1

Dealing with forensic software vulnerabilities: is anti-forensics a real danger?

Year:
2008
Language:
english
File:
PDF, 535 KB
english, 2008
2

Security standardization in incident management: the ITIL approach

Year:
2007
Language:
english
File:
PDF, 296 KB
english, 2007
3

Anatomy of a phishing attack: A high-level overview

Year:
2009
Language:
english
File:
PDF, 142 KB
english, 2009
4

Preventing and investigating hacking by auditing web applications

Year:
2010
Language:
english
File:
PDF, 121 KB
english, 2010
5

Onion Routers: a Dangerous Response to Traffic Analysis?

Year:
2002
Language:
english
File:
PDF, 166 KB
english, 2002
6

Postfix — a secure alternative to Sendmail: A new frontier in the reaim of free mailers

Year:
1999
Language:
english
File:
PDF, 384 KB
english, 1999
7

Information age espionage, debriefing a real-world, top-class cyber sleuth

Year:
2007
Language:
english
File:
PDF, 397 KB
english, 2007
8

Social engineering: attacks have evolved, but countermeasures have not

Year:
2006
Language:
english
File:
PDF, 154 KB
english, 2006
9

The ultimate cybersecurity checklist for your workforce

Year:
2007
Language:
english
File:
PDF, 374 KB
english, 2007
10

Phishing in depth

Year:
2009
Language:
english
File:
PDF, 92 KB
english, 2009
12

Physical security – overlook it at your own peril

Year:
2007
Language:
english
File:
PDF, 130 KB
english, 2007
13

[Advances in Computers] Volume 67 || The State of the Art in Digital Forensics

Year:
2006
Language:
english
File:
PDF, 636 KB
english, 2006
14

Stalking “cyber terrorists” in Sofia – event report

Year:
2006
Language:
english
File:
PDF, 412 KB
english, 2006
16

Sharpening incident response

Year:
2006
Language:
english
File:
PDF, 622 KB
english, 2006
17

An integrated approach to security incident management

Year:
2008
Language:
english
File:
PDF, 456 KB
english, 2008
19

MyDoom & Co. is there really a problem?

Year:
2004
Language:
english
File:
PDF, 62 KB
english, 2004
20

Are you going to be a forensic examiner or a private investigator?

Year:
2010
Language:
english
File:
PDF, 189 KB
english, 2010
21

The future of the advanced encryption standard

Year:
1999
Language:
english
File:
PDF, 444 KB
english, 1999
22

Keeping up to standard – incident management in ISO 17799

Year:
2006
Language:
english
File:
PDF, 69 KB
english, 2006
23

Rebecca Herold on synergies in privacy and security, another profile in cyber courage

Year:
2007
Language:
english
File:
PDF, 173 KB
english, 2007
24

The cyber dimension of corporate investigations: insights of a 21st century sleuth

Year:
2006
Language:
english
File:
PDF, 122 KB
english, 2006
25

Can a fraud prevention plan be really effective?

Year:
2009
Language:
english
File:
PDF, 217 KB
english, 2009
26

Electronic discovery: digital forensics and beyond

Year:
2006
Language:
english
File:
PDF, 99 KB
english, 2006
28

Profiles in cyber courage #1: Fred Cohen

Year:
2007
Language:
english
File:
PDF, 331 KB
english, 2007
29

Is Java really secure?

Year:
1998
Language:
english
File:
PDF, 631 KB
english, 1998
30

Auditing and Security Policy: The Cornerstone of Company Information Protection

Year:
2000
Language:
english
File:
PDF, 219 KB
english, 2000
34

Vulnerability Management: One Problem, Several Potential Approaches.

Year:
2002
Language:
english
File:
PDF, 136 KB
english, 2002
35

Security for safety in railways

Year:
2008
Language:
english
File:
PDF, 212 KB
english, 2008
36

The role of the Information Security Manager in cutting-edge companies

Year:
2009
Language:
english
File:
PDF, 204 KB
english, 2009
38

Virtual panel reveals big picture on attack and countermeasure evolution

Year:
2006
Language:
english
File:
PDF, 479 KB
english, 2006
39

Thwart the insider threat: a proactive approach to personnel security

Year:
2006
Language:
english
File:
PDF, 141 KB
english, 2006
40

Visual Forensics: new or old trend?

Year:
2009
Language:
english
File:
PDF, 807 KB
english, 2009
41

Is it really important to have a structured security budget?

Year:
2009
Language:
english
File:
PDF, 182 KB
english, 2009
42

Ten years in the wilderness, part III: Diogenes on the threshing floor

Year:
2006
Language:
english
File:
PDF, 202 KB
english, 2006
43

War & Peace in Cyberspace: Don't twitter away your organisation's secrets

Year:
2008
Language:
english
File:
PDF, 201 KB
english, 2008
46

Do encrypted disks spell the end of forensics?

Year:
2009
Language:
english
File:
PDF, 381 KB
english, 2009
48

Computer forensics: Are you qualified?

Year:
2008
Language:
english
File:
PDF, 553 KB
english, 2008
49

Compliance vs business security

Year:
2009
Language:
english
File:
PDF, 302 KB
english, 2009