51

Log management for effective incident response

Year:
2005
Language:
english
File:
PDF, 249 KB
english, 2005
52

An overview of the best known virtual solutions

Year:
2008
Language:
english
File:
PDF, 133 KB
english, 2008
55

Guaranteeing the safety of a network beyond the firewall

Year:
1998
Language:
english
File:
PDF, 567 KB
english, 1998
56

The on-going evolution of viruses

Year:
1999
Language:
english
File:
PDF, 1.01 MB
english, 1999
57

The era of web tobacco

Year:
2009
Language:
english
File:
PDF, 120 KB
english, 2009
58

RSA: what's around the corner?

Year:
2009
Language:
english
File:
PDF, 107 KB
english, 2009
60

Free security tools: Pros and Cons: A review of free security tools

Year:
1999
Language:
english
File:
PDF, 473 KB
english, 1999
61

Sarbanes-Oxley: maybe a blessing, maybe a curse

Year:
2005
Language:
english
File:
PDF, 146 KB
english, 2005
63

Can Worms Be Good?

Year:
2001
Language:
english
File:
PDF, 160 KB
english, 2001
64

State of the art security management

Year:
2009
Language:
english
File:
PDF, 106 KB
english, 2009
65

Outsourced or Outsmarted?

Year:
2005
Language:
english
File:
PDF, 140 KB
english, 2005
66

The impact of cybersecurity on real world, big picture, planetary problems

Year:
2008
Language:
english
File:
PDF, 103 KB
english, 2008
67

Principles of digital evidence collection

Year:
2003
Language:
english
File:
PDF, 38 KB
english, 2003
68

Security audits in mixed environments

Year:
2009
Language:
english
File:
PDF, 121 KB
english, 2009
69

2008: Six months of information security

Year:
2008
Language:
english
File:
PDF, 168 KB
english, 2008
70

A tour through the realm of anti-forensics

Year:
2007
Language:
english
File:
PDF, 117 KB
english, 2007
71

Guaranteeing convergence in security management with consolidated log management

Year:
2008
Language:
english
File:
PDF, 123 KB
english, 2008
72

Handbook of Digital Forensics and Investigation || Mobile Network Investigations

Year:
2010
Language:
english
File:
PDF, 2.18 MB
english, 2010
73

Endpoint and perimeter security: a new symbiosis

Year:
2006
Language:
english
File:
PDF, 84 KB
english, 2006
74

Log correlation: Part 2

Year:
2004
Language:
english
File:
PDF, 269 KB
english, 2004
75

Security baselines to give you momentum as you move into the New Year

Year:
2008
Language:
english
File:
PDF, 133 KB
english, 2008
76

Application delivery: pros and cons both virtual and real

Year:
2009
Language:
english
File:
PDF, 115 KB
english, 2009
77

Logging Architecture — Problems and Solutions

Year:
2002
Language:
english
File:
PDF, 445 KB
english, 2002
78

Different schemes for different teams

Year:
2009
Language:
english
File:
PDF, 225 KB
english, 2009
80

Volatile data vs. data at rest: the requirements of digital forensics

Year:
2008
Language:
english
File:
PDF, 79 KB
english, 2008
81

The PTK: An alternative advanced interface for Sleuth Kit

Year:
2008
Language:
english
File:
PDF, 280 KB
english, 2008
83

So are we going to govern this security business?

Year:
2009
Language:
english
File:
PDF, 294 KB
english, 2009
84

Spyware: more than a costly annoyance

Year:
2005
Language:
english
File:
PDF, 135 KB
english, 2005
85

Profiles in Cyber Courage #2: Tom and Justin Peltier

Year:
2007
Language:
english
File:
PDF, 416 KB
english, 2007
86

Electronic voting: practicality vs. fraud

Year:
2009
Language:
english
File:
PDF, 131 KB
english, 2009
90

Are you court validated?

Year:
2009
Language:
english
File:
PDF, 126 KB
english, 2009
91

Using geolocation to prevent online fraud

Year:
2008
Language:
english
File:
PDF, 189 KB
english, 2008
92

Is cyberspace a failed state?

Year:
2007
Language:
english
File:
PDF, 232 KB
english, 2007
94

SSL VPN and return on investment: A possible combination

Year:
2009
Language:
english
File:
PDF, 108 KB
english, 2009
95

Technological alternatives in incident response

Year:
2008
Language:
english
File:
PDF, 173 KB
english, 2008
96

Visual forensics in the field

Year:
2009
Language:
english
File:
PDF, 518 KB
english, 2009