یک سری مقاله و مطلب به زبان انگلیسی
من در سایت techRepublice عضو هستم - امروز یک ایمیل حاوی یک سری مقالات که به نظر من جالب بودن از این سایت دریافت کردم - گفتم این ایمیل رو اینجا بزارم تا دوستان هرکسی که علاقه داشت از اونها استفاده کنه
[LEFT]Five Security Worst Practices
Check out these NEW, FREE downloads, exclusively for TechRepublic members:
[URL=http://ct.com.com/click?q=d5-p~miQzL34sb7Y22y7ZrjNiS3VeeX]Don't Fall Prey to these Five Security Oversights[/URL]
All organizations face the same security challenge, regardless of their size—keeping intruders away from their private information. However, most companies tend to fall into the same traps and make the same mistakes. John McCormick cites five of the worst security practices he frequently comes across.
[URL=http://ct.com.com/click?q=e4-ABpFQVkZ4EH658NLQ8d0PTwc98KY]Users Share 11 Complaints about IT Support[/URL]
It helps to take a step back occasionally and consider support from the user's perspective, and that's what Becky Roberts has done. To try to get a handle on what drives user complaints, she compiled a list of the most common issues she hears about, including performance problems, resistance to policies and security measures, and perceptions of the IT staff's attitude and responsiveness.
[URL=http://ct.com.com/click?q=5a-ah31IP0JdbnbKGM5GSBLpkUlzaOq]Educate Your Users about E-Mail Safety with this PowerPoint Presentation[/URL]
One of the most important aspects of e-mail security is user education. This PowerPoint presentation by Joshua Hoskins entitled "Practice e-mail safety" provides IT professionals with a slide show that they can present to help end users avoid viruses, SPAM, phishing scams, and other e-mail threats.
[URL=http://ct.com.com/click?q=a6-9z_4QCULLqMjCt6wt~ocnvI7sMbR]White Paper: Migrating to Converged Networks and IP Telephony Applications[/URL]
This paper from Avaya explores the new requirements that migration to converged voice and data networks is creating for IP Telephony architectures and their operation and management.
[URL=http://ct.com.com/click?q=1b-wAchI3NAz6pu9eG8_hNMau21Rp1g]Automate Your Visual Studio .NET Build Process[/URL] One of the most effective ways to avoid problems when performing the application build process is through automation. This download shows you how to automate the build process in Microsoft's Visual Studio .NET with a batch file and by using the nUnit class library.
[URL=http://ct.com.com/click?q=ba-m~u5QXpzTQAQcS_sxIJI_ujPWJy4]LAN Topologies Explained[/URL]
This sample chapter, taken from Cisco Press' Network Consultants Handbook, covers the three LAN transmission types (unicast, multicast, and broadcast), basic LAN addressing, and the four basic LAN topologies (star, ring, bus, and tree). The chapter clearly and thoroughly explains each LAN topology. The content is perfect for the novice IT pro who wants to understand basic networking.
[URL=http://ct.com.com/click?q=58-mrOxIdJmsfre9MNQrDIbtb0qdB9m]Protect Your Web Site from Cross-Site Scripting Attacks[/URL]
Cross-site scripting (XSS) attacks are gaining popularity, most likely due to the relative ease with which they can be executed on unwitting victims. You can assess the vulnerability of your Web site using the Open Web Application Security Project's WebGoat utility. This download explains how attackers use XSS and how you can protect yourself from cross-site scripting.
[URL=http://ct.com.com/click?q=f7-N0MnQLgKmJW2jfNajuHGiRUJeIEx]White Paper: The Spam Economy: the Convergent Spam and Virus Threats[/URL]
This paper details the level of protection needed to combat the converging threats of spam, viruses, and hacks and demonstrates how Sophos can help keep organizations free of these attacks.
[URL=http://ct.com.com/click?q=98-FThOQ_z9YLwIq9nXLqTH7el709SB]The 12 Steps to Designing a Strategic Security Process[/URL]
This overview, written by Rich Schiesser, in conjunction with Harris Kern's Enterprise Computing Institute, lists fundamental steps you can follow to establish a framework that consists of an executive sponsor, a security process owner, review boards, and cross-functional planning teams. Once these roles are defined, you can inventory your current tools and policies and chart the goals, requirements, and priorities that will allow you to develop a comprehensive security strategy.
[URL=http://ct.com.com/click?q=ce-SdXCQMsosjmWkJRaHWx1JeFAoeiq]Project Proposal and Special Clarification Forms[/URL]
Make your IT project proposals clear by putting them in writing. According to TechRepublic columnist Andy Weeks, such project management documentation doesn't have to be complex. Use his simple Project Proposal and Special Clarification forms to keep your projects running smoothly.
[URL=http://ct.com.com/click?q=1c-cswiIFrtAL2GglBB5JpGa25rCb0v]TechProGuild Podcast 6/13/05: Tech-Ed, WPA2, and Pharming[/URL]
In TechProGuild's third podcast, Michael Jackman reviews Tech-Ed news, examines the new WPA2 wireless security option, and describes three ways hackers "pharm" for data.
[URL=http://ct.com.com/click?q=54-l65vIZK2CEtUap4ZsRw4lRXGzJMK]White Paper: The Oxford Index - Demand Trends for Oracle Applications Consultants[/URL]
Based on a survey sent to managers in the hardware engineering field, Oxford Global Resources has released their most recent index of demand trends for high-end Oracle applications consultants.
[URL=http://ct.com.com/click?q=a1-AfTtQ~ZzdEjnMuF3VPIaXe31sH8j]Visit our Downloads Center for more![/URL]
Tag Your IT
You might be taking advantage of the new tagging feature on TechRepublic's discussions and blog posts, but have you tagged yourself? Add items to your Interests and Current Technology Implementation fields in your Profile. The tags become links that allow others to find you. Update your Profile today!
Copyright © 2005 CNET Networks, Inc. #All rights reserved.#i[/LEFT]