เข้าระบบ
username :  
password :  
เก็บสถานะ :  
 
:: กระดานถาม-ตอบ ::
 ทุกหมวด
  หมวด : ถามตอบเรื่องเรียน  
  หัวข้อ : ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
 
Topic : ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 15:20:07
คุณเป็นผู้อ่านคนที่ 6895
Reply by :
Casanova

ระดับ :ศิษย์พี่ใหญ่
ตั้งคำถาม : 19 ครั้ง
ตอบคำถาม : 217 ครั้ง
E-mail :
ยังไงก็ลองเอาไปดูนะครับว่าชอบแนวไหน
เผื่อจะช่วยได้ครับ
 

Auditing a Corporate Log Server
Roger Meyer
February 1, 2008
- download paper PDF
WiFi with BackTrack
Antonio Merola
December 24, 2007
- download paper PDF
NSS Vs NDS
Robert Edwards
November 5, 2007
- download paper PDF
Certification and Accreditation: A madmans dilemma - Costs
Robert Edwards
November 5, 2007
- download paper PDF
Certification and Accreditation: A madmans dilemma - Controls
Robert Edwards
November 5, 2007
- download paper PDF
Certification and Accreditation for Dummies
Robert Edwards
November 5, 2007
- download paper PDF
Certification and Accreditation (C&A) Vs System Development Life Cycle Management (SDLC)
Robert Edwards
November 5, 2007
- download paper PDF
A Taxonomy of Information Systems Audits, Assessments and Reviews
Craig Wright
June 20, 2007
- download paper PDF
VPNScan: Extending the Audit and Compliance Perimeter
Rob VandenBrink
February 12, 2007
- download paper PDF
A Guide to Security Metrics
Shirley C. Payne
January 18, 2007
- download paper PDF
An Introduction to Information System Risk Management
Steve Elky
January 18, 2007
- download paper PDF
Aligning an information risk management approach to BS 7799-3:2005
Ken Biery
November 13, 2006
- download paper PDF
A Practical Guide to Auditing an ASP
Johanna Ollinger
May 17, 2005
- download paper PDF
Sarbanes-Oxley Information Technology Compliance Audit
Dan Seider
May 17, 2005
- download paper PDF
B.A.S.E – A Security Assessment Methodology
Gregory Braunton
May 5, 2005
- download paper PDF
Information Systems Security Architecture: A Novel Approach to Layered Protection
George Farah
January 22, 2005
- download paper PDF
The Application Audit Process - A Guide for Information Security Professionals
Robert Hein
January 22, 2005
- download paper PDF
Information Systems Security Architecture A Novel Approach to Layered Protection
George Farah
January 19, 2005
- download paper PDF
Using Vulnerability Assessment Tools To Develop an OCTAVE Risk Profile
Andrew Storms
March 25, 2004
- download paper PDF
Red Teaming: The Art of Ethical Hacking
Christopher Peake
December 13, 2003
- download paper PDF
Application Security, Information Assurance's Neglected Stepchild - A Blueprint for Risk Assessment
Ted Mina
October 31, 2003
- download paper PDF
Information System Security Evaluation Team: Security Insurance?
Bruce Swartz
October 31, 2003
- download paper PDF
The Art of Reconnaissance - Simple Techniques
Sai Bhamidipati
October 31, 2003
- download paper PDF
Footprint Your Intranet
Bob Brown
October 31, 2003
- download paper PDF
Footprinting: What Is It, Who Should Do It, and Why?
James P. McGreevy
October 31, 2003
- download paper PDF
A Perspective on Threats in the Risk Analysis Process
Arthur Nichols
October 31, 2003
- download paper PDF
System Identification for Vulnerability Assessment
Michael C. Harris
October 31, 2003
- download paper PDF
Conducting a Penetration Test on an Organization
ChanTuck Wai
October 31, 2003
- download paper PDF
Port Scanning Techniques and the Defense Against Them
Roger Christopher
October 31, 2003
- download paper PDF
Distributed Scan Model for Enterprise-Wide Network Vulnerability Assessment
Alexander Lopyrev
October 31, 2003
- download paper PDF
Auditing Inside the Enterprise via Port Scanning & Related Tools
Bob Konigsberg
October 31, 2003
- download paper PDF
An Overview of Threat and Risk Assessment
James Bayne
October 31, 2003
- download paper PDF
Seeking Security: The New Paradigm for Government Agencies
Stephan H. Chapman
October 31, 2003
- download paper PDF
Proactive Vulnerability Assessments with Nessus
Jason Mitchell
October 31, 2003
- download paper PDF
Evaluating Untrusted Software In a Controlled Environment
Jeff Reava
October 31, 2003
- download paper PDF
How-To Make Linux System Auditing a Little Easier
Paul J. Santos
October 31, 2003
- download paper PDF
A Qualitative Risk Analysis and Management Tool - CRAMM
Zeki Yazar
October 31, 2003
- download paper PDF
Case Study - TruSecure Security Certification
David Vos
October 31, 2003
- download paper PDF
Information Classification - Who, Why and How
Sue Fowler
October 31, 2003
- download paper PDF
Quantitative Risk Analysis Step-By-Step
Ding Tan
October 31, 2003
- download paper PDF
Security Assessment Guidelines for Financial Institutions
Karen Nelson
October 31, 2003
- download paper PDF
Application Of The Nsa Infosec Assessment Methodology
Kathryn Cross
October 31, 2003
- download paper PDF
Conducting an electronic information risk assessment for Gramm-Leach-Bliley Act compliance.
Kevin Bong
October 31, 2003
- download paper PDF
Security Program Management and Risk
Archie Andrews
October 31, 2003
- download paper PDF
Strategies for Improving Vulnerability Assessment Effectiveness in Large Organizations
Robert Huber
October 31, 2003
- download paper PDF
The Institutional Need for Comprehensive Auditing Strategies
Steward Milus
October 31, 2003
- download paper PDF
Security Auditing: A Continuous Process
Pam Page
October 31, 2003
- download paper PDF
Network- and Host-Based Vulnerability Assessments: An Introduction to a Cost Effective and Easy to Use Strategy.
Ragi Guirguis
October 31, 2003
- download paper PDF
Data-Centric Quantitative Computer Security Risk Assessment
Brett Berger
October 31, 2003
- download paper PDF
Wireless Network Audits using Open Source tools
Edouard Lafargue
October 31, 2003
- download paper PDF
Auditing-In-Depth For Solaris
Jeff Pike
October 31, 2003
- download paper PDF
Conducting a Security Audit of an Oracle Database
Egil Andresen
March 8, 2002
- download paper PDF
Defining a Risk Assessment Process for Federal Security Personnel
Kathleen Federico
January 26, 2002
- download paper PDF

