<?xml version="1.0"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">

<channel>

<atom:link href="http://security.nocdesigns.com/feed.xml" rel="self" type="application/rss+xml" />

<title>Computer Network Enterprise Security White Papers</title>
<description>Easyrider LAN Pro Computer Network Enterprise Security White Papers
</description>
<language>en-us</language> 
  <copyright>Copyright 1990-2010 Easyrider LAN Pro</copyright> 
  <pubDate>Wed, 16 Dec 2009 03:55:00 GMT</pubDate> 
  <lastBuildDate>Wed, 16 Dec 2009 03:55:01 GMT</lastBuildDate> 
<link>http://security.nocdesigns.com</link>

<item>
<title>The Security Expert shortage in IT and Cyber Crime Trends. A White Paper</title>
<description>A White Paper regarding the continuing shortage of trained security 
experts that are needed to defend against Cybercrime. A computer user's and an IT 
Manager's guide to future trends that are likely to be seen as Cybercrime advances. 
And why all of this is important to you and your computer's security. How Cyber 
Criminal attacks will mature in 2010.
</description>
<link>http://security.nocdesigns.com/security_expert_shortage_white_paper.htm</link>
<guid>http://security.nocdesigns.com/security_expert_shortage_white_paper.htm</guid>
</item>

<item>
<title>Cyber Crime Trends. A White Paper</title>
<description>Cyber Crime Trends. A White Paper. A computer user's and an IT employee's 
guide to future trends that are likely to be seen as Cybercrime advances and why it's 
important to you and your computer's security. How Cyber Criminals will mature over 
the next ten years
</description>
<link>http://security.nocdesigns.com/cybercrime_white_paper.htm</link>
<guid>http://security.nocdesigns.com/cybercrime_white_paper.htm</guid>
</item>

<item>
<title>OpenID. A White Paper</title>
<description>OpenID. A White Paper. A computer user's and an IT employee's guide
on the OpenID initiative and why it's important to you and your computer's security. 
</description>
<link>http://security.nocdesigns.com/openid_white_paper.htm</link>
<guid>http://security.nocdesigns.com/openid_white_paper.htm</guid>
</item>

<item>
<title>IT employment trends in the USA. A White Paper</title>
<description>IT employment trends in the USA. A White Paper. An IT employee's guide
on where to focus your energies moving forward in a bad economy.
</description>
<link>http://security.nocdesigns.com/IT_employment.htm</link>
<guid>http://security.nocdesigns.com/IT_employment.htm</guid>
</item>

<item>
<title>Digital Identification Certificates. A White Paper</title>
<description>Digital Identification Certificates. A White Paper. Why Digital ID 
certs are important to you and how to get and use them. 
</description>
<link>http://security.nocdesigns.com/certificate_white_paper.htm</link>
<guid>http://security.nocdesigns.com/certificate_white_paper.htm</guid>
</item>

<item>
<title>Industry certification testing. A White Paper</title>
<description>Vendor and industry competency certification in IT. A White Paper. An IT 
employer's guide on the value (or lack of) of requiring various certifications as 
part of the candidate screening process.
</description>
<link>http://security.nocdesigns.com/certifications_white_paper.htm</link>
<guid>http://security.nocdesigns.com/certifications_white_paper.htm</guid>
</item>

<item>
<title>DNS Poisoning White Paper</title>
<description>DNS Poisoning White Paper. How DNS poisoning is accomplished, why 
IT managers should be concerned and what you can do about it.
</description>
<link>http://security.nocdesigns.com/dns_poisoning_white_paper.htm</link>
<guid>http://security.nocdesigns.com/dns_poisoning_white_paper.htm</guid>
</item>

<item>
<title>ISO/IEC 27005:2008 Standard for Security Risk Management</title>
<description>ISO/IEC 27005:2008 A New Standard for Security Risk Management
</description>
<link>http://security.nocdesigns.com/iso_white_paper.htm</link>
<guid>http://security.nocdesigns.com/iso_white_paper.htm</guid>
</item>

<item>
<title>High profile hacks in the news - 2009</title>
<description>High profile site hackings in the news. Why IT managers should be 
concerned about these vulnerabilities and what they can do about them.
</description>
<link>http://security.nocdesigns.com/2009_hackers.htm</link>
<guid>http://security.nocdesigns.com/2009_hackers.htm</guid>
</item>

