Ռեսուրսներ > Ամսագրեր > PenTest
Auditing & Pentesting Standards 02/12
- Cyber war
- Cybercrime Pentesting
- Hardware Token Authentication
- Social Engineering
- Regulatory Compliance under the Indian Cyber Law
- Benefits of Attribution
- Attacking POS
PenTest Extra 01/2012
- XSS & CSRF: Practical exploitation of post-authentication vulnerabilities in web applications
- Discovering Modern CSRF Patch Failures
- Business Logic Vulnerabilities via CSRF
- XSS Using Shell of the future
- Cross-Site Request Forgery
- Security Resolutions for 2012
- Interview with Peter N. M. Hansteen