The challenge of securely storing and transporting large files across a corporate Wide Area Network
Jeremy Gibb
October 26, 2007
- download paper PDF
OpenVPN and the SSL VPN Revolution
Charlie Hosner
August 25, 2004
- download paper PDF
Securing Key Distribution with Quantum Cryptography
Bradford Bartlett
August 15, 2004
- download paper PDF
Elliptic Curve Cryptography and Smart Cards
Ahmad Kayali
April 8, 2004
- download paper PDF
Understanding and Configuring IPSec between Cisco Routers
Ryan Ettl
March 25, 2004
- download paper PDF
SSL Remote Access VPNs: Is this the end of IPSec?
Steven Ferrigni
December 13, 2003
- download paper PDF
Quantum Cryptography: Is Your Data Safe Even When Somebody Looks?
Tom Klitsner
October 31, 2003
- download paper PDF
PGP: A Hybrid Solution
Jessica J. Benz
October 31, 2003
- download paper PDF
What Is an MPLS VPN Anyway?
Kelly DeGeest
October 31, 2003
- download paper PDF
Identification with Zero Knowledge Protocols
Annarita Giani
October 31, 2003
- download paper PDF
Quantum Encryption vs Quantum Computing: Will the Defense or Offense Dominate?
Bob Gourley
October 31, 2003
- download paper PDF
Virtual Network Computing and Secure Shell
Damian Koziel
October 31, 2003
- download paper PDF
The Day DES Died
Paul Van De Zande
October 31, 2003
- download paper PDF
Encryption Regulation: A First Amendment Perspective
Linda K. Mickna
October 31, 2003
- download paper PDF
Interoperability in PKI
Roger Pyon
October 31, 2003
- download paper PDF
An Overview of Computer Security as Told Through War Stories
Ronald Seidl
October 31, 2003
- download paper PDF
One Fish, Two Fish, Red Fish, Blowfish A History of Cryptography and it's Application in Soci
Joseph Kasten
October 31, 2003
- download paper PDF
Securing Remote Users VPN Access to Your Company LAN
Klavs Klavsen
October 31, 2003
- download paper PDF
A Business Perspective on PKI: Why Many PKI Implementations Fail, and Success Factors To Consider
Leslie Peckham
October 31, 2003
- download paper PDF
A Discussion of SSH Secure Shell
Shawn Lewis
October 31, 2003
- download paper PDF
History of Encryption
Melis Jackob
October 31, 2003
- download paper PDF
NAT Traversal: Peace Agreement Between NAT and IPSec
Haluk Aydin
October 31, 2003
- download paper PDF
Who's Who in AES?
Kyle Jones
October 31, 2003
- download paper PDF
Implementing NAT on Checkpoint Firewall-1
Eugene Ng
October 31, 2003
- download paper PDF
Protecting Sensitive Data in Secure Domains
Mikael Trosell
October 31, 2003
- download paper PDF
Key and Certificate Management in Public Key Infrastructure Technology
Sriram Ranganathan
October 31, 2003
- download paper PDF
The Advanced Encryption System (AES) Development Effort: Overview and Update
William M. Tatun
October 31, 2003
- download paper PDF
Implementing PKI in a Heterogeneous Environment A Primer on Digital Certificate And Key Formats
Tim R. Sills
October 31, 2003
- download paper PDF
The Weakest Link: The Human Factor Lessons Learned from the German WWII Enigma Cryptosystem
Bradley Fulton
October 31, 2003
- download paper PDF
E-Mail Security with S/MIME
George Kuzmowycz
October 31, 2003
- download paper PDF
AES: The Making of a New Encryption Standard
Mitch Richards
October 31, 2003
- download paper PDF
Public Key Infrastructure Issues in an Academic Healthcare Setting
Liviu Groza
October 31, 2003
- download paper PDF
IPsec's Role in Network Security: Past, Present, Future
Christopher Smith
October 31, 2003
- download paper PDF
Implementing "Dual-Sided" VPN's
Kenneth Boudreaux
October 31, 2003
- download paper PDF
Integrate HMAC Capable Token into User Authentication Mechanism and Public Key Infrastructure
Shanhui Tan
October 31, 2003
- download paper PDF
Using SSL with Client Access Express for AS/400
Jose Guerrero
October 31, 2003
- download paper PDF
Analysis of a Secure Time Stamp Device
Chris Russell
October 31, 2003
- download paper PDF
Strong Authentication and Authorization model Using PKI, PMI, and Directory
Jong Wook Lee
October 31, 2003
- download paper PDF
Securing Certificate Revocation List Infrastructures
Eddie Turkaly
October 31, 2003
- download paper PDF
Cryptographic Services - A Brief Overview
Larry D Bennett
October 31, 2003
- download paper PDF
PKI and Information Security Awareness: Opportunity and Obligation
Jerry K Brown
October 31, 2003
- download paper PDF
A Review of the Diffie-Hellman Algorithm and its Use in Secure Internet Protocols
David A. Carts
October 31, 2003
- download paper PDF
Basic Cryptanalysis Techniques
Craig Smith
October 31, 2003
- download paper PDF
Implementing Site-to-Site IPSec Between a Cisco Router and Linux FreeS/WAN
Neil L. Cleveland
October 31, 2003
- download paper PDF
Stunnel: SSLing Internet Services Easily
Wesley Wong
October 31, 2003
- download paper PDF
Knock Knock...Who's there? Do you know who is accessing your VPN?
Norma Jean Schaefer
October 31, 2003
- download paper PDF
Comparing BGP/MPLS and IPSec VPNs
Gary Alterson
October 31, 2003
- download paper PDF
An Overview of Hardware Security Modules
Jim Attridge
October 31, 2003
- download paper PDF
Roll Your Own Crypto Services (Using Open Source and Free Cryptography)
Edward C. Donahue
October 31, 2003
- download paper PDF
Secure Access of Network Resources by Remote Clients
Glendon MacDonald
October 31, 2003
- download paper PDF
Vulnerability's of IPSEC: A Discussion of Possible Weaknesses in IPSEC Implementation and Pro
Daniel Clark
October 31, 2003
- download paper PDF
Decommissioning Certification Authorities
Claudia N. Lukas
October 31, 2003
- download paper PDF
The Ease of Steganography and Camouflage
John Bartlett
October 31, 2003
- download paper PDF
A Vulnerability Assessment of Roaming Soft Certificate PKI Solutions
Stephen Wilson
October 31, 2003
- download paper PDF
PKI, The What, The Why, and The How
Duncan Wood
October 31, 2003
- download paper PDF
VPN-1 SecureClient - Check Point's Solution for Secure Intranet Extension
Ryan Gibbons
October 31, 2003
- download paper PDF
Infrastructure Design Considerations When Using Client Certificates
Tim Hollingshead
October 31, 2003
- download paper PDF
Creating a Secure VPN with Cisco Concentrator and ACE Radius/SecurID
Nathan Lasnoski
October 31, 2003
- download paper PDF
S-Box Modifications and Their Effect in DES-like Encryption Systems
Joe Gargiulo
October 31, 2003
- download paper PDF
Configuring Secure Shell with TCP Wrappers on Solaris 2.8
Jane Micheller
October 31, 2003
- download paper PDF
Issues When Using IPsec Over Geosynchronous Satellite Links
Greg Totsline
October 31, 2003
- download paper PDF
Appropriate Use of Network Encryption Technologies
Kenneth Forward
October 31, 2003
- download paper PDF
Randomness and Entropy - An Introduction
Chris Thorn
October 31, 2003
- download paper PDF
No Single Killer App for PKI
Cliff Schiller
October 31, 2003
- download paper PDF
A Review of Chaffing and Winnowing
David Spence
October 31, 2003
- download paper PDF
Remote Access IPSec VPNs: Pros and Cons of 2 Common Clients
Jason Everard
October 31, 2003
- download paper PDF
Applied Encryption: Ensuring Integrity of Tactical Data
Jennifer Skalski-Pay
October 31, 2003
- download paper PDF
An Overview of Cryptographic Hash Functions and Their Uses
John Silva
October 31, 2003
- download paper PDF
BUSINESS PARTNER VPN: NEEDED NOW
Karen Duncanson
October 31, 2003
- download paper PDF
Remote Access VPN - Security Concerns and Policy Enforcement
Mike Stines
October 31, 2003
- download paper PDF
The Risks Involved With Open and Closed Public Key Infrastructure
Philip Hlavaty
October 31, 2003
- download paper PDF
The mathematics behind the security features that the computing industry takes for granted
Ricky Wald
October 31, 2003
- download paper PDF
A Consumer Guide for Personal File and Disk Encryption Programs
Scott Baldwin
October 31, 2003
- download paper PDF
Is the future of cryptography in qubits
Wayne Redmond
October 31, 2003
- download paper PDF
Cryptography: What is secure?
Willy Jiang
October 31, 2003
- download paper PDF
PGP for Everyday Use
Jeremy Hoel
October 31, 2003
- download paper PDF
Prime Numbers in Public Key Cryptography
Gerald Crow
October 31, 2003
- download paper PDF
When Security Counts: Securing a Test Server with a VPN Connection
Patricia Hulsey
October 31, 2003
- download paper PDF
Quantum Encryption - A Means to Perfect Security?
Bruce Auburn
October 31, 2003
- download paper PDF
Cryptanalysis of RSA: A Survey
Carlos Cid
October 31, 2003
- download paper PDF
Multiprotocol Label Switching Virtual Private Networks and the enterprise - Do they fit in the security model?
Michael Stoos
October 31, 2003
- download paper PDF
Network Based VPNs
Olivier Strahler
October 31, 2003
- download paper PDF
Using GPL Software For Email and File Encryption
David Tucker
October 31, 2003
- download paper PDF
Attacks on PGP: A Users Perspective
Ryan Thomas
October 31, 2003
- download paper PDF
IPSec Tunnel Creation
Chris Gutridge
October 31, 2003
- download paper PDF
Instant Message Security - Analysis Of Cerulean Studios Trillian Application
Michael Murphy
October 31, 2003
- download paper PDF
MPLS - VPN Services and Security
Ravi Sinha
October 31, 2003
- download paper PDF
IPSec Interoperability between OpenBSD, Linux and Sonicwall
Daniel de Young
October 31, 2003
- download paper PDF
Demystifying DSS: The Digital Signature Standard
Richard Brehove
October 31, 2003
- download paper PDF
Security Implications of SSH
Bill Pfeifer
October 31, 2003
- download paper PDF
Cryptography - Business Value Behind the Myth
Jeff Christianson
October 31, 2003
- download paper