<item>
<title>More High profile hacks in the news - 2009</title>
<description>High profile site hackings in the news. Why IT managers should be
concerned about these vulnerabilities and what they can do about them.
</description>
<link>http://security.nocdesigns.com/3Q2009_hackers.htm</link>
<guid>http://security.nocdesigns.com/3Q2009_hackers.htm</guid>
</item>

<item>
<title>Drive-by malicious web site exploit test</title>
<description>Drive-by malicious web site exploits.  SQL and javascript injection 
exploits. How drive by exploits are accomplished. Why
IT managers should be concerned and what you can do about it.
</description>
<link>http://security.nocdesigns.com/driveby_white_paper.htm</link>
<guid>http://security.nocdesigns.com/driveby_white_paper.htm</guid>
</item>

<item>
<title>High profile hacking in the news</title>
<description>Recent hacks to high profile, ostensibly secure, data centers. Why
IT managers should be concerned and what you can do about it. Only hacks to DoD, DoE, 
or other sites thought to be highly secure are reported here.
</description>
<link>http://security.nocdesigns.com/hackers_white_paper.htm</link>
<guid>http://security.nocdesigns.com/hackers_white_paper.htm</guid>
</item>


<item>
<title>GhostNet White Paper</title>
<description>GhostNet White Paper. How easy is it to be infected by GhostNet or some 
other trojan?  Very easy.  What every IT manager needs to know to protect their 
network.
</description>
<link>http://security.nocdesigns.com/ghostnet_white_paper.htm</link>
<guid>http://security.nocdesigns.com/ghostnet_white_paper.htm</guid>
</item>

<item>
<title>Password White Paper</title>
<description>Password White Paper. Creating and protecting strong passwords. How 
to keep your personal information private.  Tips on avoiding having your password 
cracked.
</description>
<link>http://security.nocdesigns.com/password_white_paper.htm</link>
<guid>http://security.nocdesigns.com/password_white_paper.htm</guid>
</item>

<item>
<title>Outsourced IT Security Consulting White Paper</title>
<description>Outsourced IT Security Consulting White Paper. Network Security Consultants, 
Security Consulting firms, Consulting outfits in India, temp placement agencies and 
more. Why IT managers should know about this stuff.
</description>
<link>http://security.nocdesigns.com/outsourcing_white_paper.htm</link>
<guid>http://security.nocdesigns.com/outsourcing_white_paper.htm</guid>
</item>

<item>
<title>Cryptography and Network Security White Paper</title>
<description>Cryptography and Network Security White Paper. Everything the IT manager 
wanted to know about cryptography and network security but was afraid to ask. 
Why IT managers should be concerned about data encryption.
</description>
<link>http://security.nocdesigns.com/cryptography_white_paper.htm</link>
<guid>http://security.nocdesigns.com/cryptography_white_paper.htm</guid>
</item>

<item>
<title>Intrusion Detection Systems IDS White Paper</title>
<description>Intrusion Detection Systems IDS White Paper. What is intrusion detection? 
What is intrusion prevention? Why should IT Managers care about IDS?
</description>
<link>http://security.nocdesigns.com/ids_white_paper.htm</link>
<guid>http://security.nocdesigns.com/ids_white_paper.htm</guid>
</item>

<item>
<title>Rootkit White Paper</title>
<description>Rootkit White Paper. How rootkit exploits are accomplished and 
how rootkits can be detected and removed. Why IT managers should be concerned 
about rootkits and what can be done about them.
</description>
<link>http://security.nocdesigns.com/rootkit_white_paper.htm</link>
<guid>http://security.nocdesigns.com/rootkit_white_paper.htm</guid>
</item>

<item>
<title>Microsoft Windows XP Services White Paper</title>
<description>Microsoft Windows XP Services White Paper. A list of Microsoft XP 
services that can and probably should be disabled for security and 
performance reasons.
</description>
<link>http://security.nocdesigns.com/xp_services_white_paper.htm</link>
<guid>http://security.nocdesigns.com/xp_services_white_paper.htm</guid>
</item>

