INFORMATION

Site Map - How-to

A Site to See

- You might look at a pair of Lego MindStorm robots as high-tech toys for the kids. Hard-core technophiles might see those same robots, which come equipped with software brains and are fully mobile, as tools to help them learn about genomes by programming them to “mate” (that is, combine their software, including some chance of mutations, to create “robot progeny”). This kind of technique—or hack, as it’s commonly known—is one example of the type of high-tech content that can be found on hack a day, a blog dedicated to technotinkerers.@ Check out hack a day, this month’s A Site to See, through SM Online.

The Ethical Hack: A Framework for Business Value Penetration Testing.

- Tiller does a fantastic job explaining the process of the ethical hack from beginning to end. By way of charts, diagrams, graphs, and comparisons, the reader is led step by step through a penetration test. Also provided are sample incident reports and response forms, examples of documentation needed for the test, and an example of how the finished penetration-test document should be presented.

The Safe Hiring Manual: The Complete Guide to Keeping Criminals, Terrorists, and Imposters Out of Your Workplace

- One of the most useful, and untapped, security tools at any business is the human resources department. HR serves as the operational equivalent of an access control system, keeping problem employees off the payroll. Many companies fail to take full advantage of this department.

New in plaintext.

- The book’s ten chapters cover every kind of potential irritant, from security issues to e-mail and spam to using AOL. The book is aimed at novice users, so no in-depth knowledge of programming is needed to put these fixes into action.

Can I See Some ID?

- I.D. Checking Guide: United States & Canada Edition and I.D. Checking Guide: International Edition depict driver’s licenses from all over the United States and the world. Most states are in the process of updating their licenses and have two or three styles of valid licenses. The guide depicts each license design that is valid this year. The cost of the U.S./Canada edition ranges from about $13 to $23, depending on the number of copies purchased. The international title ranges from about $22 to $35. @ For more information, go to SM Online.

Nothing Succeeds Like Succession Planning

- Find out how to groom your most capable staff for the management track.

Malware: Fighting Malicious Code

- Author Ed Skoudis provides amazing insight into the types of tools attackers use to bring down computers and networks or to steal and manipulate information stored on those systems. As would be expected, worms and viruses receive considerable attention, but Skoudis also is adept at explaining backdoors, Trojan horses, malicious mobile code, rootkits, and numerous other tools and scenarios.

New in Plain Text : Test Driving Linux

- Every time you install a new program onto your computer, there is some risk that the program will not play nicely with the rest of the applications you’re running. So imagine the risks of installing a new operating system to see how it works.

BE PREPARED

- Homeowners must also be prepared for terrorist incidents, says the Department of Homeland Security and the Homeowners Alliance. The two groups jointly released an emergency preparedness guide that encourages storing extra food and water, developing a communications network, and educating families on biological and chemical threats.   

Be Prepared

- Homeowners must also be prepared for terrorist incidents,says the Department of Homeland Security and the Homeowners Alliance. The two groups jointly released an emergency preparedness guide that encourages storing extra food and water, developing a communications network, and educating families on biological and chemical threats.

Homeland Defense

- The Department of Defense has issued its “Strategy for Homeland Defense and Civil Support,” addressing DoD’s roles in the homeland defense mission.

Quick Bytes: Spoof proof.

- Phishing and pharming scams typically rely on Web-site spoofing, where fraudulent but realistic-looking versions of real sites trick customers into providing sensitive information to con artists. Because financial institution Web sites are typically the ones that get spoofed, the Office of the Comptroller of the Currency (OCC) has released a paper to help banks respond to spoofing incidents. @ The OCC bulletin is available through SM Online.

New in plaintext: Firefox secrets revealed

- The number of users of alternative Web browser Firefox is growing steadily; while Microsoft’s Internet Explorer still dominates the market, some analysts put the number of Firefox users at more than 64 million. If you are one of those users, you’ve probably spent some time with the basics—learning how to use tabs and themes, for example.
 




Beyond Print

SM Online

See all the latest links and resources that supplement the current issue of Security Management magazine.