Home > Articles > Security

Security

722 Items

Sort by Date | Title

Securing the Cisco Security Monitoring, Analysis, and Response System
Jul 3, 2008
This chapter describes recommendations for securing MARS appliances, both physically and electronically.
Introduction to Mainframe Basics for Security Professionals
Jul 2, 2008
This chapter describes the evolution of the mainframe and the reasons it is the leading platform for reliable computing. It also explains how to use the key elements of z/OS.
Securing Wireless Networks
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.
Data Theft: How Big a Problem?
Jun 30, 2008
Michael Miller discusses how data theft happens, where the data goes, and to what extent it is a problem.
Identifying and Classifying Network Security Threats
Jun 26, 2008
This chapter presents several best practices and methodologies you can use to successfully and quickly identify and classify security threats and anomalies in the network.
A Practical Guide to Trusted Computing: Writing a TPM Device Driver
Jun 25, 2008
In this chapter, the authors demonstrate how to talk to a TPM (both 1.1 and 1.2) at the lowest level. This will be useful for programmers who want to talk to the TPM directly, either in BIOS or a device driver.
IP Network Traffic Plane Security Concepts
Jun 18, 2008
This chapter introduces the concepts of defense in depth and breadth as applied to IP traffic plane security.
Should We Ban Internet Anonymity?
Jun 16, 2008
Should anonymous attackers can lawfully malign the innocent and helpless?
The Blown to Bits Interview: Your Life, Liberty, and Happiness After the Digital Explosion
Jun 13, 2008
Blown to Bits authors Hal Abelson, Ken Ledeen, and Harry Lewis talk about privacy and information availability in the digital age.
Software [In]security: DMCA Rent-a-cops Accept Fake IDs
Jun 12, 2008
Gary McGraw explains how the enforcement of copyright law is leading to the improper application of the Digital Millennium Copyright Law.
SSL VPN Design Considerations
Jun 10, 2008
This chapter discusses design issues you should consider when you build a Secure Socket Layer (SSL) Virtual Private Network (VPN) solution.
Attacking the Spanning Tree Protocol
Jun 4, 2008
Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
Lottery and Contest Scams
Jun 4, 2008
Everyone loves to win a prize. As a result, phony prize scams are rampant. Steve Weisman shows you some of the common ones and how to avoid them.
Secret Bits: How Codes Became Unbreakable
Jun 3, 2008
As encryption becomes pervasive, will the benefits to personal privacy outweigh the costs to national intelligence?
Why Is Security a Software Issue?
Jun 2, 2008
This chapter discusses why security is increasingly a software problem.
Data Loss and Full Disk Encryption
May 30, 2008
Randy Nash discusses the patterns of data loss, security policy, full disk vs. folder encryption, and vulnerabilities related to volatile memory.
Finding You: How Should Geolocation Be Used?
May 30, 2008
With Geolocation, what is possible depends on who has what data, and how well they use it to connect the dots. What is right is harder to say.
Everyday Eavesdropping: How Pervasive Is Digital Big Brother?
May 29, 2008
Digital eavesdropping will either become far more pervasive or will be reined in to protect civil liberties. Which do we want?
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 2
May 26, 2008
Seth Fogie steers beyond mere enhancements and shows how to turn the OLPC XO into a hacker’s toolkit.
Turning the OLPC Into a Hacker’s Toolkit - Give One, Get Owned, Part 1
May 19, 2008
Seth Fogie takes an exploratory look at the XO to see what’s inside and provides a few pointers for preparing it for "enhancement."

<< < Prev Page 8 9 10 11 12 Next >