Posted By: a14a14d

Insecure Magazine 4 Oct 2005
English | PDF | 6.32 MB

he covered topics are:

* Structured traffic analysis
* Access Control Lists in Tiger and Tiger Server - true permission management
* Automating I.T. security audits
* Biometric security
* PDA attacks, part 2: airborne viruses - evolution of the latest threats
* Build a custom firewall computer
* Lock down your kernel with grsecurity
* Interview with Sergey Ryzhikov, director of Bitrix
* Best practices for database encryption solutions