Detecting and Preventing Unauthorized Outbound Traffic
Brian Wippich
October 29, 2007
- download paper PDF
Distilling Data in a SIM: A Strategy for the Analysis of Events in the ArcSight ESM
James Voorhees
October 12, 2007
- download paper PDF
Tuning an IDS/IPS From The Ground UP
Brandon Greenwood
September 27, 2007
- download paper PDF
Detecting and Preventing Rogue Devices on the Network
Ibrahim Halil Saruhan
August 13, 2007
- download paper PDF
Assumptions in Intrusion Detection - Blind Spots in Analysis
Rodney Caudle
March 28, 2007
- download paper PDF
Enhancing IDS using, Tiny Honeypot
Richard Hammer
November 13, 2006
- download paper PDF
Passive Application Mapping
Benjamin Small
October 27, 2006
- download paper PDF
A Framework to Collect Security Events for Intrusion Analysis
Jim Chrisos
April 3, 2006
- download paper PDF
Solaris 10 Filesystem Integrity Protection Using Radmind
Sam Wilson
May 17, 2005
- download paper PDF
Understanding Wireless Attacks and Detection
Christopher Low
May 17, 2005
- download paper PDF
A Honeypot Based Worm Alerting System
Jeff Kloet
May 5, 2005
- download paper PDF
Building a tripwire System for SQL Server
Frank Ress
May 5, 2005
- download paper PDF
Maintaining a Secure Network
Robert Droppleman
August 15, 2004
- download paper PDF
Enforcing Policy at the Perimeter
Derek Buelna
July 25, 2004
- download paper PDF
Algorithm-based Approaches to Intrusion Detection and Response
Alexis Cort
June 9, 2004
- download paper PDF
Running a World Class Intrusion Detection Program: More Than Just Picking the Right Tool
JD Aupperle
May 2, 2004
- download paper PDF
Understanding IPS and IDS: Using IPS and IDS together for Defense in Depth
Ted Holland
May 2, 2004
- download paper PDF
Enterprise Security Management Reducing the Pain of Managing Multiple IDS Systems
David Leadston
March 25, 2004
- download paper PDF
IDS Burglar Alarms: A How-To Guide
Mark Embrich
March 2, 2004
- download paper PDF
Intrusion detection evasion: How Attackers get past the burglar alarm
Corbin Del Carlo
December 13, 2003
- download paper PDF
Wanted Dead or Alive: Snort Intrusion Detection System
Mark Eanes
December 13, 2003
- download paper PDF
Secure Setup of a Corporate Detection and Scanning Environment
Dieter Sarrazyn
December 13, 2003
- download paper PDF
Snort Alert Collection and Analysis Suite
Chip Calhoun
November 6, 2003
- download paper PDF
Distributed NIDS: A HOW-TO Guide
Alan McCarty
November 6, 2003
- download paper PDF
Logfile Analysis: Identifying a Network Attack
Michael Fleming
October 31, 2003
- download paper PDF
How to Choose Intrusion Detection Solution
Baiju Shah
October 31, 2003
- download paper PDF
Using Snort v1.8 with SnortSnarf on a RedHat Linux System
Richard L. Greene
October 31, 2003
- download paper PDF
Application of Neural Networks to Intrusion Detection
Jean-Philippe Planquart
October 31, 2003
- download paper PDF
Understanding Intrusion Detection Systems
Danny Rozenblum
October 31, 2003
- download paper PDF
Selecting an Intrusion Detection System
Kathleen Buonocore
October 31, 2003
- download paper PDF
Anti-IDS Tools and Tactics
Steve Martin
October 31, 2003
- download paper PDF
Building and Maintaining a NIDS Cluster Using FreeBSD and Snort
Michael Boman
October 31, 2003
- download paper PDF
Intrusion Detection - Systems for Today and Tomorrow
George Ho
October 31, 2003
- download paper PDF
Intrusion Detection Systems: An Overview of RealSecure
Darrin Wassom
October 31, 2003
- download paper PDF
Intrusion Detection Systems: Definition, Need and Challenges
Abhijit Sarmah
October 31, 2003
- download paper PDF
The History and Evolution of Intrusion Detection
Guy Bruneau
October 31, 2003
- download paper PDF
An Informal Analysis of One Site's Attempts to Contact Host Owners
Laurie Zirkle
October 31, 2003
- download paper PDF
Black ICE 2.5 Events, False Positives and Custom Attack Signatures
Alan Mercer
October 31, 2003
- download paper PDF
Network Intrusion Detection - Keeping Up With Increasing Information Volume
Timothy Weber
October 31, 2003
- download paper PDF
Host-Based Intrusion Systems for Solaris
Lynn Bogovich
October 31, 2003
- download paper PDF
Protocol Anomaly Detection for Network-based Intrusion Detection
Kumar Das
October 31, 2003
- download paper PDF
Do I Need to Be Concerned About These Firewall Log Entries?
Arvid Soderberg
October 31, 2003
- download paper PDF
IDS - Today and Tomorrow
Thomas Goeldenitz
October 31, 2003
- download paper PDF
Using Snort For a Distributed Intrusion Detection System
Michael P. Brennan
October 31, 2003
- download paper PDF
Host Based Intrusion Detection: An Overview of Tripwire and Intruder Alert
Allison Hrivnak
October 31, 2003
- download paper PDF
Suspicious Unix Log File Entries and Reporting Considerations
Cathy Gresham
October 31, 2003
- download paper PDF
A Tool for Running Snort in Dynamic IP Address Assignment Environment
Shin Ishikawa
October 31, 2003
- download paper PDF
Intrusion Detection Interoperability and Standardization
Pravin Kothari
October 31, 2003
- download paper PDF
Network IDS: To Tailor, or Not to Tailor
Jon-Michael C. Brook
October 31, 2003
- download paper PDF
SSH and Intrusion Detection
Heather M. Larrieu
October 31, 2003
- download paper PDF
The Design and Theory of Data Visualization Tools and Techniques
Brian K. Sheffler
October 31, 2003
- download paper PDF
A Practical Guide to Running SNORT on Red Hat Linux 7.2 and Management Using IDS Policy Manger MySQL
William Metcalf
October 31, 2003
- download paper PDF
A Thousand Heads Are Better Than One - The Present and Future of Distributed Intrusion Detection
Robert Zuver
October 31, 2003
- download paper PDF
Snort Install on Win2000/XP with Acid, and MySQL
Christina Neal
October 31, 2003
- download paper PDF
A Single IDS Console Please: ManHunt 2.1 Pilot Test
Scott Reynolds
October 31, 2003
- download paper PDF
Doing My Part - Sending Data to the Internet Storm Center
Sydney Jensen
October 31, 2003
- download paper PDF
Hands in the Honeypot
Kecia Gubbels
October 31, 2003
- download paper PDF
Intrusion Prevention Systems- Security's Silver Bullet?
Dinesh Sequeira
October 31, 2003
- download paper PDF
Distributed Intrusion Detection Systems: An Introduction and Review
Royce Robbins
October 31, 2003
- download paper PDF
Turning the tables: Loadable Kernel Module Rootkits deployed in a honeypot environment
Jonathan Rose
October 31, 2003
- download paper PDF
Archiving Event Logs
Jim Stansbury
October 31, 2003
- download paper PDF
The Keep Within the Castle Walls - An Experiment in Home Network Intrusion Detection
Gary Wallin
October 31, 2003
- download paper PDF
Intrusion Detection Is Dead. Long Live Intrusion Prevention!
Timothy Wickham
October 31, 2003
- download paper PDF
An Overview of PureSecureTM
Jeffrey Slonaker
October 31, 2003
- download paper PDF
Installing, Configuring, and Testing The Deception Tool Kit on Mac OS X
Jon Lucenius
October 31, 2003
- download paper PDF
Intrusion Prevention - Part of Your Defense in Depth Architecture?
Roberta Spitzberg
October 31, 2003
- download paper PDF
Securing a Windows Snort Sensor for Hostile Environments
Michael Wunsch
October 31, 2003
- download paper PDF
IDMEF "Lingua Franca" for Security Incident Management
Douglas S. Corner
October 31, 2003
- download paper PDF
Intelligent Correlator for NIDS
Marco Bove
October 31, 2003
- download paper PDF
Intrusion Detection with MOM - Going Above the Wire
Don Murdoch
October 31, 2003
- download paper PDF
The Human Factor - Adding Intelligence and Action to Intrusion Detection
Daniel Hill
October 31, 2003
- download paper PDF
Choosing an Intrusion Detection System that Best Suits your Organization
Dennis Mathew
September 16, 2002
- download paper PDF
Fundamental Honeypotting
Justin Mitchell
 
