Volume 2; Issue 6

1

Static analysis for security

Year:
2004
Language:
english
File:
PDF, 133 KB
english, 2004
2

Inside JetBlue's privacy policy violations

Year:
2004
Language:
english
File:
PDF, 277 KB
english, 2004
5

Interface illusions

Year:
2004
Language:
english
File:
PDF, 355 KB
english, 2004
6

Timetable set for better intelligence network

Year:
2004
Language:
english
File:
PDF, 258 KB
english, 2004
7

Privacy-preserving data mining: why, how, and when

Year:
2004
Language:
english
File:
PDF, 368 KB
english, 2004
8

Building more secure software with improved development processes

Year:
2004
Language:
english
File:
PDF, 67 KB
english, 2004
9

Security Alchemy

Year:
2004
Language:
english
File:
PDF, 70 KB
english, 2004
10

The Kerf toolkit for intrusion analysis

Year:
2004
Language:
english
File:
PDF, 843 KB
english, 2004
11

Certifying open source - the Linux experience

Year:
2004
Language:
english
File:
PDF, 177 KB
english, 2004
12

Enhancing Security: Not for the Conformist

Year:
2004
Language:
english
File:
PDF, 568 KB
english, 2004
13

How to win an evolutionary arms race

Year:
2004
Language:
english
File:
PDF, 61 KB
english, 2004
14

Academic degrees and professional certification

Year:
2004
Language:
english
File:
PDF, 55 KB
english, 2004
15

Using honeynets to protect large enterprise networks

Year:
2004
Language:
english
File:
PDF, 261 KB
english, 2004