Libro: Insecure Magazine # 28 (Noviembre 2010)


– Database protocol exploits explained
– Review: MXI M700 Bio
– Measuring web application security coverage
– Inside backup and storage: The expert’s view
– Combating the changing nature of online fraud
– Successful data security programs encompass processes, people, technology
– Sangria, tapas and hackers: SOURCE Barcelona 2010
– What CSOs can learn from college basketball
– Network troubleshooting 101
– America’s cyber cold war
– RSA Conference Europe 2010
– Bootkits – a new stage of development

Ver en PDF


This entry was posted in libros. Bookmark the permalink.

Deja un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *

For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

I agree to these terms.

Este sitio usa Akismet para reducir el spam. Aprende cómo se procesan los datos de tus comentarios.