Practical VoIP Security The business of securing our private data is becoming more important and more relevant
each day.The benefits of electronic communication come with proportionate
risks. Critical business systems can be and are compromised regularly, and are used
for illegal purposes.There are many instances of this: Seisint (Lexis-Nexis research),
Configuring Netscreen Firewalls Every enterprise requires at least one firewall to provide the backbone for its network
security architecture. Firewalls are the core component of your network’s
security.The risks today have greatly increased, so the call for a stronger breed of
firewall has been made. In the past, simple packet filtering firewalls allowing
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
Buffer Overflow Attacks Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... Stealing the Network: How to Own the Box Stealing the Network: How to Own the Box is a unique book in the fiction department.
It combines stories that are fictional with technology that is real.While
none of these specific events have happened, there is no reason why they could
not.You could argue it provides a roadmap for criminal hackers, but I say it does
Hack Proofing Your Wireless Network When the concept of a network without wires was first suggested more than two
decades ago, it sparked the imagination of scientists, product vendors, and users
around the globe eager for the convenience and flexibility of a free roaming connection.
Unfortunately, as the variety of wireless solutions began to emerge, anticipation
|Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 |