News

Business applications

  • November 06, 2005 06 Nov'05

    Hacking Windows: MSRPC vulnerabilities

    In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures.

  • October 20, 2005 20 Oct'05

    Author delves into novel attack methodologies

    Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting.

  • October 19, 2005 19 Oct'05

    Elements of a data protection strategy

    In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy.

  • September 27, 2005 27 Sep'05

    Secure your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security?

  • September 26, 2005 26 Sep'05

    Secure the interests of your extended enterprise

    How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security?

  • September 20, 2005 20 Sep'05

    SAS drives product roundup

    Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.