(IN)SECURE Magazine 2005 №01 Апрель

  • формат pdf
  • размер 5,78 МБ
  • добавлен 12 февраля 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Does Firefox really provide more security than Internet Explorer? Security risks associated with portable storage devices 10 tips on protecting customer information from identity theft Linux security - is it ready for the average user? How to secure your wireless network Considerations for preventing information leakage An introd...

(IN)SECURE Magazine 2005 №02 Июнь

  • формат pdf
  • размер 10,49 МБ
  • добавлен 20 февраля 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Information security in campus and open environments Web applications worms - the next Internet infestation Integrating automated patch and vulnerability management into an enterprise-wide environment Advanced PHP security - vulnerability containment Protecting an organization’s public information Application security: the noveau...

(IN)SECURE Magazine 2005 №03 Август

  • формат pdf
  • размер 8,92 МБ
  • добавлен 09 февраля 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Security vulnerabilities, exploits and patches PDA attacks: palm sized devices - PC sized threats Adding service signatures to Nmap CSO and CISO - perception vs. reality in the security kingdom Unified threat management: IT security's silver bullet? The reality of SQL injection 12 months of progress for the Microsoft Security Res...

(IN)SECURE Magazine 2005 №04 Октябрь

  • формат pdf
  • размер 7,75 МБ
  • добавлен 10 февраля 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Structured traffic analysis Access Control Lists in Tiger and Tiger Server - true permission management Automating I.T. security audits Biometric security PDA attacks, part 2: airborne viruses - evolution of the latest threats Build a custom firewall computer Lock down your kernel with grsecurity Interview with Sergey Ryzhikov, d...

(IN)SECURE Magazine 2006 №05 Январь

  • формат pdf
  • размер 4,53 МБ
  • добавлен 13 марта 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Web application firewalls primer Review: Trustware BufferZone 1.6 Threat analysis using log data Looking back at computer security in 2005 Writing an enterprise handheld security policy Digital Rights Management Revenge of the Web mob Hardening Windows Server 2003 platforms made easy Filtering spam server-side.

(IN)SECURE Magazine 2006 №06 Март

  • формат pdf
  • размер 5,97 МБ
  • добавлен 11 марта 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Best practices in enterprise database protection Quantifying the cost of spyware to the enterprise Security for websites - breaking sessions to hack into a machine How to win friends and influence people with IT security certifications The size of security: the evolution and history of OSSTMM operational security metrics Intervie...

(IN)SECURE Magazine 2006 №07 Июнь

  • формат pdf
  • размер 6,52 МБ
  • добавлен 17 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. SSH port forwarding: security from two perspectives, part one An inside job CEO spotlight: Q&A with Patricia Sueltz, SurfControl Server monitoring with munin and monit Compliance vs. awareness in 2006 Infosecurity 2006 2005 *nix malware evolution InfoSec World 2006 Overview of quality security podcasts.

(IN)SECURE Magazine 2006 №08 Сентябрь

  • формат pdf
  • размер 6,10 МБ
  • добавлен 05 марта 2016 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Payment Card Industry demystified Skype: how safe is it? Computer forensics vs. electronic evidence Review: Acunetix Web Vulnerability Scanner 4.0 SSH port forwarding - security from two perspectives, part two Log management in PCI compliance Airscanner vulnerability summary: Windows Mobile security software fails the test Proact...

(IN)SECURE Magazine 2006 №09 Декабрь

  • формат pdf
  • размер 5,49 МБ
  • добавлен 04 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Effectiveness of security by admonition: a case study of security warnings in a web browser setting Interview with Kurt Sauer, CSO at Skype Web 2.0 defense with AJAX fingerprinting and filtering Hack In The Box Security Conference 2006 Where iSCSI fits in enterprise storage networking Recovering user passwords from cached domain...

(IN)SECURE Magazine 2007 №10 Февраль

  • формат pdf
  • размер 10,98 МБ
  • добавлен 07 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Effectiveness of security by admonition: a case study of security warnings in a web browser setting Interview with Kurt Sauer, CSO at Skype Web 2.0 defense with AJAX fingerprinting and filtering Hack In The Box Security Conference 2006 Where iSCSI fits in enterprise storage networking Recovering user passwords from cached domain...

