Features
Features
Web server threats and application attacks
-
HTTPS interception gets a bad rap; now what?
Should products intercept Transport Layer Security connections to gain visibility into network traffic? A new study by researchers and U.S.-CERT warn against it. Continue Reading
-
DNS Security: Defending the Domain Name System
In this excerpt from chapter two of DNS Security: Defending the Domain Name System, authors Allan Liska and Geoffrey Stowe discuss why DNS security is important. Continue Reading
-
Information security book excerpts and reviews
Visit the Information Security Bookshelf for book reviews and free chapter downloads. Continue Reading
-
The incident response process is on the clock
No time to prepare for incident handling? Security tools aim to automate the incident response process and help organizations lessen the time between threat detection and response. Continue Reading
-
Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace
This is an excerpt from the book Investigating Internet Crimes: An Introduction to Solving Crimes in Cyberspace by Todd G. Shipley and Art Bowker. Continue Reading
-
Web site attacks and how to defeat them
In this primer, learn how Web sites are attacked and how you can prevent yours from being victimized. Continue Reading
-
Essential versus nonessential services for a Windows Web server
Use this security checklist to harden your IIS Web server. Continue Reading
-
SearchSecurity.com's top clicks of 2005
SearchSecurity.com's top five tips, news articles and learning tools from 2005. Continue Reading
-
Gaining access using application and operating system attacks
In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their ... Continue Reading
-
Building trust into mobile computing
The Trusted Computing Group unveiled "use-cases" that describe secure ways in which to implement features and functions of mobile devices. Continue Reading
-
Controlling Web access with Apache
How to meet access control requirements with Apache and IIS Web servers. Continue Reading
-
Web Security School Entrance Exam Answers
Web Security School Entrance Exam Answers Continue Reading
-
Know your enemy: Why your Web site is at risk
In this Lesson 1 technical paper from Web Security School, guest instructor Michael Cobb outlines the threats to Web sites and who is behind them. Continue Reading
-
Entrance exam: Web attack prevention and defense
Test your knowledge of Web security to see if you'd benefit from our Intrusion Defense School lesson, "Web attack prevention and defense." Continue Reading
-
Quiz: Secure Web directories and development
Evaluate your knowledge of Web threats and how to defeat them. Questions cover security risks of dynamically created content and proper security management. Continue Reading