[IN]SECURE March 2009 76 pages | English | PDF | 9 MB
* Improving network discovery mechanisms
* Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
* What you need to know about tokenization
* Q&A: Vincenzo Iozzo on Mac OS X security
* A framework for quantitative privacy measurement
* Why fail? Secure your virtual assets
* Phased deployment of Network Access Control
* Web 2.0 case studies: challenges, approaches and vulnerabilities
* ISP level malware filtering
* Q&A: Scott Henderson on the Chinese underground
* AND MORE!