(IN)SECURE Magazine 2007 №11 Май

  • формат pdf
  • размер 10,14 МБ
  • добавлен 09 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. On the security of e-passports Review: GFI LANguard Network Security Scanner 8 Critical steps to secure your virtualized environment Interview with Howard Schmidt, President and CEO R & H Security Consulting Quantitative look at penetration testing Integrating ISO 17799 into your Software Development Lifecycle Public Key Infr...

(IN)SECURE Magazine 2007 №12 Июль

  • формат pdf
  • размер 8,02 МБ
  • добавлен 23 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Enterprise grade remote access Review: Centennial Software DeviceWall 4.6 Solving the keylogger conundrum Interview with Jeremiah Grossman, CTO of WhiteHat Security The role of log management in operationalizing PCI compliance Windows security: how to act against common attack vectors Taking ownership of the Trusted Platform Modu...

(IN)SECURE Magazine 2007 №13 Сентябрь

  • формат pdf
  • размер 7,73 МБ
  • добавлен 12 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Interview with Janne Uusilehto, Head of Nokia Product Security Social engineering social networking services: a LinkedIn example The case for automated log management in meeting HIPAA compliance Risk decision making: whose call is it? Interview with Zulfikar Ramzan, Senior Principal Researcher with the Advanced Threat Research te...

(IN)SECURE Magazine 2007 №14 Ноябрь

  • формат pdf
  • размер 10,18 МБ
  • добавлен 23 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Attacking consumer embedded devices Review: QualysGuard CCTV: technology in transition - analog or IP? Interview with Robert "RSnake" Hansen, CEO of SecTheory The future of encryption Endpoint threats Review: Kaspersky Internet Security 7.0 Interview with Amol Sarwate, Manager, Vulnerability Research Lab, Qualys Inc. Network acce...

(IN)SECURE Magazine 2008 №15 Февраль

  • формат pdf
  • размер 11,23 МБ
  • добавлен 06 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Proactive analysis of malware genes holds the key to network security Advanced social engineering and human exploitation Free visualization tools for security analysis and network monitoring Internet terrorist: does such a thing really exist? Weaknesses and protection of your wireless network Fraud mitigation and biometrics follo...

(IN)SECURE Magazine 2008 №16 Апрель

  • формат pdf
  • размер 11,12 МБ
  • добавлен 24 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Security policy considerations for virtual worlds US political elections and cybercrime Using packet analysis for network troubleshooting The effectiveness of industry certifications Is your data safe? Secure your web apps RSA Conference 2008 / Black Hat 2008 Europe Windows log forensics: did you cover your tracks? Traditional vs...

(IN)SECURE Magazine 2008 №17 Июль

  • формат pdf
  • размер 8,04 МБ
  • добавлен 21 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Open redirect vulnerabilities: definition and prevention The future of security is information-centric Securing the enterprise data flow against advanced attacks Bypassing and enhancing live behavioral protection Security flaws identification and technical risk analysis through threat modeling Migration from e-mail to web borne t...

(IN)SECURE Magazine 2008 №18 Октябрь

  • формат pdf
  • размер 8,66 МБ
  • добавлен 14 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Network and information security in Europe today Browser security: bolt it on, then build it in Passive network security analysis with NetworkMiner Lynis - an introduction to UNIX system auditing Windows driver vulnerabilities: the METHOD_NEITHER odyssey Removing software armoring from executables Insecurities in privacy protecti...

(IN)SECURE Magazine 2008 №19 Декабрь

  • формат pdf
  • размер 9,73 МБ
  • добавлен 07 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. The future of AV: looking for the good while stopping the bad Eight holes in Windows login controls Extended validation and online security: EV SSL gets the green light Interview with Giles Hogben, an expert on identity and authentication technologies working at ENISA Web filtering in a Web 2.0 world RSA Conference Europe 2008 Th...

(IN)SECURE Magazine 2009 №20 Март

  • формат pdf
  • размер 8,30 МБ
  • добавлен 20 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Improving network discovery mechanisms Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus What you need to know about tokenization Q&A: Vincenzo Iozzo on Mac OS X security A framework for quantitative privacy measurement Why fail? Secure your virtual assets Phased deployment of Network Access Contr...

