Home > Articles > Security

Security

RSS Feed Subscribe to this topic  RSS details

720 Items

Sort by Date | Title

ASP.NET 2.0 Security
By Alex Homer, Rob Howard, Dave Sussman
Dec 10, 2004
This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
Assessing Your Security Needs
By Joseph Dries
Jun 15, 2001
Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
Asymmetric Cryptography
By Peter Thorsteinson, G. Gnana Arun Ganesh
Dec 19, 2003
Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
Attacking and Defending the Internet with Border Gateway Protocol (BGP)
By Carolyn Meinel
Aug 25, 2008
Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
Attacking the Spanning Tree Protocol
By Eric Vyncke, Christopher Paggen
Jun 4, 2008
Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
Attacks from Outside the Operating System
By Andrew S. Tanenbaum
Mar 29, 2002
This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
Authentication
By Mandy Andress
Sep 21, 2001
Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
By Jamey Heary, Aaron Woland
Jun 25, 2013
This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
Authentication Auditing in Windows 2000
By Rick Cook
Jul 29, 2005
Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
Basic Cisco IOS Software and Catalyst 3550 Series Security
By Dmitry Bokotey, Andrew Mason, Raymond Morrow
Jul 25, 2003
Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
Basic Virtual Private Network Deployment
By THADDEUS FORTENBERRY
Jan 19, 2001
Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
Basics of the PIX Firewall
By Daniel Newman
Nov 7, 2003
There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
Been Cracked? Just Put PAM On It!
By Scott Mann, Ellen L. Mitchell
Oct 26, 2001
Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
Bluetooth Security Risks in Business
By Nico Darrow
May 9, 2008
Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
Botnets II: Emerging Threats, Tactics, and Defenses
By Carolyn Meinel
Dec 19, 2008
Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
Botnets, Part 1: Why They Strike and How to Defend Against Them
By Carolyn Meinel
Dec 5, 2008
Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
Breaking Unwanted TCP Connections by Modifying Your Route Table
By Richard Cardona, Kyle Cassidy
Dec 6, 2001
Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
Broadband Routers and Firewalls
By Ido Dubrawsky, Wes Noonan
Nov 17, 2006
Building a Custom JBoss Login Module
By Marcus Zarra
Jun 10, 2005
JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
By Thierry Wohnlich
Oct 27, 2006
Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.

<< < Prev Page 1 2 3 4 5 Next >