- ASP.NET 2.0 Security
- Dec 10, 2004
- This chapter outlines some of the new security features included in ASP.NET 2.0. Many of these new features were added to address problems developers were forced to address in previous releases.
|
- Assessing Your Security Needs
- Jun 15, 2001
- Effective security is achieved through multiple layers of simple-to-understand-and-implement policies. Let security expert Joseph Dries show you how.
|
- Asymmetric Cryptography
- Dec 19, 2003
- Learn how asymmetric algorithms solve the shortcomings of symmetric algorithms. The authors of ".NET Security and Cryptography" also examine how asymmetric algorithms work at a conceptual level, and also provide a detailed analysis of RSA, which is currently the most popular asymmetric algorithm. Finally, they show how to use RSA in a typical program using the appropriate .NET Security Framework classes.
|
- Attacking and Defending the Internet with Border Gateway Protocol (BGP)
- Aug 25, 2008
- Carolyn Meinel explains how sysadmins can take advantage of resources offered by several organizations to detect and defeat BGP problems.
|
- Attacking the Spanning Tree Protocol
- Jun 4, 2008
- Conducting STP attacks is now within the reach of a wide population, thanks to the availability of point-and-shoot attacks tools. Fortunately, simple features widely available on a range of switches, such as BPDU-guard, provide effective measures against spanning-tree–based exploits.
|
- Attacks from Outside the Operating System
- Mar 29, 2002
- This excerpt from Andy Tanenbaum's Modern Operating Systems looks at some of the operating systems aspects of external threats, primarily focusing on viruses, worms, mobile code, and Java applets.
|
- Authentication
- Sep 21, 2001
- Authentication means proving that a user is who he claims to be – and then making sure he accesses only what he's allowed to. Mandy Andress discusses the types of authentication available to your organization and tells where they work best.
|
- Authentication and Authorization Policies: Using Cisco Identity Services Engine in a BYOD World
- Jun 25, 2013
- This chapter examines the relationship between authentication and authorization and how to build policies for each, describing a few common Authentication Policies and Authorization Policies to help you see how to work with these policy constructs.
|
- Authentication Auditing in Windows 2000
- Jul 29, 2005
- Authentication auditing is an essential part of protecting your Windows computers from intrusion. The big problem in Windows auditing is trying to understand what's going on, without drowning in a flood of irrelevant or useless information. If you let it do so, Windows will bury you in event notifications. Figuring out what's going on from those notifications can be a real chore. Rick Cook provides specific suggestions to start making your auditing process more informative.
|
- Basic Cisco IOS Software and Catalyst 3550 Series Security
- Jul 25, 2003
- Become comfortable with basic Cisco IOS Software and Catalyst 3550 security features with an introduction to password management, disabling unnecessary services, setting up secure HTTP and NTP services, and SSH.
|
- Basic Virtual Private Network Deployment
- Jan 19, 2001
- Substantial interest in VPN has been created by concerns for privacy and data protection. You, the administrator must be aware of security concepts and network designs, and yet, customers require flexible network environments that will satisfy the needs ...
|
- Basics of the PIX Firewall
- Nov 7, 2003
- There are several areas of a network in a secure environment; the most common are the inside, the outside, and the DMZ firewalls that help divide and control traffic between them. Cisco has designed the PIX series of firewalls to be the primary devices for performing these functions. This chapter covers the basics of the PIX firewall areas that connect to the firewall—the trusted, untrusted, and DMZ.
|
- Been Cracked? Just Put PAM On It!
- Oct 26, 2001
- Pluggable authentication models (PAM) allow you to configure your Linux environment to meet your own particular security needs.
|
- Bluetooth Security Risks in Business
- May 9, 2008
- Nico Darrow tells you how to keep yourself safe from Bluetooth hackers.
|
- Botnets II: Emerging Threats, Tactics, and Defenses
- Dec 19, 2008
- Carolyn Meinel describes some of the more promising efforts to combat threats from botnets.
|
- Botnets, Part 1: Why They Strike and How to Defend Against Them
- Dec 5, 2008
- Carolyn Meinel describes the threats posed by increasingly sophisticated botnets and dives into some of the latest technology designed to stop them.
|
- Breaking Unwanted TCP Connections by Modifying Your Route Table
- Dec 6, 2001
- Kyle Cassidy and Richard Cardona give you a quick-and-dirty explanation on route tables, to help you take advantage of a free and simple way to block unwanted traffic to specific IP addresses or subnets.
|
- Broadband Routers and Firewalls
- Nov 17, 2006
|
- Building a Custom JBoss Login Module
- Jun 10, 2005
- JBoss comes with very useful modules to define how to log in, but they're designed in a generic fashion to be examples or used in a very simple application. Marcus Zarra walks you through extending one of these modules to fit a custom requirement.
|
- Building a Human Firewall: Raising Awareness to Protect Against Social Engineering
- Oct 27, 2006
- Thierry Wohnlich proposes an alternate view of information security awareness, a view that takes into consideration the reasons behind the need for awareness, and discusses the role of the individuals in relation to information technology.
|