(IN)SECURE Magazine 2009 №21 Июнь

  • формат pdf
  • размер 13,95 МБ
  • добавлен 07 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Malicious PDF: Get owned without opening Review: IronKey Personal Windows 7 security features: Building on Vista Using Wireshark to capture and analyze wireless traffic "Unclonable" RFID - a technical overview Secure development principles Q&A: Ron Gula on Nessus and Tenable Network Security Establish your social media presen...

(IN)SECURE Magazine 2009 №22 Сентябрь

  • формат pdf
  • размер 14,22 МБ
  • добавлен 21 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Using real-time events to drive your network scans The Nmap project: Open source with style A look at geolocation, URL shortening and top Twitter threats Review: Data Locker Making clouds secure Top 5 myths about wireless protection Securing the foundation of IT systems Is your data recovery provider a data security problem? Secu...

(IN)SECURE Magazine 2009 №23 Ноябрь

  • формат pdf
  • размер 11,37 МБ
  • добавлен 19 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Microsoft's security patches year in review: A malware researcher's perspective A closer look at Red Condor Hosted Service Report: RSA Conference Europe 2009, London The U.S. Department of Homeland Security has a vision for stronger information security Q&A: Didier Stevens on malicious PDFs Protecting browsers, endpoints and...

(IN)SECURE Magazine 2010 №24 Февраль

  • формат pdf
  • размер 8,76 МБ
  • добавлен 22 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Writing a secure SOAP client with PHP: Field report from a real-world project How virtualized browsing shields against web-based attacks Review: 1Password 3 Preparing a strategy for application vulnerability detection Threats 2.0: A glimpse into the near future Preventing malicious documents from compromising Windows machines Bal...

(IN)SECURE Magazine 2010 №25 Апрель

  • формат pdf
  • размер 8,63 МБ
  • добавлен 01 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. The changing face of penetration testing: Evolve or die! Review: SmartSwipe Unusual SQL injection vulnerabilities and how to exploit them Take note of new data notification rules RSA Conference 2010 coverage Corporate monitoring: Addressing security, privacy, and temptation in the workplace Cloud computing and recovery, not just...

(IN)SECURE Magazine 2010 №26 Июнь

  • формат pdf
  • размер 10,48 МБ
  • добавлен 06 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. PCI: Security's lowest common denominator Analyzing Flash-based RIA components and discovering vulnerabilities Logs: Can we finally tame the beast? Launch arbitrary code from Excel in a restricted environment Placing the burden on the bot Data breach risks and privacy compliance Authenticating Linux users against Microsoft Active...

(IN)SECURE Magazine 2010 №27 Сентябрь

  • формат pdf
  • размер 7,13 МБ
  • добавлен 25 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Review: BlockMaster SafeStick secure USB flash drive The devil is in the details: Securing the enterprise against the cloud Cybercrime may be on the rise, but authentication evolves to defeat it Learning from bruteforcers PCI DSS v1.3: Vital to the emerging demand for virtualization and cloud security Security testing - the key t...

(IN)SECURE Magazine 2010 №28 Ноябрь

  • формат pdf
  • размер 12,58 МБ
  • добавлен 22 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Database protocol exploits explained Review: MXI M700 Bio Measuring web application security coverage Inside backup and storage: The expert's view Combating the changing nature of online fraud Successful data security programs encompass processes, people, technology Sangria, tapas and hackers: SOURCE Barcelona 2010 What CSOs can...

(IN)SECURE Magazine 2011 №29 Март

  • формат pdf
  • размер 8,77 МБ
  • добавлен 19 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Virtual machines: Added planning to the forensic acquisition process Review: iStorage diskGenie Managers are from Mars, information security professionals are from Venus PacketWars: A cyber security sport for a cyber age Q&A: Graham Cluley on Facebook security and privacy Financial Trojans: Following the money Mobile encrypti...

(IN)SECURE Magazine 2011 №30 Июнь

  • формат pdf
  • размер 8,90 МБ
  • добавлен 23 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Microsoft's Enhanced Mitigation Experience Toolkit Transaction monitoring as an issuer fraud risk management technique in the banking card payment system IPv6: Saviour and threat The hard truth about mobile application security: Separating hype from reality Don't fear the auditor Book review: Kingpin Secure mobile platforms: CISO...

