Re: Techniques for Vulneability discovery

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




Hi,

I just got an article on that very topic published in April's IEEE Computer
Magazine (they published a supplement on Security and Privacy as the first
output of the newly created IEEE Security and Privacy Task Force)


The online version is at:

http://www.corest.com/publications/IEEE.htm

or

http://www.computer.org/computer/sp/articles/arc/index.htm


I will  welcome your comments,
thanks

-ivan

--
Ivan Arce
CTO
CORE SECURITY TECHNOLOGIES

44 Wall Street - New York, NY 10005
Ph: (212) 461-2345
Fax: (212) 461-2346
http://www.corest.com

PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836  B25D 207B E78E 2AD1 F65A


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux