
Following are some of the main chapters of this e-book.
1. Malicious PDF: Get owned without opening
2. Review: IronKey Personal
3. Windows 7 security features: Building on Vista
4. Using Wireshark to capture and analyze wireless traffic
5. "Unclonable" RFID - a technical overview
6. Secure development principles
7. Q&A: Ron Gula on Nessus and Tenable Network Security
8. Establish your social media presence with security in mind
9. A historical perspective on the cybersecurity dilemma
10. A risk-based, cost effective approach to holistic security
If you like to read this e-book you can download a free copy from Net Security.org
Comments
Post a Comment
Please leave your valuable comment below