Home > Articles > Security

Security

722 Items

Sort by Date | Title

Cisco Unified Wireless LAN Security Fundamentals
Dec 3, 2010
This chapter discusses the fundamentals of wireless LAN security in the context of the Cisco Unified Wireless Network (CUWN).
Cisco VPN 3000 Concentrator Hardware
Nov 13, 2003
It is important to understand the hardware aspects of the Cisco VPN 3000 Concentrator hardware series. David Minutella explains what you'll need to know about them to pass the CCSP CSVPN Exam.
Clickjacking: What You Need to Know
Jan 5, 2009
pdp explains how clickjacking attacks can hijack your mouse clicks in an attempt to trick you into giving away control of your privacy, your computer system, and possibly even your bank account.
ClickOnce Security
Feb 16, 2007
Brian Noyes discusses different aspects of deployment security and gives you a solid understanding of what protections ClickOnce provides and how you can customize those protections to suit the needs of your particular application.
Communicating Securely in an Insecure Medium
Jun 28, 2002
Cyber security experts show how cryptology can protect your identity in the world of cyberspace. Learn what you need to know to thwart security breaches, ward off active and passive attacks, and avoid viruses and Trojan horses. Address the legal issues involved as you use cryptology to effectively combat attempts to cripple your system and compromise your intellectual property.
Computer Forensics: Tracking an Offender
Nov 30, 2001
Learn to collect and analyze evidence found in a compromised computer system.
Computer Incident Response and Product Security: Operating an Incident Response Team
Dec 17, 2010
This chapter covers aspects of running an incidence response team (IRT) such as team size, team member profiles, cooperating with other groups, preparing for incidents, and measuring success.
Computer Security and Statistical Databases
By William Stallings
Aug 17, 2007
Bill Stallings looks at the unique security issues that relate to statistical databases.
Configuration for Transparently Redundant Firewalls
Sep 21, 2001
It's both possible and practical to configure redundant firewalls to provide continued operation despite router or firewall failure, and with minimal impact on security.
Configuring OpenSSH for the Solaris Operating Environment
Mar 22, 2002
This article deals with server and client configurations, key management, and integration into existing environments for the Solaris Operating Environment (OE).
Configuring SSL on BEA WebLogic Server 8.1
Apr 29, 2005
Using the Secure Sockets Layer (SSL) protocol is a relatively simple way to help protect your private information from spying eyes. Jon Svede shows how easy it is to set up SSL on BEA WebLogic Server 8.1.
Configuring the Cisco PIX Firewall for CA Site-to-Site
Dec 28, 2001
This sample chapter explains how to configure Cisco Secure PIX Firewall certificate authority (CA) support for Internet Protocol Security (IPSec). The chapter shows you each major step of the configuration, including support tasks, IKE, and IPSec.
Configuring the PIX Firewall for SSH (Secure Shell)
Feb 15, 2002
Let author, educator, and security specialist David W. Chapman Jr. demonstrate how easy it is to configure and troubleshoot secure remote access to your PIX Firewall.
Configuring the Secure Shell
Nov 12, 2004
This chapter will help you configure SSH for your company to the security specifications of your particular network.
Content Security with Check Point Firewall-1
Oct 29, 2004
Content Security provides additional control over what can be accessed through your firewalls. In this sample chapter, Dameon D. Welch-Abernathy explains how to manage content security with Check Point Firewall-1.
Converting Sendmail to Postfix, Part One: Why Convert?
Dec 28, 2001
If you have a UNIX or Linux-based mail server, Postfix may be of interest to you. Read this first in a two-part series to find out why.
Converting Sendmail to Postfix, Part Two: Configuring Postfix
Dec 28, 2001
How do you use the mail server Postfix? This second of two articles covers some basic configuration scenarios.
Core Elements of the Cisco Self-Defending Network Strategy
May 27, 2005
Can a network really defend itself? The short answer is, "Yes, it can." Network security has evolved from independently deployed products such as firewalls into the realm of system-wide solutions. And Cisco Systems® is at the forefront of the technology development that is making self-defending networks a reality.
Core Java Security: Class Loaders, Security Managers, and Encryption
Apr 16, 2008
Security is a major concern of both the designers and the users of Java technology. Cay S. Horstmann and Gary Cornell describe Java's security mechanisms.
Corporate Governance, Business Continuity Planning, and Disaster Recovery
Dec 1, 2005
To protect business stakeholders, corporate governance focuses a sharp eye on all measures and systems within the organization to ensure compliance with laws, regulations, and standards. Michelle Johnston Sollicito points out the many required aspects of a proper business continuity plan and shows you where to look for holes in your process.

<< < Prev Page 4 5 6 7 8 Next >