(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. Issue 30 has been released today.
![](https://lh3.googleusercontent.com/blogger_img_proxy/AEn0k_uo4pYfh0kMtYmZCoSuxT-e1Mp_SiBVViKYJzLYm5e2X9aRf9vFZhzNrV7gy-OuPy46qL1gilqdoSRq1VASk4tYbIFdauX3uXa4uo4X72WeorK7ZyX-FnhLpIbfdPyTqnA=s0-d)
Table of contents
Table of contents
- Microsoft's Exploit Mitigation Experience Toolkit
- Transaction monitoring as an issuer fraud risk management technique in the banking card payment system
- IPv6: Saviour and threat
- The hard truth about mobile application security: Separating hype from reality
- Don't fear the auditor
- Book review: Kingpin
- Secure mobile platforms: CISOs faced with new strategies
- Security needs to be unified, simplified and proactive
- Whose computer is it anyway?
- 10 golden rules of information security
- The token is dead
- Book review: IPv6 for Enterprise Networks
- Cyber security revisited: Change from the ground up?
No comments:
Post a Comment