Anton Chuvakin

Recent articles by Anton Chuvakin

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

SECURITY LIBRARY: Incident Response - Investigating Computer Crime

Unlike other incident response books, this one has all the technical details.
Anton Chuvakin Jan 19 2004 11:24AM Security
Network IDS Shortcomings: Has NIDS Reached the End of the Road?

Network IDS Shortcomings: Has NIDS Reached the End of the Road?

The intrusion detection system (IDS) jumped from research labs and universities into being a standard information security safeguard in just several years.
Anton Chuvakin Jan 19 2004 10:48AM Security
SECURITY LIBRARY: Hacker's Challenge

SECURITY LIBRARY: Hacker's Challenge

Technical books of more than 350 pages are not meant to be read in one helping, like mystery novels.
Anton Chuvakin Jan 19 2004 9:58AM Security
Standardizing Penetration Testing

Standardizing Penetration Testing

While some people consider hacking a 'black art,' it surely has some scientific component to it due to the required knowledge of computers, operating systems and application software.
Anton Chuvakin Jan 16 2004 2:51PM Security
SECURITY LIBRARY: CERT Guide to System and Network Security

SECURITY LIBRARY: CERT Guide to System and Network Security

CERT (www.cert.org) has released a comprehensive guide for protecting information systems.
Anton Chuvakin Jan 16 2004 1:04PM Security
Lessons of the Honeypot I: Aggressive and Careless

Lessons of the Honeypot I: Aggressive and Careless

The amazing book of Lance Spitzner "Know Your Enemy" seems to have opened the floodgates of honeypot deployment.
Anton Chuvakin Jan 16 2004 12:51PM Security
Authentication: From Passwords to Public Keys

Authentication: From Passwords to Public Keys

An exciting book on authentication, of all things?
Anton Chuvakin Jan 16 2004 11:01AM Security
Take Back Your Security Infrastructure

Take Back Your Security Infrastructure

Imagine you work for one of those companies where information security is taken seriously, senior management support is for granted, the appropriate IT defenses are deployed and users are educated on the security policy.
Anton Chuvakin Jan 16 2004 10:08AM Security
Lessons of the Honeypot II: Expect the Unexpected

Lessons of the Honeypot II: Expect the Unexpected

Observation and monitoring of computer intruders have long been performed in a haphazard fashion, if at all.
Anton Chuvakin Jan 15 2004 2:31PM Security

Log In

  |  Forgot your password?