Search For:

Displaying 1-3 out of 3 total
Managing Security: The Security Content Automation Protocol
Found in: IT Professional
By Shirley Radack,Rick Kuhn
Issue Date:January 2011
pp. 9-11
Most organizations have an extensive set of security requirements, established for commercial firms through complex interactions of business goals, government regulations, and insurance requirements. Meeting these requirements has been time consuming and e...
 
Protecting Wireless Local Area Networks
Found in: IT Professional
By Shirley Radack,Rick Kuhn
Issue Date:November 2012
pp. 59-61
To help organizations improve their WLAN security, the National Institute of Standards and Technology recently published Guidelines for Securing Wireless Local Area Networks (WLANs): Recommendations of the National Institute of Standards and Technology. He...
 
Basic Intrusion Protection: The First Line of Defense
Found in: IT Professional
By Dennis Steinauer, Stuart Katzke, Shirley Radack
Issue Date:January 1999
pp. 43-48
<p>Making your system safe is no cinch, but here's a guide to getting started.</p>
 
 1