- download paper

Taking advantage of Ext3 journaling file system in a forensic investigation
Gregorio Narvaez
December 11, 2007
- download paper PDF
Forensic Analysis of a SQL Server 2005 Database Server
Kevvie Fowler
September 28, 2007
- download paper PDF
Forensic Analysis of a Compromised Intranet Server
Roberto Obialero
June 8, 2006
- download paper PDF
Becoming a Forensic Investigator
Mark Maher
August 15, 2004
- download paper PDF
A Case for Forensics Tools in Cross-Domain Data Transfers
Dwane Knott
October 31, 2003
- download paper PDF

Microsoft Vista Firewall; Dissected
Phil Kostenbader & Bob Rudis
August 9, 2007
- download paper PDF
Redefining your perimeter with MPLS - an integrated network solution
Vijay Sarvepalli
July 17, 2007
- download paper PDF
Don’t Just Patch, Protect!
Richard Sillito
May 1, 2007
- download paper PDF
XML Firewall Architecture and Best Practices for Configuration and Auditing
Don Patterson
April 30, 2007
- download paper PDF
Egress Filtering FAQ
Chris Brenton
January 18, 2007
- download paper PDF
Firewall Analysis and Operation Methods
Kim Cary
October 23, 2006
- download paper PDF
Wired 802.1x Security
Mohammed Younus
July 27, 2006
- download paper PDF
Exploiting BlackICE When a Security Product has a Security Flaw
Peter Gara
July 9, 2005
- download paper PDF
Regaining Control over your Mobile Users
Shelly Biller
June 23, 2005
- download paper PDF
Ethical Deception and Preemptive Deterrence in Network Security
Brian McFarland
May 17, 2005
- download paper PDF
Using Secure Sockets Layer bridging and content filtering mechanisms to provide defense in-depth when publishing SSL encrypted web hosts.
John Hallberg
May 5, 2005
- download paper PDF
Utilizing Static Packet Filters to Enhance Network Security
Scott Foster
January 17, 2005
- download paper PDF
3Com Distributed Embedded Firewall
Kyle Kelliher
July 25, 2004
- download paper PDF
Netfilter and IPTables: A Structural Examination
Alan Jones
May 2, 2004
- download paper PDF
Support guides for the Cyberguard Firewall Appliance
Chris Bodill
November 19, 2003
- download paper PDF
Configuring Watchguard Proxies: A Guideline to Supplementing Virus Protection and Policy Enforcement
Alan Mercer
November 6, 2003
- download paper PDF
High Availability Firewall - WatchGuard Firebox Vclass V60
Wee Leng Chia
November 6, 2003
- download paper PDF
Private Internet Exchange: The Fastest Firewall in the World?
Keith Cancel
October 31, 2003
- download paper PDF
Sidewinder 5.1 Split DNS Architecture
Charlene Keltz
October 31, 2003
- download paper PDF
Using Open Source to Create a Cohesive Firewall/IDS System
Thomas Dager
October 31, 2003
- download paper PDF
Active Net Steward - Distributed Firewall
Daniel L. Safeer
October 31, 2003
- download paper PDF
Cisco Router Hardening Step-by-Step
Dana Graesser
October 31, 2003
- download paper PDF
IPSec VPN Using FreeBSD
Greg Panula
October 31, 2003
- download paper PDF
Comparison Shopping for Scalable Firewall Products
Laura Keadle
October 31, 2003
- download paper PDF
Achieving Defense-in-Depth with Internal Firewalls
Steve Bridge
October 31, 2003
- download paper PDF
Proxies and Packet Filters in Plain English
Scott Algatt
October 31, 2003
- download paper PDF
Personal Firewalls - Protecting the Home Internet User
Bonnie McDougall
October 31, 2003
- download paper PDF
Application Level Content Scrubbers
Benjamin Sapiro
October 31, 2003
- download paper PDF
Cisco Way
Joseph S. White
October 31, 2003
- download paper PDF
Disconnect from the Internet - Whale's e-Gap In-Depth
Kevin Gennuso
October 31, 2003
- download paper PDF
Protecting the Next Generation Network -Distributed Firewalls
Robert Gwaltney
October 31, 2003
- download paper PDF
Fighting Cyber Terrorism - Where Do I Sign Up?
Pamela Dodge
October 31, 2003
- download paper PDF
A Layer-7 Secure Security Posture
Paul Vinciguerra
October 31, 2003
- download paper PDF
CBAC - Cisco IOS Firewall Feature Set Foundations
Evan Davies
October 31, 2003
- download paper PDF
Building an IPv6 Firewall with OpenBSD
Eric Millican
October 31, 2003
- download paper PDF
A Review Of Floppy-Based Firewalls And Their Security Considerations
Sean Closson
October 31, 2003
- download paper PDF
Protecting the Network without Breaking the Bank
Gerald Clevenger
October 31, 2003
- download paper PDF
The Firewall has been Installed, Now What? Developing a Local Firewall Security Policy
Richard Walker
October 31, 2003
- download paper PDF
Getting the Most out of your Firewall Logs
Matt Willard
October 31, 2003
- download paper PDF
Configuring a NetScreen Firewall: Best practice guideline for the basic setup of a NetScreen firewal
Robert Bayley
October 31, 2003
- download paper PDF
The Installation and Configuration of a Cisco PIX Firewall with 3 Interfaces and a Stateful Failover
Steve Textor
October 31, 2003
- download paper PDF
Using ISA Server Logs to Interpret Network Traffic
Brian McKee
October 31, 2003
- download paper PDF
IPFilter: A Unix Host-Based Firewall
Dana Price
October 31, 2003
- download paper PDF
Securing Extranet Connections
Jeff Pipping
October 31, 2003
- download paper PDF
Securing Solaris Servers Using Host-based Firewalls
William Kirt Karl
October 31, 2003
- download paper PDF
Denial of Service Attacks and the Emergence of "Intrusion Prevention Systems"
Adrian Brindley
October 31, 2003
- download paper PDF
Case Study: Deploying and Configuring a Netscreen 100 Firewall Appliance to Secure the Network
James Murphy
October 31, 2003
- download paper PDF
Using The Cisco Pix Device Manager
Jason Holcomb
October 31, 2003
- download paper PDF
Designing a DMZ
Scott Young
October 31, 2003
- download paper PDF
Choosing The Best Firewall
Gerhard Cronje
October 31, 2003
- download paper PDF
Scanning for viruses
Dan Boyd
October 31, 2003
- download paper PDF
Build your own firewall using SuSE Linux: A mechanics guide.
Paul ONeil
October 31, 2003
- download paper PDF
Long Distance Failover - High Availability using Cisco PIX Firewall
Chris Ellem
October 31, 2003
- download paper PDF
Secure Configuration of a Cisco 837 ADSL firewall router
Brett McIntosh
October 31, 2003
- download paper PDF
Migrating Services Between Firewall Technologies
Andrew Barratt
October 31, 2003
- download paper PDF
Solaris 8 and Checkpoint NG FP3 install with SSH, JASS and Syslog
Mike Shannon
October 31, 2003
- download paper

