Search This Blog

Tuesday, March 03, 2009

Computer Security Handbook Fifth Edition is ready

Computer Security Handbook Fifth Edition now comes in two volumes to aid physical exercises
Network World logo

Security Strategies Alert

NetworkWorld.com | Security Research Center | Update Your Profile


Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

Spotlight Story
Computer Security Handbook Fifth Edition is ready

M. E. Kabay By M. E. Kabay
After three years of labor, the Fifth Edition of the Computer Security Handbook (CSH5) is ready! Senior Editor Sy Bosworth and new Editor Eric Whyne and I are proud to see the two-volume work for sale at last. Read full story

M. E. Kabay, PhD, CISSP-ISSMP, specializes in security and operations management consulting services. CV online.

Related News:

Bluetooth is not a dental condition Computer scientists Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the NIST has collaborated with John Padgette, an associate at Booz Allen Hamilton to write a new Special Publication entitled "Guide to Bluetooth Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried via these wireless systems.

Cell phone security Computer scientists Wayne Jansen and Karen Scarfone of the Computer Security Division of the Information Technology Laboratory at the National Institute of Standards and Technology (NIST) have written a new (October 2008) Special Publication entitled "Guidelines on Cell Phone and PDA Security," which summarizes the security issues and provides recommendations for protecting sensitive information carried on these devices.

Tech crime blotter: February's top 15 stories A look back at the month's biggest technology stories involving alleged and actual crimes, including Microsoft putting a bounty on the head of the Conficker worm authors and the FBI warning about "swatting."

Controlling unauthorized application usage without increasing costs "Our IT department has identified a potential issue with shared account usage in our applications. Can we control unauthorized usage or will we need to replace the apps? We want to avoid that cost if at all possible."

Downadup worm may hammer Southwest Airlines URL March 13 Computers infected by the Downadup worm will "phone home" to several legitimate URLs this month, including one owned by Southwest Airlines , potentially disrupting those sites, a security researcher said Sunday.

Exposed Web site a reminder for use of multiple passwords A Christian singles Web site called Singles.org was infiltrated by hackers last weekend, reportedly absconding with the secret passwords of over 9,000 of its users.

5 Facebook Scams: Protect Your Profile Beny Rubinstein knows computer security. An employee of a Seattle-area tech giant with 20 years of IT experience under his belt, Rubinstein has seen a side of the industry that most people will never know. He holds a degree in computer engineering, and - oh yeah - he just got scammed out of $1100 on Facebook.

Hope for a New Cybersecurity Administration Politically, it seems to be a time to be full of hope. Despite the slumping economy and the challenges that lie before us, hope takes on two forms for me this year:

Enter for a Microsoft training giveaway from New Horizons
New Horizons Computer Training is offering a free Microsoft training course worth up to $2,500 to be given to one lucky Microsoft Subnet reader.

Network World on Twitter Get our tweets and stay plugged in to networking news.


Best of the Tests 2009
Best of the Tests 2009Out of the more than 150 products tested, a baker's dozen rise to the top of the list.

Fave Raves
2009 Fave RavesSix readers dish on their must-have network products, from desktop systems to wireless access points.

Sponsored by Oracle
rule

IDC: Preventing Enterprise Data Leaks at the Source
This IDC report presents a preemptive approach to information protection and control (IPC). It discusses the growing internal threats to business information, the impact of government regulations on the protection of data, and how enterprises must adopt database security best practices to prevent sensitive customer data or company information from being distributed within or outside the enterprise in violation of regulatory or company policies.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies.
Download this Executive Guide now.


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.

 

03/03/09

Today's most-read stories:

  1. Touch-screen laptop, iPhone service highlight DEMO 09
  2. Cisco vet launches net management start-up
  3. iPod ... do you? A playful list of iPods
  4. Five Facebook scams: Protect your profile
  5. Analyst: $100 PS3 price drop coming by June 'at the latest'
  6. Verizon Wireless takes aim at pesky 'Rabbit'
  7. Managing the largest 802.11n deployment
  8. Microsoft extends hosted services to Europe, Asia
  9. Storm clouds ahead
  10. Microsoft details contents of enterprise bundle for Windows 7
  11. Microsoft TechFest: Commute UX dialog system for in-car infotainment


Network World on Twitter: Get our tweets and stay plugged in to networking news


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: