• December 27, 2010 27 Dec'10

    Wireless LAN Design and Setup

    What is wireless LAN? Learn about it here and get tips on how to build and setup WLAN, WLAN design, cards, security, devices and software and standards for Wi-Fi networks.  Continue Reading

  • December 27, 2010 27 Dec'10

    Network Intrusion Detection (IDS)

    Find intrusion systems, tools and tactics, such as Snort and Nessus, designed to help you manage host-based and network-based IDSes, minimize false positives, and learn how to use intrusion detection methods and devices to create a solid and secure...  Continue Reading

  • December 27, 2010 27 Dec'10

    Password Management and Policy

    Discover how to succeed in password management. Learn how to implement a password policy, software and tools, how to choose the right password length and when to change your password. Also, get advice on password cracking software, tools and ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Two-Factor and Multifactor Authentication Strategies

    User names and passwords are no longer enough and more enterprises are deploying two-factor or multifactor authentication products. Browse the articles and advice in this section for the latest information on using strong authentication in your ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise Single Sign-On (SSO)

    Enterprise single sign-on (SSO) technologies can help reduce help-desk calls and user mistakes by consolidating credentials into one single password for all applications and services. Read the news and technical advice here to find deployment ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Identity Management Technology and Strategy

    Here you'll get advice on several identity management technologies, how to develop a strategy, how to avoid costly problems and common mistakes, password and ID management, and identity management tools, software and services.  Continue Reading

  • December 27, 2010 27 Dec'10

    Disk Encryption and File Encryption

    Encrypting data at rest, whether at the file level or the disk level, can be a valuable tactic in the fight against hackers. Get advice on how to secure your organization's data with full, hard and whole disk encryption, and how to encrypt files ...  Continue Reading

  • December 27, 2010 27 Dec'10

    Identity Theft and Data Security Breaches

    Get advice on data security, identity theft and information security breaches. Learn about corporate data breach laws and legislation, state disclosure laws including Calif. SB-1386, notification requirements and legal ramifications of data breaches...  Continue Reading

  • December 27, 2010 27 Dec'10

    Enterprise Data Governance

    In this guide to enterprise data governance, get advice on how to protect your data, data backup and recovery, how to develop a data backup strategy, data backup storage and protection methods and technologies.  Continue Reading

  • December 27, 2010 27 Dec'10

    Web Authentication and Access Control

    Get tips and tricks on Web access authentication and control. Learn when restricting Web access is necessary and how Web application IAM techniques like single sign-on can thwart hacker attacks and threats.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close