Home > Articles > Networking

Networking

61 Items

Sort by Date | Title

Software [In]security: Startup Lessons
By Gary McGraw
Oct 22, 2009
Gary McGraw discusses the seven lessons he's learned through his startup years at Cigital.
Software [In]security: BSIMM Begin
By Gary McGraw, Sammy Migues
Sep 24, 2009
Gary McGraw introduces BSIMM Begin, a Web-based study focused on 40 of the 110 activities covered in the full Building Security In Maturity Model.
Software [In]security: Attack Categories and History Prediction
By Gary McGraw
Aug 25, 2009
Software security expert Gary McGraw describes how to divide attacks into four categories — and predict the attacks of tomorrow.
Software [In]security: Moving U.S. Cybersecurity Beyond Cyberplatitudes
By Gary McGraw
Jul 16, 2009
Gary McGraw discusses how the current U.S. administration needs to make some important progress on cybersecurity rather than simply offering more platitudes.
Why IT Pros Need to Learn About IPv6 Security Now: An Interview with Scott Hogg and Eric Vyncke
By Linda Leung, Scott Hogg, Eric Vyncke
Jul 4, 2009
Linda Leung talks with Scott Hogg and Eric Vyncke about IPv6 transition and security issues.
Software [In]security: Measuring Software Security
By Gary McGraw, Jim Routh
Jun 18, 2009
Gary McGraw and Jim Routh describe the value positioning of a successful software security initiative instituted at a large financial services firm.
IPv6 Internet Security for Your Network
By Eric Vyncke, Scott Hogg
Jun 4, 2009
This chapter covers how to secure your network when it is connected to the IPv6 Internet.
Around the Globe in the Race Against IPv4 Address Depletion
By Jeff Doyle, Linda Leung
May 19, 2009
Linda Leung interviews Jeff Doyle about what he sees as the future for IPv6.
Software [In]security: Software Security Comes of Age
By Gary McGraw
Apr 16, 2009
Gary McGraw details the continued growth of the software security industry, even in the face of worldwide recession.
Software [In]security: Top 11 Reasons Why Top 10 (or Top 25) Lists Don’t Work
By Gary McGraw
Jan 13, 2009
Gary McGraw explains why there’s more to software security than watching the bug parade march by.
Software [In]security: Software Security Top 10 Surprises
By Gary McGraw, Brian Chess, Sammy Migues
Dec 15, 2008
In the course of analyzing real-world data from top software security firms, Gary McGraw, Brian Chess, and Sammy Migues unearthed some surprises.
Software [In]security: A Software Security Framework: Working Towards a Realistic Maturity Model
By Gary McGraw, Brian Chess
Oct 15, 2008
Gary McGraw and Brian Chess introduce a software security framework (SSF) to help understand and plan a software security initiative.
Software [In]security: Paying for Secure Software
By Gary McGraw
Apr 7, 2008
Gary McGraw kicks off his new monthly column by showing how the added costs of developing secure software can be more than offset by lower TCO down the road.
Visualization: How to Present Security Data to Get Your Point Across
By Andrew Jaquith
Dec 21, 2007
Learn how to present security data in a style that truly gets your point across.
Talk Is Cheap: Why the Security Industry Needs to Improve Its Bedside Manner
By Michael Kemp
Aug 17, 2007
Michael Kemp explores an often-overlooked aspect of security practice, namely communicating with clients so that they can be assured of expertise instead of being awed by it.
On the Job with a Network Manager
By Alexander Clemm
Jan 12, 2007
Find out what you would do if you ran networks for a living.
Will Cell Phones be Responsible for the Next Internet Worm?
By Norm Laudermilch
Apr 28, 2006
The mobile devices you know and love are great for productivity, but they have completely changed the vulnerability state of our networks. Norm Laudermilch tells you why you should be afraid, very afraid.
The Basic Uses of TCP/IP Route Maps
By Jeff Doyle, Jennifer Carroll
Dec 9, 2005
Route maps are similar to access lists; they both have criteria for matching the details of certain packets and an action of permitting or denying those packets. This chapter explains the basics of Route Maps. Included are sample exercises to help you practice administration and use of Route Maps.
Networking First-Step: How to Build a Local (Network) Roadway
By Wendell Odom
Jun 4, 2004
Wendell Odom covers networking basics such as how they work, what they're made of, and the benefits of using a structured cabling system.
Practical Storage Area Networking: Project Modeling
By Daniel Pollack
Jan 17, 2003
Daniel Pollack discusses the tools you need in order to complete I/O analysis and determine the Storage Area Network project type.

<< < Prev Page 1 2 3 4 Next >