home > security security
Showing 1 - 10 of 349
williamstt, 12 pages
A discussion of the methods used by hackers to attack IIS web servers, and how you can use event log monitoring on your web server to be alerted to successful attacks immediately.
williamstt, 9 pages
How to Get Real Security
$11,000 PER SECOND CAN'T KEEP US SAFE
by Amory b. Lovins
williamstt, 82 pages
The presence of hunger in American households due to insufficient resources to obtain food has been a long-standing challenge to U.S. health, nutrition, and social policy. The success of the nation's ...
fitzgibbons, 10 pages
It is important to understand the concepts of a database before one can grasp database security. A generic database definition is “a usually large collection of data organized especially for ...
fitzgibbons, 17 pages
It is very easy in the security community to create an air of fear, uncertainty, and doubt (FUD). As Oracle professionals, it's important to see through the FUD, determine the actual risks, and ...
fitzgibbons, 51 pages
What we are going to do is look at security from a different perspective – to see how an attacker would approach your database and how you can stop an attacker. Without understanding the ...
fitzgibbons, 11 pages
Is Your Database “Breakable”?
How Performance Testing Helps You Find Out
This paper discusses how to plan for a truly ‘unbreakable’ database. It covers the ...
cald, 12 pages
This book is about hacking ethically — the science of testing your computers and network for security vulnerabilities and plugging the holes you find before the bad guys get a chance to exploit ...
cald, 10 pages
Understanding the need to test your wireless systems
Thinking like a hacker
Preparing for your ethical hacks
Important security tests to carry out
cald, 34 pages
This paper considers various classes of computer hackers, with a special emphasis on fame-driven versus profit-driven hackers. We use simple economic analysis to examine how each of these hacking ...