Monthly Archives: February 2011

Real World Microsoft Access Database Protection and Security

Author Garry Robinson approaches this book differently than other Access books on the market: he keeps the focus on issues that will help protect your database. Written from an experienced developers point of view, he discusses protection and security task-by-task … Continue reading

Posted in Networks | Comments Off on Real World Microsoft Access Database Protection and Security

The Craft of System Security

After quickly reviewing the history of computer security, the authors move on to discuss the modern landscape, showing how security challenges and responses have evolved, and offering a coherent framework for understanding today’s systems and vulnerabilities. Next, they systematically introduce … Continue reading

Posted in Networks | Comments Off on The Craft of System Security

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, … Continue reading

Posted in Networks | Comments Off on 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

Apache Security

This all-purpose guide for locking down Apache arms readers with all the information they need to securely deploy applications. Administrators and programmers alike will benefit from a concise introduction to the theory of securing Apache, plus a wealth of practical … Continue reading

Posted in Networks | Comments Off on Apache Security

Software Security: Building Security In

In addition to the touchpoints, Software Security covers knowledge management, training and awareness, and enterprise-level software security programs. Now that the world agrees that software security is central to computer security, it is time to put philosophy into practice. Create your … Continue reading

Posted in Networks | Comments Off on Software Security: Building Security In

Apple Training Series: Mac OS X Security and Mobility v10.6: A Guide to Providing Secure Mobile Access to Intranet Services Using Mac OS X Server v10.6 Snow Leopard

The follow-on to Apple Training Series: Mac OS X Deployment v10.6 and Apple Training Series: Mac OS X Directory Services v10.6, this volume takes an in-depth look at the many options provided to administrators to secure access to intranet services. … Continue reading

Posted in Networks | Comments Off on Apple Training Series: Mac OS X Security and Mobility v10.6: A Guide to Providing Secure Mobile Access to Intranet Services Using Mac OS X Server v10.6 Snow Leopard

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current … Continue reading

Posted in Networks | Comments Off on Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Extrusion Detection: Security Monitoring for Internal Intrusions

Today’s most devastating security attacks are launched from within the company, by intruders who have compromised your users’ Web browsers, e-mail and chat clients, and other Internet-connected software. Hardening your network perimeter won’t solve this problem. You must systematically protect … Continue reading

Posted in Networks | Comments Off on Extrusion Detection: Security Monitoring for Internal Intrusions

Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are the lifeline for companies large and small—and nobody knows this better than a hacker. Traditionally, security for mobile devices has … Continue reading

Posted in Networks | Comments Off on Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Security Metrics: Replacing Fear, Uncertainty, and Doubt

Whether you’re an engineer or consultant responsible for security and reporting to management–or an executive who needs better information for decision-making–Security Metrics is the resource you have been searching for. More… Addison-Wesley Professional

Posted in Networks | Comments Off on Security Metrics: Replacing Fear, Uncertainty, and Doubt