A Design for Building an IPS Using Open Source Products
Mike Smith
October 30, 2006
- download paper PDF
Intrusion Detection on a Large Network
Jason Botwick
April 8, 2004
- download paper PDF
Packet Level Normalisation
Ian Martin
October 31, 2003
- download paper PDF
A Summary of DoS/DDoS Prevention, Monitoring and Mitigation Techniques in a Service Provider Environment
Michael Glenn
October 31, 2003
- download paper

Governmental Effects upon the Cyber Security Decision Making Cycle
Bruce Norquist
May 5, 2005
- download paper PDF
Governmental Effects upon the Cyber Security Decision Making Cycle
Bruce Norquist
March 9, 2005
- download paper PDF
Building a More Secure Network
George Rosamond
June 9, 2004
- download paper PDF
Building a Secure Enterprise Grade V3PN
Ian C. Rudy
February 26, 2004
- download paper PDF
Applying Security to an Enterprise using the Zachman Framework
Lori L. DeLooze
October 31, 2003
- download paper PDF
The Evolution of the Information Security Mindset: A Hypothesis of Stages of Individual and Enterpri
Glenn Fourie
October 31, 2003
- download paper PDF
Implementing a Project Security Review Process within the Project Management Methodology
Darlene Hart Rodgers
October 31, 2003
- download paper PDF
Building a Secure Internet Data Center Network Infrastructure
Chang Boon Tee
November 7, 2001
- download paper PDF
กลับไปหน้าที่แล้ว


  ส่วนตอบคำถาม
หน้าที่ 1
ความคิดเห็นที่ 11      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :17/03/2010 09:23:11
Reply by :
Mr.GMAXZ

ระดับ :ศิษย์พี่รอง
ตั้งคำถาม : 6 ครั้ง
ตอบคำถาม : 78 ครั้ง
E-mail :
ขอบคุณป๋าเต้มากครับสำหรับข้อมูลดีๆ และ มีประโยชน์ แบบนี้ ขอบคุณครับ
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 10      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :17/03/2010 09:21:07
Reply by :
Mr.GMAXZ

ระดับ :ศิษย์พี่รอง
ตั้งคำถาม : 6 ครั้ง
ตอบคำถาม : 78 ครั้ง
E-mail :
อ้างอิงจาก คุณ MiS@Ae
มาช่วยขุด
 
ถึงเพื่อนๆ รุ่นน้อง เตรียมหาหัวข้อกันได้แล้วเน้อ อย่ามัวแต่เตรียมตัวเที่ยวสงกรานต์ล่ะ เดี๋ยวจะเปียก
อยากเจอตัวจริงพี่มิซาเอะจังครับ ไว้มีโอกาส ขอทำความรู้จักหน่อยนะคร้าบ
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 9      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :16/03/2010 15:29:51
Reply by :
NE03
ตำแหน่ง:
Guest
ขออนุญาตขุดให้เพื่อนๆ MSNE03 ครับ 
เห็นว่าเป็นประโยชน์ครับผม
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 8      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :24/03/2008 20:51:10
Reply by :
kAtwOmAn

ระดับ :จ้าวสำนักวัดเส้าหลิน
ตั้งคำถาม : 22 ครั้ง
ตอบคำถาม : 553 ครั้ง
E-mail :
แฟ้มบุคคลขอปรบมือให้...สุดยอดเลยอ่ะเต้
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 7      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :24/03/2008 13:44:40
Reply by :
M i S @ A e

ระดับ :จ้าวสำนักวัดเส้าหลิน
ตั้งคำถาม : 8 ครั้ง
ตอบคำถาม : 725 ครั้ง
E-mail :
มาช่วยขุด
 
ถึงเพื่อนๆ รุ่นน้อง เตรียมหาหัวข้อกันได้แล้วเน้อ อย่ามัวแต่เตรียมตัวเที่ยวสงกรานต์ล่ะ เดี๋ยวจะเปียก
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 6      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 16:35:49
Reply by :
T-Rex

ระดับ :ผู้อาวุโสวัดเส้าหลิน
ตั้งคำถาม : 7 ครั้ง
ตอบคำถาม : 295 ครั้ง
E-mail :
ไหน ๆ ก็ ไหน ๆ แล้ว
 
พอจะมีหัวข้อของ Database บ้างหรือเปล่าครับ  คิดมะออก อะครับ หุหุ
 
 
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 5      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 16:20:15
Reply by :
@ WAY OF ZEN ->

ระดับ :ศิษย์พี่ใหญ่
ตั้งคำถาม : 12 ครั้ง
ตอบคำถาม : 135 ครั้ง
E-mail :
เยี่ยมยอดมากครับเต้ เผื่อแผ่ๆ
So Good..
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 4      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 15:55:12
Reply by :
ศุภกร กังพิศดาร (twitter: @kungpisdan)

ระดับ :จ้าวยุทธจักร
ตั้งคำถาม : 188 ครั้ง
ตอบคำถาม : 1528 ครั้ง
E-mail :
ขอบคุณมากครับเต้ เป็นประโยชน์มากๆเลย
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 3      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 15:39:21
Reply by :
Casanova

ระดับ :ศิษย์พี่ใหญ่
ตั้งคำถาม : 19 ครั้ง
ตอบคำถาม : 217 ครั้ง
E-mail :
เส้นทางลัดครับ
สนใจเรื่องไหนก็ CLick ที่หน้านี้ กด Ctrl+F ใส่ข้อมูลที่ต้องการหาครับ
จะได้ไม่ตาลาย
 
ขอให้โชคดีครับ
ส่วนหากต้องการหาหนังสืออ่านเพิ่มเติมลองไปดู
www.flazx.com
www.oebook.com
 
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 2      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 15:27:22
Reply by :
Casanova

ระดับ :ศิษย์พี่ใหญ่
ตั้งคำถาม : 19 ครั้ง
ตอบคำถาม : 217 ครั้ง
E-mail :
Web Based Attacks
Justin Crist
January 4, 2008
- download paper PDF
SQL Injection: Are your web applications vulnerable?
SPI Dynamics - May 2007
Analyzing Attack Surface Code Coverage
Justin Seitz
November 14, 2007
- download paper PDF
Forensic Analysis of a SQL Server 2005 Database Server
Kevvie Fowler
September 28, 2007
- download paper PDF
Automated Scanning of Oracle 10g Databases
Rory McCune
August 7, 2007
- download paper PDF
Using Oracle Forensics to determine vulnerability to Zero Day exploits
Paul Wright
February 28, 2007
- download paper PDF
Security in Sun Java System Application Server Platform Edition 8.0
Sid Ansari
June 29, 2005
- download paper PDF
Web Browser Insecurity
Paul Asadoorian
June 2, 2005
- download paper PDF
Application Firewalls: Don't Forget About Layer 7
Russell Eubanks
May 17, 2005
- download paper PDF
Reining in the LAN client
David Monaco
February 25, 2005
- download paper PDF
Securing SQL Connection String
Dmitry Dessiatnikov
April 8, 2004
- download paper PDF
Assessing Vendor Application Security A Practical Way to Begin
Barton Hubbs
April 8, 2004
- download paper PDF
Application Development Technology and Tools: Vulnerabilities and threat management with secure programming practices, a defense in-depth approach
Vilas Ankolekar
December 13, 2003
- download paper PDF
SQL Server 2000: Permissions on System Tables Granted to Logins Due to the Public Role
K Brian Kelley
December 13, 2003
- download paper PDF
Service Account Vulnerabilities
Barbara Guhanick
October 31, 2003
- download paper PDF
Source Code Revelation Vulnerabilities
Christopher Short
October 31, 2003
- download paper PDF
Database - The Final Firewall
Brian Suddeth
October 31, 2003
- download paper PDF
An Approach to Application Security
Ian Rathie
October 31, 2003
- download paper PDF
Distributed Object Technology: Security Perspective
Subbu Cherukuwada
October 31, 2003
- download paper PDF
Making Your Network Safe for Databases
Duane Winner
October 31, 2003
- download paper PDF
Web Application Security for Managers
Pierre de la Brassinne
October 31, 2003
- download paper PDF
Distributed Systems Security: Java, CORBA, and COM+
April L. Moreno
October 31, 2003
- download paper PDF
Security Scenarios in Analysis and Design
Dwight A. Haworth
October 31, 2003
- download paper PDF
Framework for Secure Application Design and Development
Chris McCown
October 31, 2003
- download paper PDF
Security for a CRM environment
Jason LaFrance
October 31, 2003
- download paper PDF
Securing Server Side Java
William Rushmore
October 31, 2003
- download paper PDF
Deploying a Secure Web Application: From a Coding Perspective
Jaime Spicciati
October 31, 2003
- download paper PDF
J.D. Edwards Security using RBAC
Scott Gordee
October 31, 2003
- download paper PDF
Securing End User Active Server Page Applications on an Intranet
Bob Bohn
October 31, 2003
- download paper PDF
SQL Server Email - vulnerability issues and prevention strategies
Frank Ress
October 31, 2003
- download paper

