Jump to content
begood

(IN)Secure Magazine Archive

Recommended Posts

issue24.jpg

ISSUE 24 (February 2010)

DOWNLOAD ISSUE 24 HERE

http://www.net-security.org/dl/insecure/INSECURE-Mag-24.pdf

The covered topics are:

* Writing a secure SOAP client with PHP: Field report from a real-world project

* How virtualized browsing shields against web-based attacks

* Review: 1Password 3

* Preparing a strategy for application vulnerability detection

* Threats 2.0: A glimpse into the near future

* Preventing malicious documents from compromising Windows machines

* Balancing productivity and security in a mixed environment

* AES and 3DES comparison analysis

* OSSEC: An introduction to open source log and event management

* Secure and differentiated access in enterprise wireless networks

* AND MORE!

issue23.jpg

ISSUE 23 (November 2009)

DOWNLOAD ISSUE 23 HERE

http://www.net-security.org/dl/insecure/INSECURE-Mag-23.pdf

The covered topics are:

* Microsoft's security patches year in review: A malware researcher's perspective

* A closer look at Red Condor Hosted Service

* Report: RSA Conference Europe 2009, London

* The U.S. Department of Homeland Security has a vision for stronger information security

* Q&A: Didier Stevens on malicious PDFs

* Protecting browsers, endpoints and enterprises against new Web-based attacks

* Mobile spam: An old challenge in a new guise

* Report: BruCON security conference, Brussels

* Study uncovers alarming password usage behavior

* Elevating email to an enterprise-class database application solution

* AND MORE!

issue22.jpg

ISSUE 22 (September 2009)

DOWNLOAD ISSUE 22 HERE

http://www.net-security.org/dl/insecure/INSECURE-Mag-22.pdf

The covered topics are:

* Using real-time events to drive your network scans

* The Nmap project: Open source with style

* A look at geolocation, URL shortening and top Twitter threats

* Review: Data Locker

* Making clouds secure

* Top 5 myths about wireless protection

* Securing the foundation of IT systems

* Is your data recovery provider a data security problem?

* Security for multi-enterprise applications

* In mashups we trust?

* AND MORE!

issue21.jpg

ISSUE 21 (June 2009)

DOWNLOAD ISSUE 21 HERE

http://www.net-security.org/dl/insecure/INSECURE-Mag-21.pdf

The covered topics are:

* Malicious PDF: Get owned without opening

* Review: IronKey Personal

* Windows 7 security features: Building on Vista

* Using Wireshark to capture and analyze wireless traffic

* "Unclonable" RFID - a technical overview

* Secure development principles

* Q&A: Ron Gula on Nessus and Tenable Network Security

* Establish your social media presence with security in mind

* A historical perspective on the cybersecurity dilemma

* A risk-based, cost effective approach to holistic security

* AND MORE!

issue20.jpg

ISSUE 20 (March 2009)

DOWNLOAD ISSUE 20 HERE

http://www.net-security.org/dl/insecure/INSECURE-Mag-20.pdf

The covered topics are:

* Improving network discovery mechanisms

* Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus

* What you need to know about tokenization

* Q&A: Vincenzo Iozzo on Mac OS X security

* A framework for quantitative privacy measurement

* Why fail? Secure your virtual assets

* Phased deployment of Network Access Control

* Web 2.0 case studies: challenges, approaches and vulnerabilities

* ISP level malware filtering

* Q&A: Scott Henderson on the Chinese underground

* AND MORE!

Vedeti site-ul de mai jos pentru toate revistele (IN)SECURE !

(IN)SECURE Magazine - Archive

LE: le am toate, reply sau pm daca le vreti arhivate.

torrent magnet

Edited by begood
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...