Blog Posts Tagged with "Ben Rothke"

3e35900ae6facc6c146a85c435c71d82

To the Cloud: Cloud Powering an Enterprise

March 10, 2012 Added by:Ben Rothke

Moving services to a public cloud means increasing your exposure to malicious attacks. This is not a potential increase, rather a definite increase. It is important to determine how well a cloud provider handles both technical and security requirements...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Tangled Web: A Guide to Securing Modern Web Applications

February 26, 2012 Added by:Ben Rothke

There is no doubt that some sites use cookies as a mechanism for malicious use. But that there is nothing that makes it uniquely suited for this task, as there are many other equivalent ways to sore unique identifiers on visitor’s computes, such as cache-based tags...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

The Fundamentals of Infosec in Theory and Practice

February 14, 2012 Added by:Ben Rothke

Information security is an overwhelming body of knowledge, and for many it can indeed be a far too tremendous body of text to attempt to cover. To that effort this book is an invaluable resource as it covers the key areas without getting bogged down in the minutia...

Comments  (0)

3e35900ae6facc6c146a85c435c71d82

Metasploit: The Penetration Tester's Guide

January 30, 2012 Added by:Ben Rothke

The Metasploit Project is an open-source security project that provides information about security vulnerabilities and assists those performing the penetration tests in building a framework in which to carry out the testing...

Comments  (1)

C6dd57cb9806eadc9f7915a90d91aa92

Plagiarism and the State of Infosec Publishing

August 16, 2011 Added by:Tony Campbell

Book publishers need to up their game in terms of their quality assurance processes in order to demonstrate their true worth to their customers, something that the charlatans, such as Gregory Evans and Ali Jahangiri, will always fail to deliver upon – since these guys are not publishers...

Comments  (2)