Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Foundations (Page 1 of 11)   1 2 3 4 5 6  Next >
Enterprise Intrusion Analysis, Part One
We all remember the early days of intrusion-detection systems — IDS was supposed to be the silver bullet that ensured the security of our enterprises against every conceivable attack. Obviously this hasn’t proven to be the case.
By: Stephen Barish 2009-04-01
http://www.securityfocus.com/infocus/1904

Data Recovery on Linux and ext3
SecurityFocus contributor Abe Getchell covers a basic technique to recover data that someone has deleted, whether accidentally or on purpose.
By: Abe Getchell 2008-10-03
http://www.securityfocus.com/infocus/1902

WiMax: Just Another Security Challenge?
Deploying WiMax brings greater bandwidth, but also new, as well as old, security ramifications. SecurityFocus contributor Stephen Barish explores the technology behind a proposed new standard for wireless broadband communications.
By: Stephen Barish 2008-08-26
http://www.securityfocus.com/infocus/1901

A Guide to Different Kinds of Honeypots
Two members of the Honeynet Project, one based in the UK and one in New Zealand, delve into the details of the different types of honeynets that are in use today.
By: Jamie Riden and Christian Seifert 2008-02-14
http://www.securityfocus.com/infocus/1897

Proactively Managing Security Risk
The current approach to security is based on perimeter defense and relies on firewalls, intrusion detection systems, and intrusion prevention systems. However, the increasing speed at which new exploits and attacks are being devised mandates a new layer of security that provides consistent protection rather than perpetually lagging behind the morphing tricks of hackers.
By: Naresh Verma, Yih Huang, and Arun Sood 2007-11-07
http://www.securityfocus.com/infocus/1896

Aspect-Oriented Programming and Security
Aspect-oriented programming (AOP) is a paradigm that is quickly gaining traction in the development world. While several others have tied AOP to security, I aspire to raise awareness amongst my information security colleagues that AOP can have a substantially beneficial impact on application security.
By: Rohit Sethi 2007-10-16
http://www.securityfocus.com/infocus/1895

Building Secure Applications: Consistent Logging
This article focuses on developers and discusses how to use consistent application-layer logging along with Log4J or Log4net for the real-time detection of attacks.
By: Rohit Sethi and Nish Bhalla 2007-02-26
http://www.securityfocus.com/infocus/1888

Password Management Concerns with IE and Firefox, part two
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0.
By: Mikhael Felker 2006-12-11
http://www.securityfocus.com/infocus/1883

Password Management Concerns with IE and Firefox, part one
This two-part paper presents an analysis of the security mechanisms, risks, attacks, and defenses of the two most commonly used password management systems for web browsers, found in Internet Explorer and Firefox. The article specifically addresses IE 6 and 7 and Firefox 1.5 and 2.0.
By: Mikhael Felker 2006-12-08
http://www.securityfocus.com/infocus/1882

Dynamic Linking in Linux and Windows, part two
This article discusses the shared libraries concept in both Windows and Linux, and offers a walk through various data structures to explain how dynamic linking is done in these operating systems. The paper will be useful for developers interested in the security implications and the relative speed of dynamic linking, and assumes some prior cursory knowledge with dynamic linking.
By: Reji Thomas and Bhasker Reddy 2006-08-15
http://www.securityfocus.com/infocus/1873

Foundations (Page 1 of 11)   1 2 3 4 5 6  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus