Home > Articles > Security > Software Security

Software Security

RSS Feed Subscribe to this topic  RSS details

124 Items

Sort by Date | Title

An Overview of Computer Security
By Matt Bishop
Jan 31, 2003
Break down computer security into each of its components and see how each one contributes to a vulnerable system or network.
Donald Pipkin's Security Tips for the Week of December 23rd
By Donald L. Pipkin
Dec 20, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Donald Pipkin's Security Tips for the Week of December 16th
By Donald L. Pipkin
Dec 13, 2002
Take a tip from Don Pipkin, HP security expert and author of "Halting the Hacker: A Practical Guide to Computer Security".
Donald Pipkin's Security Tips for the Week of December 9th
By Donald L. Pipkin
Dec 6, 2002
See the big picture with security expert Don Pipkin, and weigh the risks and benefits to develop the most sensible security for your organization.
Donald Pipkin's Security Tips for the Week of December 2nd
By Donald L. Pipkin
Nov 29, 2002
Systems and network managers — combat potentially costly security threats with advice from HP security expert Don Pipkin.
Donald Pipkin's Security Tips for the Week of November 25th
By Donald L. Pipkin
Nov 22, 2002
Take a tip from Don Pipkin, writer of "Halting the Hacker," as he shares a daily nugget of his knowledge of information security. Invest a minute of your day to learn something new about protecting your information assets.
Stuart McClure's Daily Security Tips for the Week of November 18th
By Stuart McClure
Nov 15, 2002
Combat potentially costly security threats with advice from security expert and Foundstone CTO Stu McClure.
Stuart McClure's Daily Security Tips for the Week of November 11th
By Stuart McClure
Nov 8, 2002
Take a tip from Stuart McClure, the lead author of the best-selling, critically acclaimed security book, "Hacking Exposed." This week, Stu shares some web security tips for systems and network managers.
Stuart McClure's Daily Security Tips for the Week of November 4th
By Stuart McClure
Nov 1, 2002
Systems and network managers — combat potentially costly security threats with advice from Foundstone's Stu McClure.
Warez All that Pirated Software Coming From?
By Seth Fogie
Nov 1, 2002
In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay.
Stuart McClure's Daily Security Tips for the Week of October 28th
By Stuart McClure
Oct 25, 2002
More hot tips from world-renowned security expert Stuart McClure! This week, Stu shares some web security tips for developers and network managers.
Stuart McClure's Daily Security Tips for the Week of October 21st
By Stuart McClure
Oct 18, 2002
Take a tip from Stuart McClure, the lead author of the best-selling, critically acclaimed security book, "Hacking Exposed." This week, Stu shares some web security tips for vendors and developers.
Digital Cryptography: A Subtle Art
By Donald E. Eastlake, Kitty Niles
Aug 30, 2002
Learn the basic building blocks of modern digital cryptography, what they can do for you, and how to compose them to produce useful and practical secure services.
Deitel Introduces the Java Cryptography Extension
By (Harvey & Paul) Deitel & Deitel
Aug 16, 2002
This Deitel™ article introduces the Java Cryptography Extension, providing an example that demonstrates Password-Based Encryption. Readers should be familiar with Java and advanced Java topics.
Secret Key Cryptography
By Messaoud Benatar
Jun 7, 2002
Learn the basics of secret key cryptography. This excerpt discusses data-scrambling techniques used in early cryptographic systems and elaborates on the concepts employed in modern cryptosystems. It also describes well-known contemporary algorithms and discusses the security services enabled through secret key cryptography.
Upgrading Software Development Security
By Scott Barman
Apr 5, 2002
Information security expert Scott Barman discusses how to create a secure development program within an existing software development process. Organizations such as Microsoft may need to consider such policies in their heightened concentration on security.
Writing Mobile Code Policies
By Scott Barman
Apr 5, 2002
Information security expert Scott Barman discusses how to think about and create a policy on using mobile code that will work within the security infrastructure of your organization's network environment.
Configuring the PIX Firewall for SSH (Secure Shell)
By David W. Chapman
Feb 15, 2002
Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
Computer Forensics: Tracking an Offender
By Jay G. Heiser, Warren G. Kruse II
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Secret Key Assurances
By Doris M. Baker, H. X. Mel
May 18, 2001
The authors review the concept of assurances in cryptography and examine three other necessary electronic data assurances -- authentication, integrity, and nonrepudiation.

<< < Prev Page 3 4 5 6 7 Next >