Issue 17 (July 2008)
- Open redirect vulnerabilities: definition and prevention
- The future of security is information-centric
- Securing the enterprise data flow against advanced attacks
- Bypassing and enhancing live behavioral protection
- Security flaws identification and technical risk analysis through threat modeling
- Migration from e-mail to web borne threats
- Security training and awareness: strengthening your weakest link
- Assessing risk in VoIP/UC networks
- Building a secure wireless network for under $300
- Reverse engineering software armoring
- Point security solutions are not a 4 letter word
- Corporate due diligence in India: an ICT perspective
- Hacking Second Life
- AND MORE!
get yours here.
iron wil