Effects of social networking sites on human beings
Network Intelligence for a secured Network (2014-03-12)
Top 10 Web App Security Risks
Endpoint and Server: The belt and braces anti-malware strategy
2 nd Generation Honeyclients Robert Danford SANS Internet Storm Center.
Appeared in 30 th IEEE Symposium on Security and Privacy, May 2009. Authors: Mike Ter Louw and V.N. Venkatakrishnan Dept. of Computer Science: University.
Nathan J. Gibson, CISSP-CISM-CCNA-MCSA. Virus Trojans Worms Spyware BotNets Social Engineering Thieves Hackers Sexual predators Harassers.
Lecture 1: Logical, Physical & Casual Time (Part 2) Anish Arora CSE 763.
Challenges In The Morphing Threat Landscape Apr 2011, Arnhem Tamas Rudnai, Websense Security Labs.
ASP.NET security vulnerabilities
State of Internet 1H 2009
State of Internet 2H 2008