|
Call for papers SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com
Wireless Policy Development (Part Two)This is the second of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development. 2003-10-02 http://www.securityfocus.com/infocus/1735
Wireless Policy Development (Part One)This is the first of a two-part series that will help create a framework for the most important aspect of any wireless security strategy -- policy development. 2003-09-18 http://www.securityfocus.com/infocus/1732
Pocket-Sized Wireless DetectionThis article provides a comparison of two tiny 802.11 detectors and discusses how they would fit into your overall WiFi security framework. 2003-09-02 http://www.securityfocus.com/infocus/1727
Basic IIS Lockdown Using Scripts and Group PolicyThis paper is written for system administrators who want to make their life managing IIS easier using scripts with Active Directory and Group Policy. 2003-08-12 http://www.securityfocus.com/infocus/1719
U.S. Information Security Law, Part FourThis is the last article in a four-part series looking at U.S. information security laws and the way those laws affect the work of security professionals. This installment continues the discussion of information security in the public sector and provides an overview of national security law in the United States as it pertains to information security. 2003-07-09 http://www.securityfocus.com/infocus/1710
Conducting a Security Audit: An Introductory OverviewThis article will offer a brief overview of security audits: what they are, why they are important, and how they are conducted. 2003-05-26 http://www.securityfocus.com/infocus/1697
U.S. Information Security Law, Part 3This is the third part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the basics of the criminal information security law. 2003-05-12 http://www.securityfocus.com/infocus/1693
Steganography RevealedSteganography is a means of protecting the confidentiality of data by "hiding" it within a larger file of data. This technique can be used for both legitimate and illegitimate purposes. This article will offer a brief introductory discussion of steganography: what it is, how it can be used, and the implications it can have for security. 2003-04-09 http://www.securityfocus.com/infocus/1684
U.S. Information Security Law, Part 2This is the second part of a four-part series looking at U.S. information security laws and the way those laws affect security professionals. In this installment, we will look at the legal framework for security of an enterprise's working environment from the perspective of information security professionals, with particular emphasis on the protection of communications. 2003-04-01 http://www.securityfocus.com/infocus/1681
Virus Hoaxes and the Real Dangers They PoseVirus Hoaxes are a fairly common phenomenon. Most email users have received messages warning of malicious viruses threatening to wreak havoc on their computers. Many of these hoaxes are harmless fun. Unfortunately, many pose real dangers. This article will offer a brief overview of virus hoaxes, how users can spot them, and how they can protect themselves against them. 2003-03-25 http://www.securityfocus.com/infocus/1678 |
|
Privacy Statement |