- - Writing a secure SOAP client with PHP: Field report from a real-world project
- - How virtualized browsing shields against web-based attacks
- - Review: 1Password 3
- - Preparing a strategy for application vulnerability detection
- - Threats 2.0: A glimpse into the near future
- - Preventing malicious documents from compromising Windows machines
- - Balancing productivity and security in a mixed environment
- - AES and 3DES comparison analysis
- - OSSEC: An introduction to open source log and event management
- - Secure and differentiated access in enterprise wireless networks
- - AND MORE!
Blog dedicado al estudio de la Seguridad de la Información - Privacidad - Seguridad Informatica - Auditoria informática. (Recopilación de principales noticias, eventos, politicas de seguridad, guías de buenas practicas, normas, estándares, herramientas, otros)
lunes, 22 de febrero de 2010
Insecure Magazine # 24 (February 2010)
Etiquetas:
Bibliografia,
Desarrollo Seguro,
Herramientas,
Revistas,
Wireless
Suscribirse a:
Enviar comentarios (Atom)
No hay comentarios:
Publicar un comentario