Home > Articles > Security > Network Security

Network Security

RSS Feed Subscribe to this topic  RSS details

657 Items

Sort by Date | Title

Video: Introduction to Information Security: A Course Overview
By Scott Aurnou
Dec 25, 2015
In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou introduces himself and discusses what he will cover in his 5-hour information security video course.
Video: Introduction to Information Security: Why All Tech Personnel Need a Basic Understanding of Security
By Scott Aurnou
Dec 23, 2015
Security issues directly impact IT, networks, and software development. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses why all technical personnel should have a basic understanding of information security.
5 Steps to Building and Operating an Effective Security Operations Center (SOC)
By Joseph Muniz
Dec 21, 2015
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
Thinking Security: Firewalls and Intrusion Detection Systems
By Steven M. Bellovin
Dec 16, 2015
In this chapter from Thinking Security: Stopping Next Year's Hackers Steven M. Bellovin asks if the general-purpose firewall is still worth its capital, operational, and productivity cost. He also takes a look a intrusion detection systems, intrusion prevention systems, and extrusion detection systems.
Overview of Security Operations Center Technologies
By Joseph Muniz, Nadhem AlFardan, Gary McIntyre
Dec 15, 2015
This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
Video: Introduction to Information Security: Understand Vulnerabilty Assessments and Pentesting
By Scott Aurnou
Apr 17, 2015
Vulnerability and pentesting are both effective ways to check the status of your organization's security posture. In this excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the three basic steps of vulnerability assessments and the proper use of penetration testing.
Video: Introduction to Information Security: Institute Business Continuity / Disaster Recovery
By Scott Aurnou
Apr 3, 2015
Your business just had an information security incident--now what do you do? In this video excerpt from Introduction to Information Security LiveLessons (Video Training), Scott Aurnou discusses the difference between business continuity and disaster recovery plans, how to create them, and when to implement them.
Preface to Security in Computing, 5th Edition
By Charles P. Pfleeger, Jonathan Margulies, Shari Lawrence Pfleeger
Mar 11, 2015
The authors of Security in Computing, 5th Edition discuss the changes they have made to their well-regarded book in the fifth edition.
Phishing: Why Are We (Still) Getting Caught?
By Randy Nash
Feb 9, 2015
Information security expert Randy Nash discusses the history and techniques involved in phishing attacks, looking at some possible reasons why we're still getting caught by obvious phishing attempts.
Introduction to Security in Computing, 5th Edition
By Charles P. Pfleeger, Jonathan Margulies, Shari Lawrence Pfleeger
Jan 30, 2015
The authors of Security in Computing, 5th Edition introduce their book, which is about the security of computers, their data, and the devices and objects to which they relate. In this book you will learn some of the ways computers can fail, or be made to fail, and how to protect against those failures.
Information Security Principles of Success
By Jim Breithaupt, Mark S. Merkow
Jul 4, 2014
This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
Security Program and Policies: Governance and Risk Management
By Sari Greene
Apr 16, 2014
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
Network Defense and Countermeasures: Assessing System Security
By William (Chuck) Easttom
Dec 16, 2013
Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level.
Secure Your Embedded Systems Now!
By John Traenkenschuh
Oct 24, 2013
John Traenkenschuh explores the somewhat hidden world of embedded computing and its emerging security issues.
The Anatomy of a Digital Investigation
By Michael W. Graves
Oct 8, 2013
Michael W. Graves discusses the details of a digital investigation, including understanding the scope of the investigation, identifying the stakeholders, and understanding documentation,
Secure Your Android Kindle or Nook Tablet Now!
By John Traenkenschuh
Oct 3, 2013
Tablet security is becoming increasingly important. Are you ready? John Traenkenschuh demonstrates how to secure your Nook HD+ or Kindle Fire HD tablet, using a mix of security tools and settings.
Cisco ASA Access Lists Concepts and Configuration
By Sean Wilkins
Jun 27, 2013
Sean Wilkins review Cisco’s Adaptive Security Appliance (ASA) implementation of access control lists (ACL or access list). He also covers ASA access list types, what they control, and a basic review of what the configuration syntax is to use them.
Cisco ASA Basic Internet Protocol Inspection
By Sean Wilkins
Jun 27, 2013
In this article, Sean Wilkins covers some of the common Internet protocol inspection features that can be enabled (or are enabled by default) on the Cisco ASA.
Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
By Jamey Heary, Aaron Woland
Jun 25, 2013
This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
By Ron Fuller, David Jansen, Matthew McPherson
Apr 26, 2013
This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.

Page 1 2 3 4 5 Next >