Implementing Single Sign-On — Imprivata OneSign™
Robert Turner
August 7, 2007
- download paper PDF
Simple Formula for Strong Passwords (SFSP) Tutorial
Bernie Thomas
May 17, 2005
- download paper PDF
Installing a Secure Network DHCP Registration System
Pam Fournier
May 5, 2005
- download paper PDF
Secure implementation of Enterprise single sign-on product in an organization
Ravikanth Ponnapalli
January 18, 2005
- download paper PDF
An Exploration of Voice Biometrics
Lisa Myers
July 25, 2004
- download paper PDF
Single Sign On Concepts & Protocols
Sandeep Sandhu
March 25, 2004
- download paper PDF
Dont Blink:Iris Recognition for Biometric Identification
Mary Dunker
March 9, 2004
- download paper PDF
Biometrics: An In Depth Examination
Kyle Cherry
March 2, 2004
- download paper PDF
Convergence of Logical and Physical Security
Yahya Mehdizadeh
January 11, 2004
- download paper PDF
Biometrics: Technology That Gives You a Password You Can't Share
Yevgeniy Libov
October 31, 2003
- download paper PDF
Overview of S/Key usage with OpenBSD
Christian Lecompte
October 31, 2003
- download paper PDF
Proximity Authentication
Ali Merayyan
October 31, 2003
- download paper PDF
Clear Text Password Risk Assessment Documentation
Kimberly Rallo
October 31, 2003
- download paper PDF
Password Protection: Is This the Best We Can Do?
Jason Mortensen
October 31, 2003
- download paper PDF
Inadequate Password Policies Can Lead to Problems
Leonard Hermens
October 31, 2003
- download paper PDF
An Overview of Different Authentication Methods and Protocols
Richard Duncan
October 31, 2003
- download paper PDF
Technical Aspect of Implementing/Upgrading SAP Security 4.6
Mary E. Sims
October 31, 2003
- download paper PDF
A Concept for Universal Identification
Daniel E. Williams
October 31, 2003
- download paper PDF
Biometrics and User Authentication
Michael Zimmerman
October 31, 2003
- download paper PDF
Authentication and Authorization: The Big Picture with IEEE 802.1X
Arthur Fisher
October 31, 2003
- download paper PDF
More Than a Pretty Face, Biometrics and SmartCard Tokens
Gregory Williams
October 31, 2003
- download paper PDF
Biometric Technology Stomps Identity Theft
Seyoum "Zeg" Zegiorgis
October 31, 2003
- download paper PDF
Securing Access: Making Passwords a Legitimate Corporate Defense
David H. Sherrod
October 31, 2003
- download paper PDF
Build a Web Interface to Allow Users to Change their Passwords (The Web Password Page)
Mark Holbrook
October 31, 2003
- download paper PDF
Java Smart Cards Are Here To Stay: Benefits And Concerns
Sonia Otero
October 31, 2003
- download paper PDF
Web Single Sign-On Meets Business Reality
Tim Mather
October 31, 2003
- download paper PDF
Smart Cards: How Secure Are They?
John Abbott
October 31, 2003
- download paper PDF
Iris Recognition Technology for Improved Authentication
Penny Khaw
October 31, 2003
- download paper PDF
Biometrics: A Double Edged Sword - Security and Privacy
Wayne Penny
October 31, 2003
- download paper PDF
Making Smart Cards Work In the Enterprise
Brett Lewis
October 31, 2003
- download paper PDF
Biometric Selection: Body Parts Online
Steven M. Walker
October 31, 2003
- download paper PDF
Single Sign On Through Password Synchronization
Nancy Loveland
October 31, 2003
- download paper PDF
Combating the Lazy User: An Examination of Various Password Policies and Guidelines
Sam Wilson
October 31, 2003
- download paper PDF
Iris Recognition: Closer Than We Think?
Miltiades Leonidou
October 31, 2003
- download paper PDF
Shedding some light on Voice Authentication
Dualta Currie
October 31, 2003
- download paper PDF
Biometrics: Are YOU the Key to Security?
Patricia Wittich
October 31, 2003
- download paper PDF
In Pursuit of Liberty?
Randy Mahrt
October 31, 2003
- download paper PDF
An Introduction to Identity Management
Spencer Lee
October 31, 2003
- download paper PDF
It's All About Authentication
Douglas Graham
October 31, 2003
- download paper PDF
Identity Management
Kevin Kaufman
October 31, 2003
- download paper PDF
Identity Protection and Smart Card Adoption in America
Stephen Irwin
October 31, 2003
- download paper PDF
Passwords are DEAD! (Long live passwords?)
David Beverstock
October 31, 2003
- download paper PDF
L is for Login
Carolee Rand
October 31, 2003
- download paper PDF
Biometric Scanning Technologies: Finger, Facial and Retinal Scanning
Edmund Spinella
October 31, 2003
- download paper PDF
Common issues in PKI implementations - climbing the "Slope of Enlightenment"
Angela Keith
October 31, 2003
- download paper PDF
Considerations For Implementing Single Sign-On Within The Enterprise
Russell Hobbs
October 31, 2003
- download paper PDF
Strengthening Authentication with Biometric Technology
Tricia Olsson
October 31, 2003
- download paper PDF
Preventing the fraudulent use of Internet DSL accesses by dial-up accounts: a network authentication issue.
Bruno Germain
October 31, 2003
- download paper

OS and Application Fingerprinting Techniques
Jon Mark Allen
September 27, 2007
- download paper PDF
Well It's About Time
Vance Rider
January 19, 2005
- download paper PDF
The Next Internet Privacy in Internet Protocol Version 6 (IPv6)
Kevin Scott
June 9, 2004
- download paper PDF
Applying the OSI Seven Layer Network Model To Information Security
Damon Reed
January 11, 2004
- download paper PDF
Monitoring The ARP Protocol On Local Area Networks
David Fuselier
January 11, 2004
- download paper PDF
Understanding Instant Messaging (IM) and its security risks
Sujata Chavan
November 5, 2003
- download paper PDF
A Look at Automatic Protocol Generation & Security Protocols
Boris W. Vassall
October 31, 2003
- download paper PDF
Securing Time - The Autokey Protocols
Robert H. Palko
October 31, 2003
- download paper PDF
IP Security Protocol-based VPNs
Eddie Younker
October 31, 2003
- download paper PDF
Digging Deeper Into TCP/IP
Leah Wilson
October 31, 2003
- download paper PDF
Securing FTP Authentication
Mike Gromek
October 31, 2003
- download paper PDF
SNMP Alert 2002: What is it all about?
Brad Beckenhauer
October 31, 2003
- download paper PDF
Your Greatest Strength can become your Greatest Weakness: Simple Network Management Protocol Vulnera
Amy Geiger
October 31, 2003
- download paper PDF
Understanding Security Using the OSI Model
Glenn Surman
October 31, 2003
- download paper PDF
Securing an Anonymous FTP Server in Solaris 8 with WU-FTPD
Mansel Bell
October 31, 2003
- download paper PDF
Border Gateway Protocol -The Language of the Internet
Yvonne Tracy
October 31, 2003
- download paper PDF
Security Features in IPv6
Penny Hermann-Seton
October 31, 2003
- download paper PDF
SNMP and Potential ASN.1 Vulnerabilities
Edmund Whelan
October 31, 2003
- download paper PDF
Mobile IPv6
Sudha Sudanthi
October 31, 2003
- download paper PDF
SSL and TLS: A Beginners Guide
Holly McKinley
October 31, 2003
- download paper PDF
Is The Border Gateway Protocol Safe?
Sargon Elias
October 31, 2003
- download paper PDF
Security Measures to couple mixed IPv4/IPv6 Networks over a pure IPv6 Infrastructure by making Use of NAT-PT
Thorsten Brikey
October 31, 2003
- download paper PDF
The Real Cost of Free Programs such as Instant Messaging and Peer-to-Peer File Sharing Applications
Sigrun Grabowski
October 31, 2003
- download paper PDF
IPv6 Deployment in Malaysia: The Issues and Challenges
Raja Azlina Raja Mahmood
April 4, 2002
- download paper PDF
ตอบกลับ | อ้างอิง

