begood Posted March 4, 2010 Report Share Posted March 4, 2010 (edited) ISSUE 24 (February 2010)DOWNLOAD ISSUE 24 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-24.pdfThe covered topics are: * Writing a secure SOAP client with PHP: Field report from a real-world project * How virtualized browsing shields against web-based attacks * Review: 1Password 3 * Preparing a strategy for application vulnerability detection * Threats 2.0: A glimpse into the near future * Preventing malicious documents from compromising Windows machines * Balancing productivity and security in a mixed environment * AES and 3DES comparison analysis * OSSEC: An introduction to open source log and event management * Secure and differentiated access in enterprise wireless networks * AND MORE!ISSUE 23 (November 2009)DOWNLOAD ISSUE 23 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-23.pdfThe covered topics are: * Microsoft's security patches year in review: A malware researcher's perspective * A closer look at Red Condor Hosted Service * Report: RSA Conference Europe 2009, London * The U.S. Department of Homeland Security has a vision for stronger information security * Q&A: Didier Stevens on malicious PDFs * Protecting browsers, endpoints and enterprises against new Web-based attacks * Mobile spam: An old challenge in a new guise * Report: BruCON security conference, Brussels * Study uncovers alarming password usage behavior * Elevating email to an enterprise-class database application solution * AND MORE!ISSUE 22 (September 2009)DOWNLOAD ISSUE 22 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-22.pdfThe covered topics are: * Using real-time events to drive your network scans * The Nmap project: Open source with style * A look at geolocation, URL shortening and top Twitter threats * Review: Data Locker * Making clouds secure * Top 5 myths about wireless protection * Securing the foundation of IT systems * Is your data recovery provider a data security problem? * Security for multi-enterprise applications * In mashups we trust? * AND MORE!ISSUE 21 (June 2009)DOWNLOAD ISSUE 21 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-21.pdfThe covered topics are: * Malicious PDF: Get owned without opening * Review: IronKey Personal * Windows 7 security features: Building on Vista * Using Wireshark to capture and analyze wireless traffic * "Unclonable" RFID - a technical overview * Secure development principles * Q&A: Ron Gula on Nessus and Tenable Network Security * Establish your social media presence with security in mind * A historical perspective on the cybersecurity dilemma * A risk-based, cost effective approach to holistic security * AND MORE!ISSUE 20 (March 2009)DOWNLOAD ISSUE 20 HEREhttp://www.net-security.org/dl/insecure/INSECURE-Mag-20.pdfThe covered topics are: * Improving network discovery mechanisms * Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus * What you need to know about tokenization * Q&A: Vincenzo Iozzo on Mac OS X security * A framework for quantitative privacy measurement * Why fail? Secure your virtual assets * Phased deployment of Network Access Control * Web 2.0 case studies: challenges, approaches and vulnerabilities * ISP level malware filtering * Q&A: Scott Henderson on the Chinese underground * AND MORE!Vedeti site-ul de mai jos pentru toate revistele (IN)SECURE !(IN)SECURE Magazine - ArchiveLE: le am toate, reply sau pm daca le vreti arhivate.torrent magnet Edited March 4, 2010 by begood Quote Link to comment Share on other sites More sharing options...
jiji Posted March 4, 2010 Report Share Posted March 4, 2010 you are piceless... Quote Link to comment Share on other sites More sharing options...