TOPICS ARE:
- Socket Capable Browser Plug-ins Result In Transparent Proxy Abuse
- Crafting a Security RFP
- Building a Web Application Security Program, Part 8: Putting It All Together
- Article: Security Assessment of the Internet Protocol
- MD5 considered harmful today: Creating a rogue CA certificate
- Software [In]security: Software Security Top 10 Surprises
- Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations
- Article: What the NSA thinks of .NET 2.0 Security
- Whitepaper: Bypassing ASP .NET “ValidateRequest” for Script Injection Attacks
.........And many more
No comments:
Post a Comment