Home > Articles > Security

Security

722 Items

Sort by Date | Title

Software [In]security: Securing Web 3.0
May 15, 2008
Gary McGraw warns that we haven't yet solved (or even considered) some of the serious security issues involved with Web 3.0.
Bluetooth Security Risks in Business
May 9, 2008
Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
Failures of Information Security: Observing the World and Asking Why
Apr 28, 2008
Andrew Stewart and Adam Shostack delve into some of the most apparent failures of information security.
Cybercrime and Politics: The Dangers of the Internet in Elections
Apr 23, 2008
This chapter focuses on the 2008 presidential election to demonstrate the risks involved in using the Internet in campaigning.
Core Java Security: Class Loaders, Security Managers, and Encryption
Apr 16, 2008
Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
FISMA: Compliance vs. Security
Apr 14, 2008
Randy Nash asks this question: Does FISMA make our agencies any more secure?
Software [In]security: Paying for Secure Software
Apr 7, 2008
Gary McGraw kicks off his new monthly column by showing how the added costs of developing secure software can be more than offset by lower TCO down the road.
CCENT Exam Prep: General Network Security
Apr 2, 2008
This chapter describes common attacks and shows how to mitigate those threats based on the requirements of both the 640-802 CCNA and 640-822 ICND1 exams.
Crime, War, and B.S. in the Electronic Universe
Mar 21, 2008
Michael Kemp warns of a more insidious threat than actual information attacks: pandering to the fear of these attacks.
FlexiSPY Mobile Spyware: Monitoring Solution or Security Nightmare?
Mar 14, 2008
Seth Fogie takes a look at the mobile spyware app FlexiSPY and shows where the mobile malware world could be headed.
Tools and Strategies for Securing Hardware
Mar 14, 2008
This sample chapter discusses specific hardware security problems and provides tools and strategies for keeping your hardware secure.
CCNA Exam Cram: Advanced Catalyst Switch Operations and Configuration
Feb 29, 2008
Quick, concise information and study tips for Spanning Tree Protocol, VLANs, inter-switch connectivity using trunks, and Inter-VLAN routing options.
The Motives of Internet Criminals: Why They Want Our Money
Feb 29, 2008
Understand why — and how — internet criminals work their trade.
Transparency in Ajax Applications
Feb 15, 2008
Billy Hoffman and Bryan Sullivan explain why it's in your best interest to keep as much business logic as possible on the server.
Understanding Windows CardSpace: Hints Toward a Solution
Feb 15, 2008
Empower Windows users to be first-class citizens of the Identity Metasystem.
Scanning Tools: How Many Do We Really Need?
Feb 8, 2008
Randy Nash shares his opinion on the need for scanning tools.
Yesterday, Today and Tomorrow: The Story of Scams
Feb 1, 2008
Steven Weisman discusses how even smart well-informed people can sometimes get caught in scams.
C Language Issues for Application Security
Jan 25, 2008
How you use C could adversely affect an application's security and robustness.
The Real Cost of Insecure Software: The Foundation of Civilization
Dec 28, 2007
David Rice discusses the perilous state of software security in this introduction to his book, Geekonomics.
Visualization: How to Present Security Data to Get Your Point Across
Dec 21, 2007
Learn how to present security data in a style that truly gets your point across.

<< < Prev Page 9 10 11 12 13 Next >