Saturday, September 3, 2011

Free Hacking & Security White Papers and Articles by cgisecurity

TOPICS ARE:
  • Socket Capable Browser Plug-ins Result In Transparent Proxy Abuse
  • Crafting a Security RFP
  • Building a Web Application Security Program, Part 8: Putting It All Together
  • Article: Security Assessment of the Internet Protocol
  • MD5 considered harmful today: Creating a rogue CA certificate
  • Software [In]security: Software Security Top 10 Surprises
  • Oracle Forensics Part 7: Using the Oracle System Change Number in Forensic Investigations
  • Article: What the NSA thinks of .NET 2.0 Security
  • Whitepaper: Bypassing ASP .NET “ValidateRequest” for Script Injection Attacks
.........And many more

No comments:

Post a Comment