Enterprise IT Security Magazine 2/2011

August 16, 2011

Enterprise IT Security Magazine 2/2011

Enterprise IT Security Magazine 2/2011

Take Pain Out of The Value Chain
by Simon Walker
Hardening a Network Router
by Dave Naples
Networking Reconnaissance – Probing & Scanning
by Dhananjay Garg
Is Scanning of Computer Networks Dangerous?
by Anton Keks
Network Infrastructure Parser – Nipper – An Introduction
by Rebecca Wynn
PCI Audit – The Road To Compliance
by Ben Aderet
PCI DSS at a Glance
by Dimitris Ergazakis
WikiLeaks, Compliance and Global Competitiveness – Reasons to Review Your DLP Strategy
by John Dasher
Virtual Crime in The Real World
by Sian Haynes, Peter Burden
Examining Aspects of Cloud Security and Risk
by Jon Shende
Cloud Computing Offers Hope For All
by Roger Strukhoff
Mobile Phones Operating Systems Forensics
by Peter Burden

Tagged with:

Leave a Comment

Please keep in mind that comments are moderated and rel="nofollow" is in use. So, please do not use a spammy keyword or a domain as your name, or it will be deleted. Let us have a personal and meaningful conversation instead.

You must be logged in to post a comment.

IT MAGAZINES: Hakin9 Magazine | Pentest Magazine | eForensics Magazine | Software Developer's Journal | Hadoop Magazine | Java Magazine
IT Blogs: Hakin9 Magazine Blog | Pentest Magazine Blog | eForensics Magazine Blog | Software Developer's Journal Blog | Hadoop Magazine Blog | Java Magazine Blog
IT ONLINE COURSES: Pentest Laboratory
JOB OFFERS FOR IT SPECIALIST: Jobs on Hakin9 Magazine | Jobs on Pentest Magazine | Jobs on eForensics Magazine | Jobs on Software Developer's Journal | Jobs on Java Magazine | Jobs on Hadoop Magazine
Hakin9 Media Sp. z o.o. Sp. komandytowa ul. Postępu 17D, 02-676 Warszawa