Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • White Papers // Mar 2007

    Intrusion Detection and Response in Ad Hoc Networks

    Ad hoc networks have received great attention in recent years, mainly due to their important advantages and their growing demand. Nevertheless, ad hoc networks present many inherent vulnerabilities and demand efficient security mechanisms in order to be safeguarded. An efficient intrusion detection approach combined with an authenticated intrusion response can...

    Provided By University of Phoenix

  • White Papers // Mar 2008

    Intrusion Detection in Mobile Ad Hoc Networks Using Classification Algorithms

    In this paper, the authors present the design and evaluation of intrusion detection models for MANETs using supervised classification algorithms. Specifically, they evaluate the performance of the Multi-Layer Perceptron (MLP), the linear classifier, the Gaussian Mixture Model (GMM), the naive bayes classifier and the Support Vector Machine (SVM). The performance...

    Provided By University of Phoenix

  • White Papers // Jun 2006

    Intrusion Detection of Packet Dropping Attacks in Mobile Ad Hoc Networks

    The evolution of wireless network technologies and the recent advances in mobile computing hardware have made possible the introduction of various applications in mobile ad hoc networks. Not only is the infrastructure of these networks inherently vulnerable but they have increased requirements regarding their security as well. As intrusion prevention...

    Provided By University of Phoenix

  • White Papers // Jan 2008

    Intrusion Detection Using Emergent Self-organizing Maps

    In this paper, the authors propose an intrusion detection approach that is based on a class of neural networks known as Kohonen's Self-Organizing Maps (KSOMs). Their approach combines information visualization and machine learning techniques and enables the user with the ability to have a visual view of network activity. In...

    Provided By University of Phoenix

  • White Papers // Oct 2011

    Cryptography Goes to the Cloud

    The wide adoption of cloud computing is raising several concerns about treatment of data in the cloud. In this paper the authors identify some areas where cryptography can help a rapid adoption of cloud computing. Although secure storage has already captured the attention of many cloud providers, offering a higher...

    Provided By University of Phoenix

  • White Papers // Mar 2013

    A Survey on Security and Privacy Issues in Wireless Mesh Networks

    Wireless Mesh Networks (WMNs) are characterized by dynamic self-organization, self-configuration and self-healing to enable flexible integration, quick deployment, easy maintenance, low cost, and may also be used to improve the performance of multi-hop ad-hoc networks, Wireless Local Areas Networks (WLANs) and Wireless Metropolitan Area Networks (WMANs). Wireless Mesh Networks (WMNs)...

    Provided By University of Phoenix

  • White Papers // Dec 2008

    Project Risk Management - Advantages And Pitfalls

    Proper project decision-making requires that risk management and risk analysis techniques be applied in order to guide management in making better decisions. Cost estimates attempt to define projects as single point values whereas virtually all project variables are variable and may deviate from the values assumed in preparing the original...

    Provided By International Cost Engineering Council

  • Podcasts // Jul 2010

    How Do I: Configure Report Security in SSRS?

    This podcast, the speaker tells about how configure SSRS report security using both default and custom roles This demo shows how to: grant a user access to a report & folder, grant group access to a report & folder, create a custom role in SSRS, configure users to utilize the...

    Provided By Microsoft Corporation

  • Podcasts // Jul 2010

    How Do I: Enable Transparent Data Encryption?

    In this podcast the speaker tells about how to use the transparent data encryption (TDE) feature of SQL Server 2008 Enterprise Edition. In addition to showing how to create the keys and certificates necessary to enable TDE, Scott encrypts the Adventure Works sample database.

    Provided By Microsoft Corporation

  • White Papers // Jun 2010

    Baaz: A System for Detecting Access Control Misconfigurations

    Maintaining correct access control to shared resources such as file servers, wikis, and databases is an important part of enterprise network management. A combination of many factors, including high rates of churn in organizational roles, policy changes, and dynamic information sharing scenarios, can trigger frequent updates to user permissions, leading...

    Provided By Microsoft Corporation

  • White Papers // Jul 2010

    A Complete Declarative Debugger for Maude

    This paper presents a declarative debugger for Maude specifications that allows to debug wrong answers (a wrong result is obtained) and missing answers (a correct but incomplete result is obtained) due to both wrong and missing statements and wrong search conditions. The debugger builds a tree representing the computation and...

    Provided By Complutensian University of Madrid

  • White Papers // Apr 2013

    FlexList: Optimized Skip List for Secure Cloud Storage

    With the increase in popularity of cloud data storage, efficiently proving the integrity of the data stored at an untrusted server has become significant. Authenticated Skip Lists and Rank-based Authenticated Skip Lists (RBASL) have been used in cloud storage as a randomized alternative to balanced trees, without the need to...

