Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Foundations (Page 5 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >
Wireless Policy Development (Part Two)
This is the second of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development.
By: Jamil Farshchi 2003-10-02
http://www.securityfocus.com/infocus/1735

Wireless Policy Development (Part One)
This is the first of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development.
By: Jamil Farshchi 2003-09-18
http://www.securityfocus.com/infocus/1732

Pocket-Sized Wireless Detection
This article provides a comparison of two tiny 802.11 detectors and discusses how they would fit into your overall WiFi security framework.
By: Bob Rudis 2003-09-02
http://www.securityfocus.com/infocus/1727

Basic IIS Lockdown Using Scripts and Group Policy
This paper is written for system administrators who want to make their life managing IIS easier using scripts with Active Directory and Group Policy.
By: Mark Squire 2003-08-12
http://www.securityfocus.com/infocus/1719

U.S. Information Security Law, Part Four
This is the last article in a four-part series looking at U.S. information security laws and the way those laws affect the work of security professionals. This installment continues the discussion of information security in the public sector and provides an overview of national security law in the United States as it pertains to information security.
By: Steven Robinson 2003-07-09
http://www.securityfocus.com/infocus/1710

Conducting a Security Audit: An Introductory Overview
This article will offer a brief overview of security audits: what they are, why they are important, and how they are conducted.
By: Bill Hayes 2003-05-26
http://www.securityfocus.com/infocus/1697

U.S. Information Security Law, Part 3
This is the third part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the basics of the criminal information security law.
By: Steven Robinson 2003-05-12
http://www.securityfocus.com/infocus/1693

Steganography Revealed
Steganography is a means of protecting the confidentiality of data by "hiding" it within a larger file of data. This technique can be used for both legitimate and illegitimate purposes. This article will offer a brief introductory discussion of steganography: what it is, how it can be used, and the implications it can have for security.
By: Kristy Westphal 2003-04-09
http://www.securityfocus.com/infocus/1684

U.S. Information Security Law, Part 2
This is the second part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the legal framework for security of an enterprise's working environment from the perspective of information security professionals, with particular emphasis on the protection of communications.
By: Steven Robinson 2003-04-01
http://www.securityfocus.com/infocus/1681

Virus Hoaxes and the Real Dangers They Pose
Virus Hoaxes are a fairly common phenomenon. Most email users have received messages warning of malicious viruses threatening to wreak havoc on their computers. Many of these hoaxes are harmless fun. Unfortunately, many pose real dangers. This article will offer a brief overview of virus hoaxes, how users can spot them, and how they can protect themselves against them.
By: Scott Granneman 2003-03-25
http://www.securityfocus.com/infocus/1678

Foundations (Page 5 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus