This page is part of a Security School lesson, featuring a selection of expert technical content on this topic. Explore more in this school:
7. - About the expert: Read more in this section
- Michael Cobb, Application Security
Explore other sections in this guide:
- 1. - What are malicious mobile apps, and what can IT do about them?
- 2. - The latest on malicious mobile apps
- 3. - Are malicious mobile apps just a mere inconvenience?
Michael Cobb, CISSP-ISSAP, is a renowned security author with over 20 years of experience in the IT industry. He has a passion for making IT security best practices easier to understand and achievable. His website www.hairyitdog.com offers free security posters to raise employee awareness of the importance of safeguarding company and client data and of following good practices. He co-authored the book IIS Security and has written many technical articles for leading IT publications. Mike has also been a Microsoft Certified Database Manager and registered consultant with the CESG Listed Advisor Scheme (CLAS).
Do you have a question for our experts?
Contributions from Michael Cobb, Application Security
- Choosing the right Web application firewall
- The value of application whitelists
- Life at the edge: Securing the network perimeter
- Nmap Technical Manual
- Why Web services threats demand strict security
- Nmap and the open source debate
- Nmap parsers and interfaces
- Interpreting and acting on Nmap scan results
- Nmap: Techniques for improving scan times
- Nmap: Firewall configuration testing
- Nmap: More port scanning techniques
- Nmap: How to scan ports and services
- How to install and configure Nmap on Linux
- How to install and configure Nmap for Windows
- Nmap: A valuable open source tool for network security
- Best practices for pen testing Web applications
- Email security: Establishing security associations
- Five common Web application attacks and countermeasures
- Logging Windows administrators
- IIS SMTP relay service and Microsoft Exchange Server