| |
pirates, and gamers, and thieves, oh my! why your customers will find your security flaws. |
| | network reconnaissance with nmap |
| | click fraud @ overture |
| | legal landscape |
| | building a virus-safe computing platform: don't add security, remove insecurity |
| | compliance and international legal updates |
| | physical security: the good, the bad, and the ugly? |
| | desktop security: malware, SPAM defense, VPN, securID, pFW |
| | vault and co-lo security |
| | chat hackers |
| | user data handling and privacy |
| | intrusion detection @ overture |
| | crisis management |
| | DoS attacks |
| | product/application security checklist v2 roundtable |
| | applied web hacking (tools) |
| | windows server security |
| | NETSEC 101: nuts & bolts, ACLs, best practices |
| | the big picture |
|
|
|