(IN)SECURE Magazine 2011 №31 Сентябрь

  • формат pdf
  • размер 7,79 МБ
  • добавлен 21 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. The changing face of hacking Review: [hiddn] Crypto Adapter A tech theory coming of age SecurityByte 2011: Cyber conflicts, cloud computing and printer hacking The need for foundational controls in cloud computing A new approach to data centric security The future of identity verification through keystroke dynamics Visiting Bitde...

(IN)SECURE Magazine 2011 №32 Декабрь

  • формат pdf
  • размер 8,73 МБ
  • добавлен 22 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. 7 questions you always wanted to ask a professional vulnerability researcher Insights on drive-by browser history stealing Review: Kingston DataTraveler 6000 RSA Conference Europe 2011 PacketFence: Because NAC doesn't have to be hard! Information security and the threat landscape with Raj Samani Security is a dirty word Smartphon...

(IN)SECURE Magazine 2012 Март RSA CONFERENCE

  • формат pdf
  • размер 4,48 МБ
  • добавлен 11 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. News from RSA Conference 2012 Information security within emerging markets Evolving security trends in smartphone and mobile computing The biggest problem in application security today RSA Conference 2012 award winners Innovation Sandbox

(IN)SECURE Magazine 2012 №33 Февраль

  • формат pdf
  • размер 6,33 МБ
  • добавлен 13 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Securing Android: Think outside the box Interview with Joe Sullivan, CSO at Facebook White hat shellcode: Not for exploits Using mobile device management for risk mitigation in a heterogeneous environment Metasploit: The future of penetration testing with HD Moore Using and extending the Vega open source web security platform Nex...

(IN)SECURE Magazine 2012 №34 Июнь

  • формат pdf
  • размер 9,45 МБ
  • добавлен 21 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Fitness as a model for security Security and migrating to the cloud: Is it all doom and gloom? Solid state drives: Forensic preservation issues Introduction to Android malware analysis Hack in The Box Conference 2012 Amsterdam ISO 27001 standard: Breaking the documentation myth with Dejan Kosutic Preparing a breach response plan...

(IN)SECURE Magazine 2012 №35 Сентябрь

  • формат pdf
  • размер 9,79 МБ
  • добавлен 26 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Administrative scripting with Nmap Information security in Europe with ENISA Executive Director Prof. Udo Helmbrecht Unintended, malicious and evil applications of augmented reality The enemy at the gate Top five hurdles to security and compliance in industrial control systems How to monitor the blind spots in your IT system: Log...

(IN)SECURE Magazine 2012 №36 Декабрь

  • формат pdf
  • размер 7,49 МБ
  • добавлен 26 сентября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. What makes security awareness training successful? Review - Incapsula: Enterprise-grade website security Five questions for Microsoft's Worldwide Chief Security Advisor Computer forensic examiners are from Mars, attorneys are from Venus In the field: RSA Conference 2012 Europe A mobile environment security assessment Hack In The...

(IN)SECURE Magazine 2013 №37 Март

  • формат pdf
  • размер 10,88 МБ
  • добавлен 01 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Becoming a malware analyst Review: Nipper Studio Five questions for Microsoft's Chief Privacy Officer Application security testing for AJAX and JSON Penetrating and achieving persistence in highly secured networks Report: RSA Conference 2013 Social engineering: An underestimated danger Review: Hacking Web Apps Improving informati...

(IN)SECURE Magazine 2013 №38 Июнь

  • формат pdf
  • размер 7,59 МБ
  • добавлен 22 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Becoming a computer forensic examiner UEFI secure boot: Next generation booting or a controversial debate How to detect malicious network behavior What startups can learn from enterprise level data security tactics To hack back or not to hack back? Report: Infosecurity 2013 DNS attacks on the rise: Rethink your security posture I...

(IN)SECURE Magazine 2013 №39 Сентябрь

  • формат pdf
  • размер 10,68 МБ
  • добавлен 07 октября 2013 г.
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Dear CSO, do you know how to build security culture? How to secure a company’s Chinese development center? Stephen Pao, GM, Security Business at Barracuda Networks, on web application security The state of web application security in numbers Web application exploitation with broken authentication and path traversal Joel Smith, Ap...