Perhaps the best way to visualize Defense in Depth as it relates to Information Security is to view the recent blockbuster movie: “The Two Towers”. When the antagonists approached the perimeter defenses at Helm’s Deep, they were first greeted by a volley of arrows.
Whenever a new virus threat appears, there is a period in which users are exposed to infection. This is because the virus has time to spread during the gap between the moment when the virus appears and the moment when the laboratories of antivirus companies provide their customers with an update to neutralize the new… Read More »
To understand the crime of identity theft and to see why it is such a rapidly growing problem you need to go back a few years. At that time here were criminal gangs that needed to launder the proceeds of their crimes.
Mobile and wireless technology with its freedom of flexibility, the increase of workplace productivity, which answer the need for communication and accessing information from anywhere and anytime, appeals to enterprise and home customers alike to take the next step and integrate wireless technology into their infrastructure.
Four years ago, the Internet community was caught off guard by a worm that sent itself in a message purporting to be a love letter. The now infamous LoveLetter virus was headline news for days. During this time users scrambled to protect their PCs.
This book is an upfront, no bull, book. It´s all about the essentials, it doesn´t bore you with commands you will never use, or about history you could care less about, it´s a short reference guide for the essential commands used in Linux. The book provides loads of examples and tips on how to use… Read More »
It is easy to see the impact that open source software has had on the developer community. A Google search for “open source” turns up over nineteen million results. That’s more than a similar search for “Oracle”, and nearly one-fifth as many as for “Microsoft”, the king of proprietary software.