- Building a Roadmap for Securing Your Enterprise
- Nov 16, 2001
- This sample chapter from Maximum Security describes the basics of creating a pro-active information security plan, including the elimination of vulnerability points and the implementation of self-audit mechanisms.
|
- Building a Roadmap for Securing Your Enterprise
- Jul 13, 2001
- This sample chapter equips you with a roadmap for surviving the information security onslaught.
|
- Building Cisco IDS 3.0(3) Custom Signatures
- Feb 15, 2002
- Tuning your IDS to meet your specific network requirements is crucial for optimum protection of your network, as discussed in this article by Earl Carter.
|
- Building OpenSSH—Tools and Tradeoffs
- May 23, 2003
- This article updates the July 2001 Sun BluePrints OnLine article, "Building and Deploying OpenSSH for the Solaris Operating Environment." You'll learn about gathering the needed components, making compile-time configuration decisions, building components, and finally assembling the OpenSSH environment.
|
- Building OpenSSH--Tools and Tradeoffs, Updated for OpenSSH 3.7.1p2
- Jun 18, 2004
- This article contains information about gathering the needed components, deciding the compile-time configuration decisions, building the components, and finally assembling OpenSSH.
|
- Business Innovation from Israel's Masters of Espionage: The Intercept
- Jul 22, 2005
- In the inky darkness of the predawn hours, the Red Sea had turned choppy. The sun had yet to bathe the sea, known in Arabic as Al Bahr Al Ahmar, in its winter light. Fishing boats moored in the waters surrounded by Yemen, Saudi Arabia, and the Sudan rocked in the stormy darkness. Find out how Israeli intelligence intercepted a ship smuggling Palestinian arms in this sample chapter.
|
- C Language Issues for Application Security
- Jan 25, 2008
- How you use C could adversely affect an application's security and robustness.
|
- Can Your Network Hold Up to Terrorism?
- Jan 25, 2002
- If you suddenly lost voice communications, Internet access, or data transmission due to terrorism or disaster, could your business survive? Pete Moulton covers the plans that every enterprise needs to implement, just in case.
|
- Capturing Network Traffic for the Catalyst 6000 IDS Module
- Feb 15, 2002
- With the addition of the Catalyst 6000 IDS Module, you can integrate your Cisco IDS directly into your network’s infrastructure, as discussed by expert Earl Carter.
|
- CCDC and the Tale of the Insider Threat
- May 24, 2010
- Brad Bowers discusses the value of including the threat of insider attacks in Collegiate Cyber Defense Competition (CCDC) events.
|
- CCENT Exam Prep: General Network Security
- Apr 2, 2008
- This chapter describes common attacks and shows how to mitigate those threats based on the requirements of both the 640-802 CCNA and 640-822 ICND1 exams.
|
- CCNA Exam 640-553 Exam Cram: Implementing Secure Management and Hardening the Router
- Oct 21, 2008
- This chapter outlines some methods to protect the confidentiality of remote sessions to the router.
|
- CCNA Exam Cram: Advanced Catalyst Switch Operations and Configuration
- Feb 29, 2008
- Quick, concise information and study tips for Spanning Tree Protocol, VLANs, inter-switch connectivity using trunks, and Inter-VLAN routing options.
|
- CCSP Cisco Secure PIX Firewall Advanced Exam: CiscoWorks Management Center for Firewalls
- Jan 7, 2005
- To help you prepare for the CCSP Cisco Secure PIX Firewall Advanced Exam, this chapter provides information on using CiscoWorks with Firewall MC.
|
- CCSP Cisco Secure VPN Exam: Remote Access Configuration
- May 23, 2003
|
- CCSP CSI Exam Certification: SAFE IP Telephony Design
- Dec 30, 2004
- This chapter will help you prepare for the CCSP CSI Exam, with a focus on SAFE IP Telephony Design. Sample questions are included to help you study.
|
- CCSP Self-Study: Advanced AAA Security for Cisco Router Networks
- May 21, 2004
- For CCSP candidates, John Roland discusses Cisco Secure ACS 3.0 for Windows 2000/NT Servers, Cisco Secure ACS for UNIX, and the security services of TACACS+, RADIUS, and Kerberos.
|
- Chained Exploits: Discover What Your Boss Is Looking At
- Apr 10, 2009
- Learn how to spy on your boss' net surfing habits — and protect yourself and your network from similar exploits.
|
- Chained Exploits: How Hackers Combine Attacks to Hack You
- Jan 27, 2010
- Security expert Andrew Whitaker explains the hacker mentality and points out how hackers combine multiple exploits to achieve their goals.
|
- Check Point CCSA Exam Cram: Defining Security Policy with SmartDashboard
- Jul 1, 2005
- This chapter will help you prepare for the CCSA exam, with a focus on SmartDashboard. Sample questions and comprehensive explanations will keep you up to date and equip you to pass the exam.
|