(IN)SECURE Magazine 15 (February 2008)
やっぱ、いつも面白いなぁ。
ダウンロードは、→ http://www.net-security.org/dl/insecure/INSECURE-Mag-15.pdf
- Proactive analysis of malware genes holds the key to network security
- Advanced social engineering and human exploitation
- Free visualization tools for security analysis and network monitoring
- Internet terrorist: does such a thing really exist?
- Weaknesses and protection of your wireless network
- Fraud mitigation and biometrics following Sarbanes-Oxley
- ***Application security matters: deploying enterprise software securely
- The insider threat: hype vs. reality
- ***How B2B gateways affect corporate information security
- Reputation attacks, a little known Internet threat
- Data protection and identity management
- The good, the bad and the ugly of protecting data in a retail environment
- ***Malware experts speak: F-Secure, Sophos, Trend Micro