<item>
<title>Exaflood Internet Brownout White Paper</title>
<description>Exaflood Internet Brownout White Paper. What is the Exaflood and why
IT managers should be concerned about it.
</description>
<link>http://security.nocdesigns.com/exaflood_white_paper.htm</link>
<guid>http://security.nocdesigns.com/exaflood_white_paper.htm</guid>
</item>

<item>
<title>Scareware White Paper</title>
<description>Scareware White Paper. How Scareware is implemented, why
IT managers should be concerned and what you can do about it. Hacker motivations 
for employing Scareware.
</description>
<link>http://security.nocdesigns.com/scareware_white_paper.htm</link>
<guid>http://security.nocdesigns.com/scareware_white_paper.htm</guid>
</item>

<item>
<title>Cloud Computing White Paper</title>
<description>Cloud Computing White Paper. How cloud computing is accomplished. Why
IT managers are interested in this emerging trend.  Security issues and other items 
of concern related to cloud computing and it's providers.
</description>
<link>http://security.nocdesigns.com/cloud_computing_white_paper.htm</link>
<guid>http://security.nocdesigns.com/cloud_computing_white_paper.htm</guid>
</item>

<item>
<title>Proxy Server White Paper</title>
<description>Proxy Server White Paper. How are proxy servers implemented. 
Why IT managers should deploy proxy servers.  Common methods of circumventing 
proxy servers and what you can do about it.
</description>
<link>http://security.nocdesigns.com/proxy_server_white_paper.htm</link>
<guid>http://security.nocdesigns.com/proxy_server_white_paper.htm</guid>
</item>

<item>
<title>Network Security audit and PC Tune-up clinic</title>
<description>Network Security audit and PC Tune-up clinic consulting service. 
Why IT managers might want to outsource this activity to an independent party.
</description>
<link>http://security.nocdesigns.com/security_audits.htm</link>
<guid>http://security.nocdesigns.com/security_audits.htm</guid>
</item>

<item>
<title>Personal Computer PC Security White Paper</title>
<description>PC Security White Paper. Why IT managers should be concerned about 
PC security and what can be done to improve security in your PC environment.
</description>
<link>http://security.nocdesigns.com/pc_security.htm</link>
<guid>http://security.nocdesigns.com/pc_security.htm</guid>
</item>

<item>
<title>Computer Virus White Paper</title>
<description>White Paper concerning viruses that affect computers and computing 
equipment. How viruses infect computers. Why IT managers should be concerned and 
what can be done about computer viruses.
</description>
<link>http://security.nocdesigns.com/virus_white_paper.htm</link>
<guid>http://security.nocdesigns.com/virus_white_paper.htm</guid>
</item>

<item>
<title>Virtual Machine virus vulnerability White Paper</title>
<description>VM vulnerability White Paper. How vulnerable to infections, trojans, 
viruses, etc. is VMware and other virtual machine technologies? 
Why IT managers should be concerned and what can be done to reduce risk.
</description>
<link>http://security.nocdesigns.com/virtual_machine_white_paper.htm</link>
<guid>http://security.nocdesigns.com/virtual_machine_white_paper.htm</guid>
</item>

<item>
<title>Computer virus trojans White Paper</title>
<description>Trojan White Paper. How trojans infect computing equipment. 
Why IT managers should be concerned about trojans and what can be done about 
trojans.
</description>
<link>http://security.nocdesigns.com/trojan_white_paper.htm</link>
<guid>http://security.nocdesigns.com/trojan_white_paper.htm</guid>
</item>

<item>
<title>SPAM White Paper</title>
<description>SPAM White Paper.  What is SPAM, why do SPAMMERS SPAM and what can be 
done about SPAM.  Why IT Managers should care about SPAM.
</description>
<link>http://security.nocdesigns.com/spam_white_paper.htm</link>
<guid>http://security.nocdesigns.com/spam_white_paper.htm</guid>
</item>

<item>
<title>Shelfware White Paper</title>
<description>Shelfware White Paper. What is shelfware and why IT Managers should care 
about shelware.  What can be done to avoid shelfware.
</description>
<link>http://security.nocdesigns.com/shelfware_white_paper.htm</link>
<guid>http://security.nocdesigns.com/shelfware_white_paper.htm</guid>
</item>

