Category Archives: Authentication

Security for E-Signatures and E-Transactions

Discover how to build effective, end-to-end security around your business tractions with electronic signature security. What is electronic signature security, and why is it important? What security is needed, and how much? How and when to apply security to electronic signatures, transactions and records? What techniques and methodologies will ensure […]

Read More

Implementing CIFS: The Common Internet File System

The first developer’s guide to Microsoft®’s Internet/Intranet file sharing standard For years, developers and administrators have struggled to understand CIFS, Microsoft's poorly documented standard for Internet file sharing. Finally, there is an authoritative, cross-platform guide to CIFS capabilities and behavior. Implementing CIFS not only delivers the priceless knowledge of a […]

Read More

Citrix XenServer 6.0 Administration Essential Guide–Free 34 Page Excerpt

Virtualization helps an organization reduce costs and achieve low maintenance. It is fast becoming an important skill for all administrators. Citrix’s XenServer is one of the leading virtualization solutions for enterprises and helps companies reduce costs while allowing them to integrate, automate and easily manage their datacenters. It comes with […]

Read More

FFIEC Authentication Guidance: How to Conform to Combat Fraud

Fraud prevention best practices for IT professionals in banks and credit unions. The recent supplement to FFIEC authentication guidance for Internet banking puts renewed focus on compliance with the GLBA and the FFIEC guidelines. More importantly, this guidance offers the framework banks and credit unions need to develop an information […]

Read More

Keeping Secrets: Good Password Practice

The password remains one of the most susceptible components of even the most advanced security system. Alternative and supplementary forms of authentication have become far more common (and affordable), but the humble password remains the somewhat crumbling gatehouse to many a security structure. Learn how to tighten the weakest link […]

Read More

The Official Samba-3 HOWTO and Reference Guide 2nd Edition

Fully Updated to Reflect Major Improvements and Configuration Changes in Samba-3.0.11 through 3.0.20+! You’ve deployed Samba: Now get the most out of it with today’s definitive guide to maximizing Samba performance, stability, reliability, and power in your production environment. Direct from members of the Samba Team, The Official Samba-3 HOWTO […]

Read More

Samba-3 by Example: Practical Exercises to Successful Deployment 2nd Edition

The practical, tested, step-by-step Samba-3 ebook has now been fully updated to reflect the latest Samba releases and migration techniques! This book’s complete configuration files, step-by-step implementation instructions, network diagrams, and automated scripts make deployment a breeze–even if you’ve never worked with Samba before. From small office networks to enterprise […]

Read More

Linux® Quick Fix Notebook- Free 696 Page eBook

An indispensable ebook for every Linux administrator! Instant access to precise, step-by-step solutions for every essential Linux administration task from basic configuration and troubleshooting to advanced security and optimization.If you’re responsible for delivering results with Linux, Linux® Quick Fix Notebook brings together all the step-by-step instructions, precise configuration commands, and […]

Read More

PasswordCourier with Telephone Access

Learn how to reset forgotten passwords through an Interactive Voice Response application, using a touch-tone telephone. Courion’s PasswordCourier® Telephone Access guides users quickly and easily through prompts that enable the user to respond to authentication questions and choose systems for password reset, enabling help desk agents to focus on more […]

Read More

Oracle Web Services Manager: Authentication and Authorization

A free sample chapter from Packt Enterprise’s book: Oracle Web Services Manager. The first step in protecting web services is to authenticate and authorize the web service requests. Authentication in web services is the process of verifying that the user has valid credentials to access the web services and authorization […]

Read More

Best Practices in Managing Intentional and Unintentional Security Threats

Ensure safety and protect your WLAN network from attacks! Wireless LANS have always been vulnerable to a long list of security threats. Help ensure the safety and protection of your network. Physical Layer attacks that attempt to penetrate WiFi security include: Rogue access points Authentication attacks Evil twin access points […]

Read More

Authentication Solutions Through Keystroke Dynamics

Provides an in-depth study of keystroke dynamics and how it’s used today to fully secure enterprises and prevent fraud. Achieving network and application security in the face of an ever-changing population of customers, suppliers, partners, and employees requires fully verifying user identities. It’s no longer effective to rely on user […]

Read More

802.1X Authentication Standard for Network Access Control

Implement enterprise-wide secure wireless LAN access. In record numbers organizations are embracing mobility and wireless access (WLAN). They demand hassle-free, anytime, anywhere access that enables employees to be connected and productive 24/7. While mobility and wireless network access are highly desirable, maintaining security remains a key concern for enterprises. The […]

Read More

10 Metrics to Monitor in the LTE Network

Download this free whitepaper to learn the 10 critical metrics for successful monitoring of an LTE network and solutions to your LTE monitoring challenges. The deployment of LTE increases dependency on your underlying network. In order to ensure Quality of Experience (QoE) for your customer, you must monitor a number […]

Read More

NIST & DOD Guidelines for Secure Mobile Device Management

The line-in-the-sand for securing and managing mobile devices in government agencies and public sector offices has been drawn. Now is the time to prepare for the guidelines set forth by the National Institute of Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) by exploring the vulnerabilities of […]

Read More

Email Security: How To Prevent Spoofing & Phishing

Hackers and phishers have become more advanced in their skills and have found ways to present themselves to your customers so that they believe the message is actually coming from your company. Email security isn't as cut and dry as just marking messages from Nigerian princes as SPAM. Without the […]

Read More

Protecting and Optimizing Exchange Environments

Learn how to address the most common security and stability issues for Exchange and groupware networks. Discover the keys to keeping Exchange and other groupware free of proliferating storage space and spam issues. Inside this compelling white paper, you’ll get a look at critical requirements for securing Exchange, including defense […]

Read More

Combating Spam: Best Practices

Spam has increased more than 200% since 2005. Learn new prevention techniques for protecting your organization—in 2008 and beyond. This best practices paper is designed to help you fight the 93% of Internet traffic classified as spam. Spam can increase liability and reduce ROI, but companies like yours are learning […]

Read More

Who Leads in WLAN Security?

Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue discussion and vendor rankings. Today’s WLAN security market is filled with stopgap solutions while vendors wait for finalization of standards that include specifications for roaming, load balancing, management frame encryption, and management. Top considerations when […]

Read More

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?