Table of contents
- Improving network discovery mechanisms
- Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
- What you need to know about tokenization
- Q&A: Vincenzo Iozzo on Mac OS X security
- A framework for quantitative privacy measurement
- Why fail? Secure your virtual assets
- Phased deployment of Network Access Control
- Web 2.0 case studies: challenges, approaches and vulnerabilities
- ISP level malware filtering
- Q&A: Scott Henderson on the Chinese underground