Security

All Security Articles

Showing 1-10 of 10

Sort by Date | Title

1.
5 Steps to Building and Operating an Effective Security Operations Center (SOC)
By Joseph Muniz
Dec 21, 2015
Joseph Muniz, co-author of Security Operations Center: Building, Operating, and Maintaining Your SOC, provides a high-level overview of the steps involved in creating a security operations center to protect your organization's valuable data assets.
2.
Overview of Security Operations Center Technologies
By Joseph Muniz, Nadhem AlFardan, Gary McIntyre
Dec 15, 2015
This chapter from Security Operations Center: Building, Operating, and Maintaining your SOC focuses on the technology and services associated with most modern SOC environments, including an overview of best practices for data collection, how data is processed so that it can be used for security analysis, vulnerability management, and some operation recommendations.
3.
Cisco NX-OS and Cisco Nexus Switching: Unified Fabric
By Ron Fuller, David Jansen, Matthew McPherson
Apr 26, 2013
This chapter shows the basic Nexus 5x00 and Nexus 7000 configurations necessary to provide a Unified access method for LAN data traffic and SAN storage traffic.
4.
Securing Overlay Transport Virtualization (OTV) with Cisco TrustSec (CTS)
By Ron Fuller
Apr 25, 2013
Ron Fuller shows just how easy it is to take advantage of MACSEC and AES128 bit encryption on your Cisco Nexus 7000 series switches.
5.
Network Security First-Step: Firewalls
By Donald Stoddard, Thomas M. Thomas
Feb 8, 2012
This chapter dissects a firewall’s duties to understand what makes a firewall operate and how it does its job.
6.
ZigBee Wireless Security: A New Age Penetration Tester's Toolkit
By Brad Bowers
Jan 9, 2012
Brad Bowers takes a closer look at the ZigBee protocol, some of the attacks that have been leveraged against it, and the security tools that penetration testers can use.
7.
Developing Network Security Strategies
By Priscilla Oppenheimer
Oct 4, 2010
To help you handle the difficulties inherent in designing network security for complex networks, this chapter teaches a systematic, top-down approach that focuses on planning and policy development before the selection of security products.
8.
Why IT Pros Need to Learn About IPv6 Security Now: An Interview with Scott Hogg and Eric Vyncke
By Linda Leung, Scott Hogg, Eric Vyncke
Jul 4, 2009
Linda Leung talks with Scott Hogg and Eric Vyncke about IPv6 transition and security issues.
9.
IPv6 Internet Security for Your Network
By Eric Vyncke, Scott Hogg
Jun 4, 2009
This chapter covers how to secure your network when it is connected to the IPv6 Internet.
10.
Securing Wireless Networks
By Jim Doherty, Neil Anderson, MAGGIORA & DOHERTY
Jul 2, 2008
This chapter discusses wireless security, including a checklist for securing Wi-Fi.