Home > Topics > Security

Security

Articles

The authors of Security in Computing, 5th Edition discuss the changes they have made to their well-regarded book in the fifth edition.

Randy Nash

Information security expert Randy Nash discusses the history and techniques involved in phishing attacks, looking at some possible reasons why we're still getting caught by obvious phishing attempts.

The authors of Security in Computing, 5th Edition introduce their book, which is about the security of computers, their data, and the devices and objects to which they relate. In this book you will learn some of the ways computers can fail, or be made to fail, and how to protect against those failures.

This chapter introduces these key information security principles and concepts, showing how the best security specialists combine their practical knowledge of computers and networks with general theories about security, technology, and human nature.

See More Security Articles

Blogs

John  Traenkenschuh

Traenk mulls over his ethical hacking job and remote access technologies. Does user convenience make unseen threats more real?

John  Traenkenschuh

No matter what the need, few security organizations are as dedicated to helping us InfoSec Pros as SANS.

John  Traenkenschuh

Long ago, Traenk read about new attacks, attacks modeled after biological attacks.  Those were viruses; what new comes?

John  Traenkenschuh

Two Grandfather clocks--what can you do with those?  How high-tech are those?

See More Security Blogs