CHAPTER 5 – AUTHENTICATION AND ENCRYPTION TECHNOLOGY
Why Government & Corporate Cyber Programmes are Failing
Intrusion Detection Presentation
Ruhr- Universität Bochum Fakultät für Mathematik Informationssicherheit und Kryptologie Which Hash Functions will survive? Xiaoyun Wang Xuejia Lai Magnus.
Kurt Seifried – kurt.seifried-org – data deletion – seifried.org/security/ Data deletion Out damn spot, out! Kurt Seifried,
Web Application Attack Report (Edition #2 - Jan 2012)
AVG Community Powered Threat Report: Q1 2012
Cryptomathic white paper 2fa for banking
Attack Toolkits and Malicious Websites
Lancaster_ESDmanualplusmos
Symantec Physhing Report Aprile 2009
Banks lack ammo to fight cyber crime