networksecurityjournal.com
Storage Virtualization at the Controller Level: An Overview - Network Security Journal
http://www.networksecurityjournal.com/whitepaper/storage-virtualization-hp
Storage Virtualization at the Controller Level: An Overview. What you need to know about the technology's basics. IT pros are always seeking better ways to store and protect data. However, traditional solutions such as RAID and tape back-ups are becoming less and less effective and organizations volumes of data continue to soar. Find out more about virtualization technology and how it can benefit your business. This white paper addresses topics such as:. Register for immediate access. Outside the U.S?
networksecurityjournal.com
Can the Government Really Be Trusted With Your Data? - Network Security Journal
http://www.networksecurityjournal.com/features/government-trusted-with-data-090407
Can the Government Really Be Trusted With Your Data? Stephen King couldn't write anything scarier. In fact, you're a player in this security nightmare. On September 4, 2007. A report released late last year by the House Committee on Government Reform. Paints a frightening picture of the lackadaisical approach many government agencies. Top 10 U.S. Government Web Break-ins of All Time. IT Security Email Security Comparison Guide. Personal Firewalls: Boon or Bane to IT? Definitive Guide to Network Security.
itsecurity.com
Email Security - IT Security
http://www.itsecurity.com/email-security
3 Tactics for Securing Your Website and Driving Trust, Customers and Revenue. Learn how to ensure your website is secure and improve transactions with your customers. Read More ›. More White Papers ›. Why Email Must Operate 24/7 and How to Make This Happen. Learn how to avoid an email outage by implementing a hosted email continuity solution. Download Now ›. Why Email Must Operate 24/7 and How to Make This Happen. Email Security for Dummies. Messaging and Web Threats. Email Security Comparison Guide.
itsecurity.com
Content Center - Vulnerability - IT Security
http://www.itsecurity.com/vulnerabilities
Updating Hash Security: NIST and SHA-3. Competition aims to make the Internet more secure for everyone. Bugtraq: ASP.DLL Include File Buffer Overflow. ASPDLL Include File Buffer Overflow Read more. Vuln: Gimp XCF load vector Function Buffer Overflow Vulnera. Gimp XCF load vector Function Buffer Overflow Vulnerability Advertisement ALERT: "How A Hacker Launches A Blind SQL Injection Attack . Vuln: Libtunepimp Multiple Remote Buffer Overflow Vulnerabi. Know what you need but unsure of the solution?
itsecurity.com
Vulnerability Scanning - IT Security
http://www.itsecurity.com/vulnerability-scanning
The Essential Guide to Vulnerability Scanning. What you need to know to reinforce your network's weak spots. Read More ›. More White Papers ›. The Need for Vulnerability Management. Why vulnerability management is essential to protect your business's network. Download Now ›. Dynamic Best Practices of Vulnerability Management. This white paper reviews "the laws of vulnerabilities" and applies these principles to the dynamic best practices for vulnerability management. Download Now ›. CyberX Launches the F...
itsecurity.com
Authentication & Access Control - IT Security
http://www.itsecurity.com/access-control
Authentication and Access Control. Mobile Work Force, Mobile Threats: Strategies for Preventing Mobile Security Breaches. IT professionals face a new wave of potential threats from the rapid growth in mobility. Read More ›. More White Papers ›. The Authenticated Network Architecture. A new security approach that addresses the increased mobility and diversity of today’s network users. Download Now ›. Assessing Endpoint Security Solutions. Why detection rates aren’t enough. Download Now ›. Access Control: ...
itsecurity.com
Network Access Control - IT Security
http://www.itsecurity.com/nac
NAC 20: A New Model for a More Secure Future. NAC 20 brings flexibility of control to ensure effective endpoint and network governance. Read More ›. More White Papers ›. The IT Security NAC Buyer's Guide. Learn what a NAC system can do for you and understand what issues you should consider during your decision-making process. Download Now ›. The Evolving Scope of NAC in the Enterprise. Network Security Beyond the Server Level. Getting the Knack of NAC. NAC Security: The New Hotness. The Latest PR in the ...
itsecurity.com
Spyware - IT Security
http://www.itsecurity.com/spyware
Welcome to Scam City: Rogue Anti-Spyware Apps. Don’t get duped by bogus malware-removal tools. Read More ›. More White Papers ›. Spyware: Know Your Enemy. The best way to defeat spyware is to know it inside and out. Download Now ›. This paper describes why traditional malware-fighting methods do not provide effective protection against sophisticated spyware because it mutates, neatly sidestepping signature- based solutions, Download Now ›. Protect your Business from Attack. Rid Your Network of Spyware.
itsecurity.com
Content Center - Interview - IT Security
http://www.itsecurity.com/interviews
Is Security a Solvable Problem? Or is security the computer equivalent of the War on Terror? Bruce Schneier gives us the story. Read More ›. Brave New World of Identity Management. Vadim Lander, chief security architect for CA, on how one identity can work across networks of federated enterprises to save companies money and grow the business. Read More ›. Measuring the Value of IT Security. You can't improve security if you can't measure its effectiveness says security expert and blogger Amrit Williams.
softwaredeveloper.com
How to: Get Google and AJAX to Play Nice - Software Developer
http://www.softwaredeveloper.com/features/google-ajax-play-nice-061907
How to: Get Google and AJAX to Play Nice. The best ways to incorporate the benefits of AJAX without making your site blind to search engines. If you build it, they will come. It seemed to work for Kevin Costner in Field of Dreams. But when it comes to your AJAX website, a great design just isnt enough to bring in an audience. Getting Started With The Google Web Toolkit. A Hype-Free Introduction to AJAX. Designing on a Dime: 100 Freebie CSS Resources. Enabling AJAX in ASP.NET with No Code. AJAX allows you...