Quantcast
Channel: Projects
Browsing all 10 articles
Browse latest View live

Modern Day Computer Systems are Weapons

  [rokdownload menuitem="430" downloaditem="3" direct_download="true"]Click here to Download this Article[/rokdownload]   Modern Day Computer System Are Weapons Ken Winter Real World Security...

View Article


Image may be NSFW.
Clik here to view.

Defending Against Client-Side Attacks through a Vulnerability Management Program

  [rokdownload menuitem="432" downloaditem="4" direct_download="true"]Click here to Download this Article[/rokdownload]     Defending Against Client-Side Attacks through a Vulnerability Management...

View Article

Image may be NSFW.
Clik here to view.

Operational Security in the Secure Software Development Life Cycle

  [rokdownload menuitem="435" downloaditem="5" direct_download="true"]Click here to Download this Article[/rokdownload]     Operational Security in the Secure Software Development LifecycleBy Doug...

View Article

Syslog, A Defensive Security and Stability Mechanism

  [rokdownload menuitem="436" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]     Randy Lastinger – RWSP 00018 Peak Security Real World Security: Attack,...

View Article

Image may be NSFW.
Clik here to view.

Open Proxy List From Spams

[rokdownload menuitem="439" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]   Open Proxy List from SPAMs Chiung-ting Chen Abstract SPAM mails are still a large...

View Article


Image may be NSFW.
Clik here to view.

Hacking De-ICE Pentest Level1 LiveCD’s

[rokdownload menuitem="440" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]   Darnell Kemper, CISSP Real World Security Practioner Project 26 November 2010...

View Article

Image may be NSFW.
Clik here to view.

Defending the Castle

[rokdownload menuitem="441" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload] Defending the Castle by Actively Abusing It Jesus Oquendo C|EH, CHFI, OSCP, CPT...

View Article

Image may be NSFW.
Clik here to view.

Effectiveness of the PCI DSS 2.0 on Preventing Security Breaches

[rokdownload menuitem="442" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]     Effectiveness of the PCI DSS 2.0 on Preventing Security Breaches: A Holistic...

View Article


Defending Against the Compromised Host

[rokdownload menuitem="443" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]   Defending Against the Compromised Host Chris Knox     Abstract Compromised hosts...

View Article


Image may be NSFW.
Clik here to view.

Crimeware-­as-­a-­Service

[rokdownload menuitem="444" downloaditem="6" direct_download="true"]Click here to Download this Article[/rokdownload]   Underground Business Models :Crimeware-­‐as-­‐a-­‐Service  (CaaS)  Melissa  A....

View Article
Browsing all 10 articles
Browse latest View live