Menu
Computer Network Security

Difference Between Network Firewall and Web Application Firewall
A Network Firewall acts as a security barrier between a trusted network, such as the local network (LAN), and an untrusted network, such as the Internet. A >Web Application Firewall (WAF) monitors and allows or blocks data packets as they travel to and from a Web application. More ...

What is Penetration Testing?
This book serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. More ...

Secure, Network Compliant BYOD (Bring Your Own Device) Solutions
A recent IBM study and revealed that 81% of organizations reported their employees are using their personal mobile devices to connect to "company resources". But BYOD (Bring Your Own Device) doesn't necessarily equate to network security problems. More ...

What Is Penetration Testing?
Penetration testing is one of the hottest up and coming skills any IT professional needs to have. Companies are actively looking for penetration testers and professionals with a background in IT security and the ability to do penetration testing. More ...

What is Cross Site Scripting?
Cross-site scripting attacks are used to steal information from your browser when you visit websites such as ecommerce stores, forums, and even your email accounts. More ...

Firewall Perimeter Network (DMZ)
A DMZ (Demilitarized Zone) or Perimeter Network is the area between the firewall that protects the network from untrusted external networks (the Internet) and the firewall that protects the internal network. More ...

What's the Difference Between Sniffing, Snooping, and Spoofing?
Network sniffing and snooping involve tapping into network traffic for the purpose extracting usernames, passwords, account numbers, and other information. Spoofing is when a hacker creates an email or a website that appears to genuine but is designed for the purpose extracting usernames, passwords, account numbers. More ...

How to Protect Your Business From a Cyber Attack
Hackers can be crippling for small businesses who, many times, never recover from the theft. Here are some precautions you can take to help keep your business protected against hackers. More ...

Network User Authentication
Some switches require users to authenticate themselves before gaining access to the rest of the network. Network Access Control (NAC) checks the characteristics of the device seeking admission to the network. More ...

Denial of Service Attack (DoS) Detection and Mitigation
A Denial of Service Attack is when a hacker attempts to consume such a large amount of a server's resources that it's services will be unavailable to its intended users. For example a DoS attack against a web server attempts to prevent it from serving web pages to legitimate Internet clients. More ...

Understanding the Dangers Your Systems Face
It's one thing to know generally that your systems are under fire from hackers around the world and malicious users around the office; it's another to understand specific attacks against your systems. This section discusses some well-known attacks but is by no means a comprehensive listing. More ...

Security Issues with Wireless LANs
Wireless LAN (WLAN) security threats include war dialing, war driving, war chalking, WEP and WPA security cracking, and rogue access points. This artilce discuses approaches to WLAN Security. More ...

What is a Botnet Attack and How to Identify It?
Attacks against networks are increasing because attackers find many networks are not properly patched and secured behind a firewall. Once attackers have compromised a machine, they simply install a bot on it to establish communication. The botnet is then controlled by the attacker. More ...


Learn more at amazon.com

Custom Search