Insecure Vol. 4 Rleased

The topics covered : Structured traffic analysis, Access Control Lists
in Tiger and Tiger Server – true permission management, automating I.T.
security audits, biometric security, PDA attacks, part 2: airborne
viruses – evolution of the latest threats, build a custom firewall
computer, lock down your kernel with grsecurity, interview with Sergey
Ryzhikov, director of Bitrix, best practices for database encryption
solutions.  Pickup the 4th volume this fine online magazine here (PDF).


Author: Xavier Ashe

Entrepreneur, Infosec Executive, CISSP, CISM, Ironman triathlete, traveler, UU, paleo, father of 8, goyishe, gamer, & geek.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s