Modern Day Computer Systems are Weapons
[rokdownload menuitem="430" downloaditem="3" direct_download="true"]Click here to Download this Article[/rokdownload] Modern Day Computer System Are Weapons Ken Winter Real World Security...
View ArticleDefending Against Client-Side Attacks through a Vulnerability Management Program
[rokdownload menuitem="432" downloaditem="4" direct_download="true"]Click here to Download this Article[/rokdownload] Defending Against Client-Side Attacks through a Vulnerability Management...
View ArticleOperational Security in the Secure Software Development Life Cycle
[rokdownload menuitem="435" downloaditem="5" direct_download="true"]Click here to Download this Article[/rokdownload] Operational Security in the Secure Software Development LifecycleBy Doug...
View ArticleSyslog, A Defensive Security and Stability Mechanism
[rokdownload menuitem="436" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Randy Lastinger – RWSP 00018 Peak Security Real World Security: Attack,...
View ArticleOpen Proxy List From Spams
[rokdownload menuitem="439" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Open Proxy List from SPAMs Chiung-ting Chen Abstract SPAM mails are still a large...
View ArticleHacking De-ICE Pentest Level1 LiveCD’s
[rokdownload menuitem="440" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Darnell Kemper, CISSP Real World Security Practioner Project 26 November 2010...
View ArticleDefending the Castle
[rokdownload menuitem="441" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Defending the Castle by Actively Abusing It Jesus Oquendo C|EH, CHFI, OSCP, CPT...
View ArticleEffectiveness of the PCI DSS 2.0 on Preventing Security Breaches
[rokdownload menuitem="442" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Effectiveness of the PCI DSS 2.0 on Preventing Security Breaches: A Holistic...
View ArticleDefending Against the Compromised Host
[rokdownload menuitem="443" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Defending Against the Compromised Host Chris Knox Abstract Compromised hosts...
View ArticleCrimeware-as-a-Service
[rokdownload menuitem="444" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Underground Business Models :Crimeware-‐as-‐a-‐Service (CaaS) Melissa A....
View Article