ความคิดเห็นที่ 1      Re Topic: ถึงพี่ๆเพื่อน รุ่น 3 หากใครเรียน Network และ MSNE หาหัวข้อโปรเจคไม่ได้.. Click
โพสเมื่อ :28/02/2008 15:24:27
Reply by :
Casanova

ระดับ :ศิษย์พี่ใหญ่
ตั้งคำถาม : 19 ครั้ง
ตอบคำถาม : 217 ครั้ง
E-mail :
Attack vs. Defense on an Organizational Scale
Omar Fink
December 11, 2007
- download paper PDF
ANI vulnerability: History repeats
Shashank Gonchigar
October 24, 2007
- download paper PDF
A System of Persistent Baseline Automated Vulnerability Scanning and Response in a Distributed University Environment
Chet Langin
September 18, 2007
- download paper PDF
Malware Analysis: Environment Design and Artitecture
Adrian Sanabria
August 2, 2007
- download paper PDF
Visually Assessing Possible Courses of Action for a Computer Network Incursion
Grant Vandenberghe
June 15, 2007
- download paper PDF
A Survey of Wireless Mesh Networking Security Technology and Threats
Anthony Gerkis
October 18, 2006
- download paper PDF
Address Resolution Protocol Spoofing and Man-in-the-Middle Attacks
Robert Wagner
August 11, 2006
- download paper PDF
Exploiting BlackICE When a Security Product has a Security Flaw
Peter Gara
July 9, 2005
- download paper PDF
A Spyware Survival Toolkit
Peter McGranaghan
May 17, 2005
- download paper PDF
What is Santy bringing you this year?
Pieter Danhieux
May 5, 2005
- download paper PDF
Electronic Toll Collection
Don Flint
July 25, 2004
- download paper PDF
Phishing: An Analysis of a Growing Problem
Anthony Elledge
July 25, 2004
- download paper PDF
Risk-Eye for the IT Security Guy
Thomas Siu
May 2, 2004
- download paper PDF
Skimming and Its Side Effects
Nobie Cleaver
March 9, 2004
- download paper PDF
Vulnerability Management: Tools, Challenges and Best Practices
Cathleen Brackin
December 13, 2003
- download paper PDF
Corporate Anti-Virus Protection - A Layered Approach
Elizabeth Peyton
November 6, 2003
- download paper PDF
Managing vulnerabilities exposed by Windows services.
James Williams
November 6, 2003
- download paper PDF
Spoofing: An Overview of Some the Current Spoofing Threats
Neil B. Riser
October 31, 2003
- download paper PDF
Big Brother is Watching: An Update on Web Bugs
Steve Nichols
October 31, 2003
- download paper PDF
Aspects of Biological Evolution and Their Implications for Unix Computer Security
Michael Folsom
October 31, 2003
- download paper PDF
Kernel Rootkits
Dino Dai Zovi
October 31, 2003
- download paper PDF
Vulnerability Assessments: The Pro-active Steps to Secure Your Organization
Robert Boyce
October 31, 2003
- download paper PDF
An Overview of Gnutella
Brenda L. Batkins
October 31, 2003
- download paper PDF
Cyber-stalking, Privacy Intrusion at It's Scariest
Pamela Valentine
October 31, 2003
- download paper PDF
Unicode Vulnerability - How & Why?
Andrew Brannan
October 31, 2003
- download paper PDF
Electromagnetic Attack: Is Your Infrastructure and Data at Risk?
Michael B. Hayden
October 31, 2003
- download paper PDF
Defending Against Code Red II Using Symantec NetProwler and Intruder Alert, ddos
Kenneth Donze
October 31, 2003
- download paper PDF
The Changing Face of Distributed Denial of Service Mitigation
Justin Stephen
October 31, 2003
- download paper PDF
Instant Messaging: How Secure Is It?
Susan Willner
October 31, 2003
- download paper PDF
Peer-to-Peer Security and Intel's Peer-to-Peer Trusted Library
Chris McKean
October 31, 2003
- download paper PDF
Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth
Steven H. Bass
October 31, 2003
- download paper PDF
Outsourcing and the Increased Dangers of 'Dial Up' Access
Paul Jenkinson
October 31, 2003
- download paper PDF
Analysis of FTP Hijack
Phong Huynh
October 31, 2003
- download paper PDF
Free InfoSec Training, Compliments of History
Chris Bachmann
October 31, 2003
- download paper PDF
Internal Threat - Risks and Countermeasures
Jarvis Robinson
October 31, 2003
- download paper PDF
Remote Access White Paper
Ken Stasiak
October 31, 2003
- download paper PDF
ICMP Attacks Illustrated
Christopher Low
October 31, 2003
- download paper PDF
Cross-Sight Scripting Vulnerabilities
Mark Shiarla
October 31, 2003
- download paper PDF
The Instant Messaging Menace: Security Problems in the Enterprise and Some Solutions
Dan Frase
October 31, 2003
- download paper PDF
SSL Man-in-the-Middle Attacks
Peter Burkholder
October 31, 2003
- download paper PDF
Buffer Overflows for Dummies
Josef Nelißen
October 31, 2003
- download paper PDF
Cyber Scam Artists: A New Kind of .con
Robert Fried
October 31, 2003
- download paper PDF
Potential Vulnerabilities of Timbuktu Remote Control Software
David Batz
October 31, 2003
- download paper PDF
A New Generation of File Sharing Tools
Dan Klinedinst
October 31, 2003
- download paper PDF
Security for Online Transaction Processing in a White Label Financial Switch
Fabian Soler
October 31, 2003
- download paper PDF
Large Scale Network Incidents - What Can We Do?
Jay Garden
October 31, 2003
- download paper PDF
Worms as Attack Vectors: Theory, Threats, and Defenses
Matthew Todd
October 31, 2003
- download paper PDF
Beyond Conventional Terrorism...The Cyber Assault
Rajeev Puran
October 31, 2003
- download paper PDF
How do we define Responsible Disclosure?
Stephen Shepherd
October 31, 2003
- download paper PDF
Introduction to IP Spoofing
Victor Velasco
October 31, 2003
- download paper PDF
FTP and the Warez Scene
Shelli Crocker
October 31, 2003
- download paper PDF
Vulnerability naming schemes and description languages: CVE, Bugtraq, AVDL and VulnXML
Michael Rohse
October 31, 2003
- download paper PDF
Anatomy of an IP Fragmentation Vulnerability in Linux IPChains: Investigating Common Vulnerabilities and Exposures (CVE) Candidate Vulnerability CAN-1
Karim Sobhi
October 31, 2003
- download paper PDF
Assessing Threats To Information Security In Financial Institutions
Cynthia Bonnette
October 31, 2003
- download paper PDF
Printer Insecurity: Is it Really an Issue?
Vernon Vail
October 31, 2003
- download paper PDF
Vulnerabilities &; Vulnerability Scanning
Ken Houghton
October 31, 2003
- download paper PDF
Examining the RPC DCOM Vulnerability: Developing a Vulnerability-Exploit Cycle
Kevin OShea
October 31, 2003
- download paper PDF
10 Vulnerabilities a Scanner Might Not Find
Jeffrey King
May 12, 2003
- download paper PDF
Why Bother About BIOS Security?
Robert Allgeuer
 
