Home > Articles > Security
Security
722 Items
Sort by Date | Title
- Software [In]security: Securing Web 3.0
- May 15, 2008
- Gary McGraw warns that we haven't yet solved (or even considered) some of the serious security issues involved with Web 3.0.
|
- Bluetooth Security Risks in Business
- May 9, 2008
- Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
|
- Failures of Information Security: Observing the World and Asking Why
- Apr 28, 2008
- Andrew Stewart and Adam Shostack delve into some of the most apparent failures of information security.
|
- Cybercrime and Politics: The Dangers of the Internet in Elections
- Apr 23, 2008
- This chapter focuses on the 2008 presidential election to demonstrate the risks involved in using the Internet in campaigning.
|
- Core Java Security: Class Loaders, Security Managers, and Encryption
- Apr 16, 2008
- Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
|
- FISMA: Compliance vs. Security
- Apr 14, 2008
- Randy Nash asks this question: Does FISMA make our agencies any more secure?
|
- Software [In]security: Paying for Secure Software
- Apr 7, 2008
- Gary McGraw kicks off his new monthly column by showing how the added costs of developing secure software can be more than offset by lower TCO down the road.
|
- CCENT Exam Prep: General Network Security
- Apr 2, 2008
- This chapter describes common attacks and shows how to mitigate those threats based on the requirements of both the 640-802 CCNA and 640-822 ICND1 exams.
|
- Crime, War, and B.S. in the Electronic Universe
- Mar 21, 2008
- Michael Kemp warns of a more insidious threat than actual information attacks: pandering to the fear of these attacks.
|
- FlexiSPY Mobile Spyware: Monitoring Solution or Security Nightmare?
- Mar 14, 2008
- Seth Fogie takes a look at the mobile spyware app FlexiSPY and shows where the mobile malware world could be headed.
|
- Tools and Strategies for Securing Hardware
- Mar 14, 2008
- This sample chapter discusses specific hardware security problems and provides tools and strategies for keeping your hardware secure.
|
- CCNA Exam Cram: Advanced Catalyst Switch Operations and Configuration
- Feb 29, 2008
- Quick, concise information and study tips for Spanning Tree Protocol, VLANs, inter-switch connectivity using trunks, and Inter-VLAN routing options.
|
- The Motives of Internet Criminals: Why They Want Our Money
- Feb 29, 2008
- Understand why — and how — internet criminals work their trade.
|
- Transparency in Ajax Applications
- Feb 15, 2008
- Billy Hoffman and Bryan Sullivan explain why it's in your best interest to keep as much business logic as possible on the server.
|
- Understanding Windows CardSpace: Hints Toward a Solution
- Feb 15, 2008
- Empower Windows users to be first-class citizens of the Identity Metasystem.
|
- Scanning Tools: How Many Do We Really Need?
- Feb 8, 2008
- Randy Nash shares his opinion on the need for scanning tools.
|
- Yesterday, Today and Tomorrow: The Story of Scams
- Feb 1, 2008
- Steven Weisman discusses how even smart well-informed people can sometimes get caught in scams.
|
- C Language Issues for Application Security
- Jan 25, 2008
- How you use C could adversely affect an application's security and robustness.
|
- The Real Cost of Insecure Software: The Foundation of Civilization
- Dec 28, 2007
- David Rice discusses the perilous state of software security in this introduction to his book, Geekonomics.
|
- Visualization: How to Present Security Data to Get Your Point Across
- Dec 21, 2007
- Learn how to present security data in a style that truly gets your point across.
|