<item>
<title>Denial of Service DoS White Paper</title>
<description>DoS Denial of Service White Paper. How denials of service are 
accomplished. Why IT managers should be concerned about DoS and what can be 
done about it.
</description>
<link>http://security.nocdesigns.com/service_denial_white_paper.htm</link>
<guid>http://security.nocdesigns.com/service_denial_white_paper.htm</guid>
</item>

<item>
<title>Port Scans White Paper</title>
<description>Port Scanning White Paper. Who does port scanning, why do they do 
it and why IT managers should be concerned about them. What you can do about 
port scanners.
</description>
<link>http://security.nocdesigns.com/portscans_white_paper.htm</link>
<guid>http://security.nocdesigns.com/portscans_white_paper.htm</guid>
</item>

<item>
<title>Phishing White Paper</title>
<description>Phishing White Paper. How phishing works, why it succeeeds and what 
IT managers can do about it.
</description>
<link>http://security.nocdesigns.com/phishing_white_paper.htm</link>
<guid>http://security.nocdesigns.com/phishing_white_paper.htm</guid>
</item>

<item>
<title>Firewall White Paper</title>
<description>Firewall network security White Paper</description>
<link>http://security.nocdesigns.com/firewall_white_paper.htm</link>
<guid>http://security.nocdesigns.com/firewall_white_paper.htm</guid>
</item>

<item>
<title>Conficker virus white paper</title>
<description>Conficker virus white paper</description>
<link>http://security.nocdesigns.com/conficker_worm_white_paper.htm</link>
<guid>http://security.nocdesigns.com/conficker_worm_white_paper.htm</guid>
</item>

<item>
<title>Aurora Power Generation Grid Vulnerability</title>
<description>The Aurora vulnerability that effects power generation utilities 
and others
</description>
<link>http://security.nocdesigns.com/aurora_white_paper.htm</link>
<guid>http://security.nocdesigns.com/aurora_white_paper.htm</guid>
</item>

<item>
<title>ITSM Best Practices White Paper</title>
<description>Information Technology Service Managment ITSM Best Practices 
White Paper.
</description>
<link>http://security.nocdesigns.com/best_practices_white_paper.htm</link>
<guid>http://security.nocdesigns.com/best_practices_white_paper.htm</guid>
</item>

<item>
<title>Monitoring Basics 101</title>
<description>Monitoring Basics 101. Everything you wanted to know but were 
afraid to ask when it comes to enterprise network and computer applications 
services monitoring.</description>
<link>http://security.nocdesigns.com/monitoring_basics_white_paper.htm</link>
<guid>http://security.nocdesigns.com/monitoring_basics_white_paper.htm</guid>
</item>

<item>
<title>Monitoring Basics 102</title>
<description>Monitoring Basics 102. Advanced enterprise network monitoring 
considerations.</description>
<link>http://security.nocdesigns.com/monitoring_102_white_paper.htm</link>
<guid>http://security.nocdesigns.com/monitoring_102_white_paper.htm</guid>
</item>

<item>
<title>Monitoring Basics 103</title>
<description>Monitoring Basics 103. So you want to build a network operations 
center (NOC).  Here is a list of things you need to consider.</description>
<link>http://security.nocdesigns.com/monitoring_103_white_paper.htm</link>
<guid>http://security.nocdesigns.com/monitoring_103_white_paper.htm</guid>
</item>

<item>
<title>Security Monitoring Consulting Basics</title>
<description>Enterprise Security Monitoring and security audits. 
All data centers have security vulnerabilities.  Many already have undetected hacks 
infections and so forth. Here is a list of things you need to consider.
</description>
<link>http://security.nocdesigns.com/portland_security_consultant.htm</link>
<guid>http://security.nocdesigns.com/portland_security_consultant.htm</guid>
</item>

<item>
<title>NOC Design Consulting Basics</title>
<description>Enterprise Security and service availability NOC design Monitoring. 
All data centers need to be monitored if you care about uptime. Here is a list of 
things you need to consider.
</description>
<link>http://security.nocdesigns.com/noc_designs.html</link>
<guid>http://security.nocdesigns.com/noc_designs.html</guid>
</item>

</channel>
</rss>

