CISSP Security Management and Practices

CISSP Training Guide, Chapter 3, contributed by Scott Barman This sample chapter covers Domain 3, Security Management Practices, 1 of 10 domains of the Common Body of Knowledge (CBK) covered in the Certified Information Systems Security Professional Examination. NOTE:...

Writing Mobile Code Policies

Originally published April 5, 2002 at InformIT.com It started with a simple idea: Allow the user to download a small piece of software that would enhance his or her online experience. Programmers could use this software to customize pages, do data validation on forms,...

Creating an Information Policy

published November 16, 2001 at InformIT.com This article is excerpted from Writing Information Security Policies by Scott Barman Hardly a week passes without hearing about a new virus, worm, or Trojan Horse that infects networks of computers. These problems not only...

Upgrading Software Development Security

Originally published April 5, 2002 at InformIT.com I recently received a warning, reporting that a popular program has yet another security problem because of a buffer overflow. I had to laugh, thinking back to Microsoft CEO Steve Ballmer’s retort, “You would think we...

Pin It on Pinterest