- Securing the Cisco Security Monitoring, Analysis, and Response System
- Jul 3, 2008
- This chapter describes recommendations for securing MARS appliances, both physically and electronically.
|
- Introduction to Mainframe Basics for Security Professionals
- Jul 2, 2008
- This chapter describes the evolution of the mainframe and the reasons it is the leading platform for reliable computing. It also explains how to use the key elements of z/OS.
|
- Securing Wireless Networks
- Jul 2, 2008
- This chapter discusses wireless security, including a checklist for securing Wi-Fi.
|
- Data Theft: How Big a Problem?
- Jun 30, 2008
- Michael Miller discusses how data theft happens, where the data goes, and to what extent it is a problem.
|
- Identifying and Classifying Network Security Threats
- Jun 26, 2008
- This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.
|
- A Practical Guide to Trusted Computing: Writing a TPM Device Driver
- Jun 25, 2008
- In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
|
- IP Network Traffic Plane Security Concepts
- Jun 18, 2008
- This chapter introduces the concepts of defense in depth and breadth as applied to IP traffic plane security.
|
- Should We Ban Internet Anonymity?
- Jun 16, 2008
- Should anonymous attackers can lawfully malign the innocent and helpless?
|
- The Blown to Bits Interview: Your Life, Liberty, and Happiness After the Digital Explosion
- Jun 13, 2008
- Blown to Bits authors Hal Abelson, Ken Ledeen, and Harry Lewis talk about privacy and information availability in the digital age.
|
- Software [In]security: DMCA Rent-a-cops Accept Fake IDs
- Jun 12, 2008
- Gary McGraw explains how the enforcement of copyright law is leading to the improper application of the Digital Millennium Copyright Law.
|
- SSL VPN Design Considerations
- Jun 10, 2008
- This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
|
- Attacking the Spanning Tree Protocol
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
- Lottery and Contest Scams
- Jun 4, 2008
- Everyone loves to win a prize. As a result, phony prize scams are rampant. Steve Weisman shows you some of the common ones and how to avoid them.
|
- Secret Bits: How Codes Became Unbreakable
- Jun 3, 2008
- As encryption becomes pervasive, will the benefits to personal privacy outweigh the costs to national intelligence?
|
- Why Is Security a Software Issue?
- Jun 2, 2008
- This chapter discusses why security is increasingly a software problem.
|
- Data Loss and Full Disk Encryption
- May 30, 2008
- Randy Nash discusses the patterns of data loss, security policy, full disk vs. folder encryption, and vulnerabilities related to volatile memory.
|
- Finding You: How Should Geolocation Be Used?
- May 30, 2008
- With Geolocation, what is possible depends on who has what data, and how well they use it to connect the dots. What is right is harder to say.
|
- Everyday Eavesdropping: How Pervasive Is Digital Big Brother?
- May 29, 2008
- Digital eavesdropping will either become far more pervasive or will be reined in to protect civil liberties. Which do we want?
|
- Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2
- May 26, 2008
- Seth Fogie steers beyond mere enhancements and shows how to turn the OLPC XO into a hacker’s toolkit.
|
- Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
- May 19, 2008
- Seth Fogie takes an exploratory look at the XO to see what’s inside and provides a few pointers for preparing it for "enhancement."
|