Category Archives: Firewalls

Modern Web Application Firewalls Fingerprinting and Bypassing XSS Filters

Web applications continue to be a primary attack vector for cyber-crimes, and the charts show no sign of abating. Vulnerabilities in web applications are a target and can be attributed to many problems and can damage a company. This means poor input validation, session management, insecure, system settings configured incorrectly […]

Read More

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users–Free Sample Chapter

Defending your web applications against hackers and attackers. The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this […]

Read More

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions–Free Sample Chapters

A must-have, hands-on guide for working in the cybersecurity profession! Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include […]

Read More

Let Us Help You Help Your CIO

Why the manufacturing industry needs enterprise grade file sharing. You know how important information security and corporate compliance is to your organization, and how disruptive it is when employees work around IT to find their own productivity tools. Your employees need to securely share and control IP with partners, suppliers, […]

Read More

4 Smart Tips for Secure File Sharing and Improving Productivity

In today’s highly mobile work environment, your company’s intellectual property (IP), whether that’s patents, trade secrets or just employee know-how, may be more valuable than its physical assets. Sending IP outside your firewall can invite a data breach that could be extremely costly. This informative white paper describes 4 file […]

Read More

For Data Security Professionals – Smart Devices, Smart Security

Once mostly prohibited by IT, smartphones and tablets–such as Android-based phones and Apple iPads–are now being used by hundreds of millions of employees worldwide to access, transmit and store corporate information in today’s 24×7 business environment. This “ex­tended enterprise” introduces new challenges and complexities for IT. Not surprisingly, secu­rity has […]

Read More

Samba-3 by Example: Practical Exercises to Successful Deployment 2nd Edition

The practical, tested, step-by-step Samba-3 ebook has now been fully updated to reflect the latest Samba releases and migration techniques! This book’s complete configuration files, step-by-step implementation instructions, network diagrams, and automated scripts make deployment a breeze–even if you’ve never worked with Samba before. From small office networks to enterprise […]

Read More

Cost-Effective Business Intelligence as a Service

Read this white paper to learn about the keys for successfully building and deploying SaaS-based BI applications for external users, all while keeping costs at a minimum. This paper highlights key requirements for successfully building and deploying SaaS-based BI applications for external users, and how some companies are using the […]

Read More

Open Source Security Tools: A Practical Guide to Security Applications

Few frontline system administrators can afford to spend all day worrying about security. But in this age of widespread virus infections, worms, and digital attacks, no one can afford to neglect network defenses. Written with the harried IT manager in mind, Open Source Security Tools is a practical, hands-on introduction […]

Read More

Linux® Quick Fix Notebook- Free 696 Page eBook

An indispensable ebook for every Linux administrator! Instant access to precise, step-by-step solutions for every essential Linux administration task from basic configuration and troubleshooting to advanced security and optimization.If you’re responsible for delivering results with Linux, Linux® Quick Fix Notebook brings together all the step-by-step instructions, precise configuration commands, and […]

Read More

PC Security Handbook – 2nd Edition

Defensive Computing Techniques to Help You Avoid Malware and Data Loss. This handbook is designed to help you find ways to protect your Windows XP/Vista/7 PC and ensure your data is safe. The author gets countless emails from site visitors who ask about the best anti-virus software, firewall program, backup […]

Read More

Managed File Transfer for Banking, Insurance and Financial Institutions

Gain valuable information on the Inovis Managed File Transfer solution and how it can help you meet governance and security mandates. Whether users are transferring files between trading partners or within an organization, Inovis manages the entire MFT lifecycle and is the only enterprise-wide service that spans the disparate platforms […]

Read More

Managing Application Performance in the Internet Era

This Enterprise Management Associates® (EMA™) white paper looks at the environmental requirements and the matching design requirements for capturing real-world application performance interdependencies in this “Internet Era.” It then assesses Compuware’s unified approach to combine enterprise and Internet application performance monitoring for more advanced service management and diagnostics across all […]

Read More

Automated Configuration Management: Why it Matters and How to Get Started

Are you spending more time fighting fires than adding functionality? Managing too many tasks with ad-hoc manual changes and handwritten scripts? It’s time to automate your configuration management. Configuration management is a critical cornerstone of IT automation, providing tools that allow you to centrally manage the packages, configuration files, process […]

Read More

ADTRAN Outperforms Cisco in Tolly Group Tests

Tolly Group Test Proves ADTRAN Multiservice Access Router Outperforms. View this competitive performance evaluation from the Tolly Group and see why ADTRAN outperformed Cisco. This independent Tolly Group test summary confirms that the ADTRAN NetVanta 3430 multiservice access router delivers up to double the performance of zero-loss throughput and exceptional […]

Read More

10 Metrics to Monitor in the LTE Network

Download this free whitepaper to learn the 10 critical metrics for successful monitoring of an LTE network and solutions to your LTE monitoring challenges. The deployment of LTE increases dependency on your underlying network. In order to ensure Quality of Experience (QoE) for your customer, you must monitor a number […]

Read More

Close your account?

Your account will be closed and all data will be permanently deleted and cannot be recovered. Are you sure?