(IN)SECURE Magazine 15 (February 2008)


ダウンロードは、→ http://www.net-security.org/dl/insecure/INSECURE-Mag-15.pdf
  • Proactive analysis of malware genes holds the key to network security
  • Advanced social engineering and human exploitation
  • Free visualization tools for security analysis and network monitoring
  • Internet terrorist: does such a thing really exist?
  • Weaknesses and protection of your wireless network
  • Fraud mitigation and biometrics following Sarbanes-Oxley
  • ***Application security matters: deploying enterprise software securely
  • The insider threat: hype vs. reality
  • ***How B2B gateways affect corporate information security
  • Reputation attacks, a little known Internet threat
  • Data protection and identity management
  • The good, the bad and the ugly of protecting data in a retail environment
  • ***Malware experts speak: F-Secure, Sophos, Trend Micro