- download paper PDF

Stack Based Overflows: Detect & Exploit
Morton Christiansen
November 6, 2007
- download paper PDF
War Dialing
Michael Gunn
January 18, 2007
- download paper PDF
Penetration Testing: The Third Party Hacker
Pieter Danhieux
May 17, 2006
- download paper PDF
Guidelines for Developing Penetration Rules of Behavior
Nancy Simpson
October 31, 2003
- download paper PDF
Security Life Cycle - 1. DIY Assessment
Lee Wan Wai
October 31, 2003
- download paper PDF
Instruments of the Information Security Trade
Mark Graff
October 31, 2003
- download paper PDF
Finding dsniff on Your Network
Richard Duffy
October 31, 2003
- download paper PDF
A Model for Peer Vulnerability Assessment
Patricia Payne
October 31, 2003
- download paper PDF
Penetration Testing - Is it right for you?
Jimmy Braden
October 31, 2003
- download paper PDF
Penetration 101 - Introduction to becoming a Penetration Tester
Dave Burrows
October 31, 2003
- download paper PDF
Penetration Studies - A Technical Overview
Timothy Layton
October 31, 2003
- download paper PDF
Battle for the Internet: The War is On!
Kevin J. Owens
October 31, 2003
- download paper PDF
An Overview of Remote Operating System Fingerprinting
Chris Trowbridge
October 31, 2003
- download paper

802.11 Denial of Service Attacks and Mitigation
Stuart Compton
February 20, 2008
- download paper PDF
Detecting and Preventing Rogue Devices on the Network
Ibrahim Halil Saruhan
August 13, 2007
- download paper PDF
A Survey of Wireless Mesh Networking Security Technology and Threats
Anthony Gerkis
October 18, 2006
- download paper PDF
Implementing a Secure Wireless Network for a Windows Environment
Dan Thompson
May 17, 2005
- download paper PDF
Security Vulnerabilities and Wireless LAN Technology
Heather Lane
May 17, 2005
- download paper PDF
An Overview of the Wireless Intrusion Detection System
Oliver Poblete
May 5, 2005
- download paper PDF
Consideraciones para la implementacion de 802.1x en WLAN's
Juan Chamorro
May 5, 2005
- download paper PDF
Wireless Intrusion Detection Systems
Ken Hutchison
January 28, 2005
- download paper PDF
An Overview of 802.11 Wireless Network Security Standards & Mechanisms
Luis Wong
January 19, 2005
- download paper PDF
802.11i (How we got here and where are we headed)
Elio Perez
September 16, 2004
- download paper PDF
Enterprise 802.11 Security Considerations and Vendor Solutions
Jon Green
August 25, 2004
- download paper PDF
Wireless security beyond WEP and WPA.
Eric Peeters
July 25, 2004
- download paper PDF
Securing Your Wireless Access Point: What Do All Those Settings Mean Anyways?
Joe Scolamiero
June 9, 2004
- download paper PDF
Corporate Wireless LAN: Know the Risks and Best Practices to Mitigate them
Danny Neoh
March 25, 2004
- download paper PDF
How Things Work: WLAN Technologies and Security Mechanisms
Anna Kagan
January 11, 2004
- download paper PDF
Cisco Aironet Wireless LAN Security
Stephan Kostyk
October 31, 2003
- download paper PDF
Personal Area Networks - How Personal are They?
Virgil Hovar
October 31, 2003
- download paper PDF
Layers One &Two of 802.11 WLAN Security
Jorgen Ellingson
October 31, 2003
- download paper PDF
Wireless Networks: Panacea or the Next Hacker's Playground?
Lee Elmendorf
October 31, 2003
- download paper PDF
Wireless Computing - A Technological Breakthrough Laden with Risk?
Evan Uwakwe
October 31, 2003
- download paper PDF
Mobile Medicine
Beau Fidler
October 31, 2003
- download paper PDF
The Internet in the Palm of Your Hand
Ronald Buchanan
October 31, 2003
- download paper PDF
Wireless Application Protocol (WAP): "What is it all about....How does it work"
Dwayne D. Paro
October 31, 2003
- download paper PDF
Is Your Wireless Network Secure?
Ken Hodges
October 31, 2003
- download paper PDF
Security and the 802.11b Wireless LAN
Sean Griffin
October 31, 2003
- download paper PDF
IEEE 802.11b Wireless LAN: Security Risks
Eng Tiong Ow
October 31, 2003
- download paper PDF
Wireless Networking: Compromising Security for Convenience?
Kimberly A. Buck
October 31, 2003
- download paper PDF
Cisco's Aironet 350 - An Enterprise-Level Wireless Security Solution
Robert Sprague
October 31, 2003
- download paper PDF
Elements of Wireless Security
Gregory A. McGill
October 31, 2003
- download paper PDF
Isolating and Securing Wireless LANs
Chad Hurley
October 31, 2003
- download paper PDF
Implementation of a Secure Wireless Network on a University Campus
Greg Redder
October 31, 2003
- download paper PDF
Security in Wireless Networks
Robert E. Mahan
October 31, 2003
- download paper PDF
The Security Mechanism for IEEE 802.11 Wireless Networks
Alicia Laing
October 31, 2003
- download paper PDF
Wireless Application Protocol 2.0 Security
Tamzin Jeffs
October 31, 2003
- download paper PDF
Security Aspects of Mobile IP
Dale Conn
October 31, 2003
- download paper PDF
Free-Space Optics: A Viable, Secure Last-Mile Solution?
Mark Steege
October 31, 2003
- download paper PDF
Wireless Networking Security: As Part of Your Perimeter Defense Strategy
Daniel Owen
October 31, 2003
- download paper PDF
Wireless LANs and 802.1x
Daryl Stargel
October 31, 2003
- download paper PDF
The Limits on Wireless Security: 802.11 in early 2002
James Voorhees
October 31, 2003
- download paper PDF
Security Along the Path Through GPRS Towards 3G Mobile Telephone Network Data Services
Dung Chang
October 31, 2003
- download paper PDF
Securing A Mobile Telecommunications Network From Internal Fraud
Nathan Kurtz
October 31, 2003
- download paper PDF
Penetration Testing on 802.11b Networks
Benjamin Huey
October 31, 2003
- download paper PDF
Perils and Fixes for 802.11 WLANs in SOHOs
Allan Moluf
October 31, 2003
- download paper PDF
Defence In Depth: Preventing Going Hairless Over Wireless
Jonathon Berry
October 31, 2003
- download paper PDF
Bluetooth: The Global Technology?
Howard Johnson
October 31, 2003
- download paper PDF
802.11, 802.1x, and Wireless Security
Philip Craiger
October 31, 2003
- download paper PDF
Wireless Networks: Security Problems and Solutions
Jonathan Weiss
October 31, 2003
- download paper PDF
Scouts Out! - Protecting the Army's Wireless Networks and its impact on Corporate Wireless Co
Jim Mussulman
October 31, 2003
- download paper PDF
A Guide to Wardriving and Detecting Wardrivers
Andrew Etter
October 31, 2003
- download paper PDF
Wireless is not the Problem
Jack J. Couch
October 31, 2003
- download paper PDF
How to Avoid Ethical and Legal Issues In Wireless Network Discovery
Erik Montcalm
October 31, 2003
- download paper PDF
Identifying the risk involved in allowing wireless, portable devices into your company
Claire McDonough
October 31, 2003
- download paper PDF
An Overview Of Wireless Security Issues
Kevin Tyrrell
October 31, 2003
- download paper PDF
State of Affairs of Wireless Networks
Rakesh Arora
October 31, 2003
- download paper PDF
Bluetooth And Its Inherent Security Issues
Tu Niem
October 31, 2003
- download paper PDF
Wireless LAN: Security Issues and Solutions
Rafidah Abdul Hamid
October 31, 2003
- download paper PDF
Wireless LAN Security Defense In Depth
Wan Roshaimi Wan Abdullah
October 31, 2003
- download paper PDF
The evolution of wireless security in 802.11 networks: WEP, WPA and 802.11 standards
Stanley Wong
October 31, 2003
- download paper PDF
Wireless Security and Monitoring for the Home Network
Raymond Turner
October 31, 2003
- download paper PDF
Brush up on Bluetooth
Jeffrey Hall
October 31, 2003
- download paper PDF
An In-depth Look at Wireless WAN Security: Cellular Digital Packet Data Networks and their Security Issues
Farid Hatefi
October 31, 2003
- download paper PDF
Security Guidelines for Wireless LAN Implementation
KengHoe Lim
October 31, 2003
- download paper
ตอบกลับ | อ้างอิง

หน้าที่ 1