INFORMATION

Site Map - IT

Trojans Bearing Gifts

- Malicious code threats continue to rise, according to this software company report.

IT Gets Respect

- According to a survey of IT in the corporate world, the importance of IT security professionals is finally being recognized.

Computer Forensics: Computer Crime Scene Investigation, Second Edition

- For novices or general security practitioners, on the other hand, the information can be bewildering. The information is too detailed and complicated for beginners.

Digital Evidence and Computer Crime, Second Edition

- The bits-and-bytes material is cushioned by rich context, with sections addressing the history of computer crime and the methods and mind-sets of computer criminals.

And the Incorrect Answer Is: “No Comment"

- Why is “No comment” the wrong response to any media question? According to the authors, those words precipitate questions such as, “What are you trying to hide?” and “What’s really going on here?” They offer tips on what needs to be said and how to say it.

19 Deadly Sins of Software Security

- The book covers these 19 programming flaws, which include the most devastating types of coding and architectural errors, such as buffer overflows, format string problems, cross-site scripting, and insufficient encryption.

Numbers

-

New in Plaintext

- Dan Sullivan, an author and security expert, has penned a comprehensive text that will help readers better understand how these losses occur and how to prevent them. The Definitive Guide to Information Theft Prevention is an eight-chapter e-book available for free (the e-book is sponsored by Permeo Technologies, a provider of secure remote-access solutions)

A Site to See

- The next time you see Microsoft Windows’ “blue screen of death” or a “fatal error” message flash across your monitor, don’t get angry; reboot and then point your browser toward the DistroWatch Web site

Laws to Aid Breach Victims

- A Chronology of Data Breaches Reported Since the ChoicePoint Incident outlines many of 2005’s breaches and their causes, from 250 individuals who were put at risk when computers at East Carolina University were hacked to the millions at risk from breaches at CardSystems.

Quick Bytes: Risky e-mail

- he survey, which received responses from 1,042 workers in the U.S., was conducted by Harris Interactive for managed e-mail archiving company Fortiva

Worth a Look: A Web Camera for Surveillance

- Now, setting up a surveillance network—including motion-activation sensors—is as simple as plugging a Web camera into a computer’s USB port.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.