Ռեսուրսներ > Ամսագրեր > PenTest
PenTest Regular 10/2012
- Tool Jockeys in Disguise: Defeating the Push Button Penetration Testers
- Penetration Testing Strategy: Beyond Discrete Vulnerabilities
- Adopting Secure Software Development Processes
- Use and Abuse of Cryptographic Hashes
- Choosing a Safe Password
- Virtualization: Pills and Other Threats
- Session log-in-out
- How is Second Becoming First?
- Review of Christopher Hadnagy’s Social Engineering
- Interview with Raymond Friedman
PenTest Starterkit 1/2012
- iPhone’s security: beware of your best friend!
- IT Security & Risk to data – the ever changing landscape
- Application Security- An Executive Perspective of the Risk Reality
- Delivering Security – Awareness Training In Large Organization
- uPrint iHack
- Enterprise – UTM vs. Next-Generation Firewalls – Cutting Through the Noise
- Unfolding of Cybercrime – 2012 and beyond
- Penetration Testing – Evolution is Must
- Security