    Provided By Koc University

  • White Papers // Feb 2009

    IP Surveillance Systems Powered by Feature-Rich Software - A Winning Combination

    In today's uncertain economic climate, it's more important than ever for businesses to protect their assets, decrease losses and provide a secure working environment. A key element for achieving these goals includes the effective use of an IP surveillance solution that leverages powerful and easy-to-use software to manage the network...

    Provided By D-Link

  • White Papers // Aug 2008

    Protect Networks From Non-Compliant Remote Computers With D-Link Switches and Microsoft Network Access Protection (NAP)

    As more and more users work from the road, at home and at Wi-Fi hotspots within the community, tainted clients are routinely infiltrating hardened local networks. Corporate users, for example, pick up viruses and fail to install patches while working remotely. They return to the LAN and authenticate, often exposing...

    Provided By D-Link

  • White Papers // Nov 2008

    IP Surveillance for the Retail Market

    With some difficult economic years ahead, the retail market is faced with stronger competition and consumers with much tighter pockets. This environment makes it critical to deploy new operational tools that promise enhanced profitability. Using the latest networking technologies to link and streamline every aspect of the operation, retailers are...

    Provided By D-Link

  • White Papers // Mar 2014

    Conjunctive Fuzzy Keyword Search Over Encrypted Data in Cloud Computing

    As cloud computing becomes prevalent, more and more sensitive information is centralized into the cloud. For the protect data privacy, sensitive data usually have to be encrypted before outsourcing, which makes efficient data utilization a very challenging task. Although traditional searchable encryption schemes allow a user to search over encrypted...

    Provided By IAES

  • White Papers // Aug 2012

    Performance Analysis of Load Minimization in AODV and FSR

    Mobile Ad-hoc NETwork (MANET) is one of the important technologies in the emerging field; therefore research concerning its security problem especially, intrusion detection has attracted many researchers. Analyzing methodology plays a central role in the data analysis process. Dynamic State Routing (DSR) results in reducing performances of detection system because...

    Provided By IAES

  • White Papers // Aug 2012

    A New Signature Scheme Based on Factoring and Discrete Logarithm Problems

    It is well-known that Diffie and Hellman gave the concept of public key cryptography. Since then, several public key cryptosystems based on a hard mathematical problem either factoring or discrete logarithms have been proposed. Those cryptosystems in which said problem was easy to solve were found to be insecure. Also,...

    Provided By IAES

  • White Papers // Aug 2012

    Novel Shoulder-Surfing Resistant Authentication Schemes Using Text-Graphical Passwords

    There are many applications which require the user to be authenticated before being permitted to perform certain tasks. Text password-based authentication is a popularly used authentication mechanism. Despite having greater security, text-passwords are characterized by selection of a weak and easy to remember passwords. Users also tend to write them...

    Provided By IAES

  • Podcasts // Mar 2010

    Enable Better Decision Making With Microsoft Business Intelligence

    In this podcast, the speakers tell about Microsoft's business intelligence vision and how Microsoft SQL Server 2008 R2 can help businesses derive more value from the information they already have.

    Provided By Microsoft Corporation

  • Podcasts // Apr 2009

    Windows Mobile Digital Certificate Management

    Digital Certificates and public/private key technology is core to Windows Mobile platform security. In this podcast, people can learn how certificates are used to provide authentication, access control and encryption for the OS, applications and networking.

    Provided By Microsoft Corporation

  • White Papers // Feb 2014

    Building a Better Network Security Strategy

    In today's global, always-on world, network security is crucial. Enterprises need to ensure that employees accessing their networks are secure at all times. To accomplish this, a comprehensive network security strategy must address a number of factors including how to increase network reliability, efficiently administer security, and guard against evolving...

    Provided By HP US

  • White Papers // Feb 2014

    8 Ways to Better Monitor Network Security Threats in the Age of BYOD

    Unless you operate out of a cave, chances are your business has become awash with connected devices brought into the enterprise by everyone from the CEO to factory floor workers. The age of BYOD is here, and with it a myriad of threats and challenges so broad that some have...

    Provided By HP US

  • White Papers // Feb 2014

    Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions At a time when IT budgets are coming under closer scrutiny, CISOs are being called upon to justify SSA investments from a cost-benefit perspective. For CISOs, the thrust of this study is clear: Software security solutions are providing substantial operational...

    Provided By HP US

  • White Papers // Mar 2014

    Advanced Data Protection For Your Virtualized Environments

    Virtualization is the leading technology for transforming today's data centers. While it offers several benefits in terms of cost reduction and operational efficiency, data protection in virtualized environments is actually one of the biggest information management challenges. In this paper you will learn: Top five challenges that you...

