Real-time Static Malware Analysis Using NepenthesFE
Distributed Denial of Service (DDos) Testing Methodology
Data Leakage Prevention - K. K. Mookhey
Information Rights Management (IRM)
Cyber fraud in banks
Web Application Security Strategy
Spear Phishing Methodology
XML Interfaces to the popular Nessus Scanner
PCI DSS for Penetration Testing
Advanced persistent threats
NII Social Engineering Case Study
Data Leakage Prevention (DLP)
Advanced persistent threats(APT)
Cyber Security in Civil Aviation
Who will guard the guards
The Economics of Security