Microsoft Forefront Endpoint Protection 2010 Evaluation Guide
ethical hacking
Discovering the Value of Verifying Web Application Security Using IBM Rational AppScan aka Hacking 101
Information security-integration-part-1-of-2
HIHI IVMAA - March 2005 Lessons from the ice storm of 1998 in Québec (from Bérubé Roger and C. Houde August 3, 2003) François Gauthier, f. eng., M. Sc.
Security on a budget
Yan Chen Lab for Internet and Security Technology (LIST)
2012 10 19 risk analysis training deck
Network Security
CCNA Security 02- fundamentals of network security
Chamber Technology Committee Presentation
ACSN IT Security Services