Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword
Like this
6Activity
0 of .
Results for:
No results containing your search query
P. 1
Insecure Mag 18

Insecure Mag 18

Ratings:

4.0

(1)
|Views: 58|Likes:
Published by Christian M. Grube
Network and information security in Europe today
Browser security: bolt it on, then build it in
Passive network security analysis with NetworkMiner
Lynis - an introduction to UNIX system auditing
Windows driver vulnerabilities: the METHOD_NEITHER odyssey
Removing software armoring from executables
Insecurities in privacy protection software
Compliance does not equal security but it's a good start
Secure web application development
The insider threat
Web application security: risky business?
Network and information security in Europe today
Browser security: bolt it on, then build it in
Passive network security analysis with NetworkMiner
Lynis - an introduction to UNIX system auditing
Windows driver vulnerabilities: the METHOD_NEITHER odyssey
Removing software armoring from executables
Insecurities in privacy protection software
Compliance does not equal security but it's a good start
Secure web application development
The insider threat
Web application security: risky business?

More info:

Published by: Christian M. Grube on Sep 25, 2008
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/11/2010

pdf

text

original

Activity (6)

You've already reviewed this. Edit your review.
1 hundred reads
1 thousand reads
MathCR liked this
shahjitu liked this
shiyasha liked this
z93 liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->