Anton Chuvakin

Recent articles by Anton Chuvakin

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

Unlike other incident response books, this one has all the technical details.
Jan 19 2004 11:24AM
Network IDS Shortcomings: Has NIDS Reached the End of the Road?

Network IDS Shortcomings: Has NIDS Reached the End of the Road?

The intrusion detection system (IDS) jumped from research labs and universities into being a standard information security safeguard in just several years.
Jan 19 2004 10:48AM
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Jan 19 2004 9:58AM
Standardizing Penetration Testing

Standardizing Penetration Testing

While some people consider hacking a 'black art,' it surely has some scientific component to it due to the required knowledge of computers, operating systems and application software.
Jan 16 2004 2:51PM
SECURITY LIBRARY: CERT Guide to System and Network Security

SECURITY LIBRARY: CERT Guide to System and Network Security

CERT (www.cert.org) has released a comprehensive guide for protecting information systems.
Jan 16 2004 1:04PM
Lessons of the Honeypot I: Aggressive and Careless

Lessons of the Honeypot I: Aggressive and Careless

The amazing book of Lance Spitzner "Know Your Enemy" seems to have opened the floodgates of honeypot deployment.
Jan 16 2004 12:51PM
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Jan 16 2004 11:01AM
Take Back Your Security Infrastructure

Take Back Your Security Infrastructure

Imagine you work for one of those companies where information security is taken seriously, senior management support is for granted, the appropriate IT defenses are deployed and users are educated on the security policy.
Jan 16 2004 10:08AM
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Jan 15 2004 2:31PM

Log In

Username / Email:
Password:
  |  Forgot your password?