    Provided By HP US

  • White Papers // Mar 2014

    Protecting Critical Business Information Beyond the Data Center

    Mobile working has become the norm rather than the exception. However, protecting the information that resides on a wide array of distributed endpoints is quite challenging – especially when it comes to backup and recovery. Discover why data protection for distributed environments differs from traditional server backup and recovery...

    Provided By HP US

  • White Papers // Mar 2014

    Achieving Security with Cloud Data Protection

    More and more organizations are recognizing the value and convenience of using cloud backup to protect server data. This exclusive paper discusses a hosted data storage solution that enables you to reduce the costs, risks and complexity of storing and protecting your business information, taking a heightened focus on...

    Provided By HP US

  • White Papers // Mar 2014

    Backing Up Big Data

    Organizations worldwide are facing explosive information growth thanks to trends in mobile computing, collaboration and social media. This deluge of unstructured data is forcing IT departments to rethink data management strategies. The challenge? Finding an effective way protect and back up company data while also making it available to be...

    Provided By HP US

  • White Papers // Mar 2014

    Research Report: 2013 Cost of Cyber Crime Study

    A Ponemon Institute research study sponsored by HP is based on a representative sample of 60 organisations in various industry sectors. Read this report now to learn how this benchmark research quantifies the economic impact of cyber attacks and observe cost trends over time.

    Provided By HP US

  • White Papers // Mar 2014

    Infographic: Fight Cyber Crime

    A Ponemon Institute infographic sponsored by HP presents a quick and clear information on how to fight Cyber Crime. Download this report now to learn how HP helps organisations identify the source of security attacks and solve them before incurring costly downtime.

    Provided By HP US

  • White Papers // Mar 2014

    HP Mobile Application Security Vulnerability Report

    This report will give you an overview about mobile applications security threats and vulnerabilities. Read this report now to learn how HP helps organisations put emphasis on the need for a mobile application strategy.

    Provided By HP US

  • White Papers // May 2012

    Eight questions about your intrusion security solution

    There is some confusion in the marketplace about intrusion security systems. The truth is that the capabilities and underlying design of intrusion detection and intrusion prevention systems couldn't be more different. While the acronyms and product claims sound similar, only one approach to network security can block a wide variety...

    Provided By HP US

  • White Papers // May 2012

    Delivering software security in the cloud

    HP Fortify on Demand is a security-as-a-service testing solution that allows any organisation to test the security of software quickly, accurately, affordably, and without any software to install or manage. This automated on-demand service helps organisations with two key challenges: - Ensuring the security of applications licensed from third parties...

    Provided By HP US

  • White Papers // May 2012

    Scada after Stuxnet: Best practice to reduce risk

    In June 2009, a sophisticated and destructive digital worm was unleashed with a single-minded purpose: to cripple the industrial control infrastructure instrumental to Iran's uranium enrichment program. The Stuxnet virus not only became known as one of the most potent "zero-day" attacks on a critical infrastructure that included a Supervisory...

    Provided By HP US

  • White Papers // May 2012

    How to defend mobile applications

    The standard for being on the cutting edge of business is a mobile storefront on smartphones and tablets. Without this mobile presence, you'll lose business to competitors who have them. With this new challenge come high risks as well as great rewards. Your customers can now perform sensitive transactions anywhere,...

    Provided By HP US

  • White Papers // May 2012

    Uncover cybersecurity threats and risk with advanced visualisation

    ArcSight Interactive Discovery gives you an unprecedented understanding of cyberthreats through powerful visual analytics, allowing you to discover hidden risks and easily communicate findings.

    Provided By HP US

  • Videos // May 2014

    Case study: Virgin Media

    A short video that gives some insights about delivering quality in a short span of time. Watch this now and learn on how HP helped organisations improve their testing qualities.

    Provided By HP US

  • White Papers // May 2014

    Research report: Does Application Security Pay?

    Measuring the Business Impact of Software Security Assurance Solutions This research report will give you insights on how to manage information security and protect against cyber attacks. Read more in this research paper by Mainstay and learn how HP security solutions helped organisations in providing substantial operational and strategic benefits.

    Provided By HP US

  • White Papers // May 2014

    Business Whitepaper: Seven steps to software security

    A report that provides seven practical steps in securing applications. Find out how-by reading this report and prevent the damages a cyber attack brings.

    Provided By HP US

  • Videos // Jun 2014

    HP.com Takes 3M Hits on Moonshot

    Volker Otto talks about the results of using Moonshot for HP.com's web site, caching, and ftp downloads.

    Provided By HP US