Home > Topics > Security

Security

Articles

Information Security Principles of Success
This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.
Continue reading...
By Jim Breithaupt, Mark S. MerkowJul 4, 2014
Security Program and Policies: Governance and Risk Management
This chapter explains how to manage information security policies, describes roles and responsibilities related to information security, identifies the components of risk management, and shows how to create polices related to information security policy, governance, and risk management.
Continue reading...
By Sari GreeneApr 16, 2014
Network Defense and Countermeasures: Assessing System Security
Before you can begin administering system security, you must have a realistic assessment of the system’s current state of security. This chapter discusses the essential steps that you should follow in assessing a system’s security level.
Continue reading...
By William (Chuck) EasttomDec 16, 2013
John TraenkenschuhSecure Your Embedded Systems Now!
John Traenkenschuh explores the somewhat hidden world of embedded computing and its emerging security issues.
Continue reading...
By John TraenkenschuhOct 24, 2013

See More Security Articles

Blogs

Brad YaleHow the Internet Works: A Call for Personal Security

It's very easy, after reading "The Snappening" Snapchat security breach news, to determine fault lies with users. It would be very easy and convenient to blame the leak not on the leakers, but on the users who sent sexually explicit materials to friends, lovers and strangers. This conclusion is easy to draw yet, it only skims the surface of the true issue at hand.  

Whatever you think of the materials leaked, the larger issue at play in "The Snappening" is how the public relates to, understands and uses public Internet architectures. If anything, "The Snappening" should serve as a beacon call for greater Internet security practice enlightenment. 

In this version of "How the Internet Works" we cover public Cloud architectures and the need for increased Internet security practices learning.  

Continue reading...
By Brad YaleCommentsOctober 13, 2014
Topics: Software Security,Access,General Security and Privacy,Information Technology,Web Services,Network Security,Data,Security,Cloud Computing
Brad YaleMobile Malware and Fake Apps: Hong Kong, China and The New York Times

For the past week or so, Hong Kong has erupted with peaceful demonstrations advocating for the ousting of the Chinese premiere and the right to peacefully and openly elect his replacement. While the Chinese premiere, Xi Jinping, looks to be going nowhere one thing has become clear - the mobile devices and Internet connections which helped to grow the nightly demonstrations are quietly suffering an inward meta problem - malware, viruses and fake applications.

As mobile platforms become more prominent and are used more robustly to organize, carry out financial transactions and conduct daily personal business, the time has come to address mobile malware and fake applications.

Continue reading...
By Brad YaleCommentsOctober 2, 2014
Topics: Windows Phone,Software Security,General Security and Privacy,Information Technology,Open Source,iOS,Mobile Application Development & Programming,Android,Security,HTML5 & Web Standards
Brad YaleInformIT Labor Day Programming Event

Welcome to the InformIT Labor Day Event.

From August 28th - September 3rd,  the following deals apply to all ebooks, books, video learning lessons, interactive learning lessons, software and practice tests:

- Purchase three or more titles. Save 55%. 

- Purchase two titles. Save 45%. 

- Purchase one title. Save 35%.

**Free Shipping to all locations in the United States*

*30 Day Trial to Safari Books Online**

Coupon code (Case Sensitive):  LABORDAY

Continue reading...
By Brad YaleCommentsAugust 28, 2014
Topics: Home & Office Computing,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Graphics & Web Design,Networking,Engineering,Web Development,Certification,Data,Mobile Application Development & Programming,Security,Hardware,Operating Systems, Server,Business & Management
Brad YaleThe Best Browser Extensions

We spend a lot of time online. According to a recent Mashable article posted by Matt Petronzio on March 5, 2014, the average American adult spends 11 hours per day with electronic media. Of that, three hours is spent on social media, nearly one hour is spent on a smartphone and nearly one hour is spent on the Internet via a PC. Taken as a whole, the average American adult spends between 2 – 4 hours online every day.

We spend a lot of time online. To make your daily online life better, below is a list of the five coolest Internet Browser extensions.

Continue reading...
By Brad YaleCommentsAugust 7, 2014
Topics: The Web/Virtual Worlds/Social Networking,Home & Office Computing,General Security and Privacy,Information Technology,Software Development & Management,Programming,Open Source,Web Services,Network Security,Web Development,Testing,Security,Process Improvement

See More Security Blogs