Table of contents
- Network and information security in Europe today
- Browser security: bolt it on, then build it in
- Passive network security analysis with NetworkMiner
- Lynis – an introduction to UNIX system auditing
- Windows driver vulnerabilities: the METHOD_NEITHER odyssey
- Removing software armoring from executables
- Insecurities in privacy protection software
- Compliance does not equal security but it’s a good start
- Secure web application development
- The insider threat
- Web application security: risky business?