Title: Network and Systems Management
 
AD New White Paper! Email Intrusion Prevention
The incidence of spam and malicious emails carrying viruses and worms continues to increase. Spammers' techniques have become more sophisticated, making first-generation content filtering technology obsolete. Download the latest Postini white paper to understand the latest email intrusions, how spammer techniques are rapidly evolving and what you can do to protect your organization today. Download now!
 



Network and Systems Management Tips

What's your information security gap?
[Mark Egan]
Symantec CIO Mark Egan examines the need for an information security program and attempts to identify the gap that exists between the perception of security and true network security. In this column he provides a three step process for identifying and closing the information security gap as well as implementing processes to keep the gap closed.

Top 5 ways to make your network more secure
[Tom Lancaster]
About this time of year, network administrators experience an event as common as it is frustrating: budget requests. This year, do yourself a favor and get a step ahead. Since security is always getting short-changed in the budget, I've put together a quick list to get you thinking about ways to improve your network.

Administrator Academy: Security series
[Firewall.cx]
  • Lesson 1: The threat to the enterprise
  • Lesson 2: Common security measures explained
  • Lesson 3: Intrusion-detection systems
  • Lesson 4: A walk-through of an attack


    Essential Links

    Guide to network security
    This guide introduces you to the main components in whole network security. You'll find articles, tutorials, tips, tools, white papers and more to pump up your network security quickly.

    Containment is essential for combating attacks
    Because your cyberdefenses are bound to be compromised eventually, your security strategy must include processes and technologies to contain the damage.

    Featured Topic: VoIP security
    What's one of the biggest roadblocks to deploying VoIP? Security issues, say our readers. Learn how to keep your implementation safe and reliable.

    Gray Hat Hacking: The Ethical Hacker's Handbook, Chapter 4
    Pen-Testing Process
    Chapter 4 of covers the non-technical and process aspects of ethical hacking. It discusses the difference between types of assessments, how to get started and continues with steps to a performing a successful assessment. (Reproduced from the book Gray Hat Hacking: The Ethical Hacker's Handbook, ISBN 0072257091, Copyright 2004, McGraw-Hill Companies. Reproduced by permission of McGraw-Hill, Two Penn Plaza, New York, NY 10121. Written permission from McGraw-Hill is required for all other uses. Click here for a detailed description and to learn how to purchase this title.)




    Contact Us
    Sales
    For sales inquiries, please contact us at:
    [EMAIL PROTECTED]

    Editorial
    For feedback about any of our articles or to send us your article ideas, please contact us at:
    [EMAIL PROTECTED]
    Free E-Newsletters!
    Select e-newsletters you would like to receive via e-mail!

    SearchNetworking: Today's News
    SearchNetworking: The Wireless Advisor


    Not a Member? We'll activate your membership with your subscription.



    ABOUT THIS E-NEWSLETTER
    TechTarget This e-newsletter is published by TechTarget, the most targeted IT media and events company.
    Copyright 2004 TechTarget. All rights reserved.

    To unsubscribe from "Network and Systems Management Tip":
    Go to unsubscribe: http://searchTechTarget.techtarget.com/u?cid=496721&lid=522392&track=NL-314

    Please note, unsubscribe requests may take up to 24 hours to process; you may receive additional mailings during that time. A confirmation e-mail will be sent when your request has been successfully processed.

    Contact Us:
    TechTarget
    Member Services
    117 Kendrick Street, Suite 800
    Needham, MA 02494

    Reply via email to