Business Guide
simplicable technology guide   »  security   »  security techniques

Security Techniques

3 Shares Google Twitter Facebook

It is easy enough to confuse authentication and authorization.

A digital signature embedded in information that can be tied to a source such as an individual or an IP address.

A honeypot is decoy designed to distract attackers from your information infrastructure.

How to confirm the identity of users and entities.

Physical security is real world security. The type of security that existed long before the information revolution.

Current state blueprints capture business, data and implementation architecture at the conceptual, logical and physical levels.

Our collection of SOA architecture resources and tools.

All systems need to be replaced with time. However, just because a system is legacy — doesn't mean it needs to be replaced immediately.

A guide to information security including cheat sheets, best practices and checklists.

Recently on Simplicable

Enterprise Software Guide

posted by John Spacey
A guide to enterprise software that covers a wide variety of critical enterprise tools.

ITIL Guide

posted by John Spacey
Our guide to the ITIL framework.


posted by Anna Mar
Everything you ever wanted to know about mashups but were afraid to ask.

What Enterprise Feedback Management Really Means

posted by Anna Mar
Industrial strength survey tools.


about     contact     sitemap     privacy     terms of service     copyright