Dev and Blind - Attacking the weakest Link in IT Security
Securing JSF Applications Against the OWASP Top Ten
You know you shouldn’t have done that. Richard Manion.
Tek12: Graphing real-time performance with Graphite
Html5 for Security Folks
Searching Shodan For Fun And Profit
Secure coding practices
Mitigating Attacks - Arbor
Kevin Savoy Director of Hospital and IT Audits University of Virginia.
UNIT 5 SEMINAR Unit 5 Chapter 5 in CompTIA Security + Course Name – IT286-01 Introduction to Network Security Instructor – Jan McDanolds, MS, Security+
Unit 5 Seminar
Implementing iChain ® in the Wild: Life beyond the lab Rich Roberts Senior Architect – Novell Consulting Novell Inc. Jim Short iChain Guru – Novell Consulting.