Aug 16, 2002
This Deitel™ article introduces the Java Cryptography Extension, providing an example that demonstrates Password-Based Encryption. Readers should be familiar with Java and advanced Java topics.
Secret Key Cryptography
Jun 7, 2002
Learn the basics of secret key cryptography. This excerpt discusses data-scrambling techniques used in early cryptographic systems and elaborates on the concepts employed in modern cryptosystems. It also describes well-known contemporary algorithms and discusses the security services enabled through secret key cryptography.
Upgrading Software Development Security
Apr 5, 2002
Information security expert Scott Barman discusses how to create a secure development program within an existing software development process. Organizations such as Microsoft may need to consider such policies in their heightened concentration on security.
Writing Mobile Code Policies
Apr 5, 2002
Information security expert Scott Barman discusses how to think about and create a policy on using mobile code that will work within the security infrastructure of your organization's network environment.
Configuring the PIX Firewall for SSH (Secure Shell)
Feb 15, 2002
Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
Computer Forensics: Tracking an Offender
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Secret Key Assurances
May 18, 2001
The authors review the concept of assurances in cryptography and examine three other necessary electronic data assurances -- authentication, integrity, and nonrepudiation.

<< < Prev Page 3 4 5 6 7 Next >