News bytes Sept-2011
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM + How to Detect the Bash vulnerability
Step by step guide for web application security testing
Chapter 6 Attacking Authentication Adam Fremd. Overview O Authentication also lies at the heart of an application’s protection against malicious attack.
Network Security
1 Chapter 13 Network Security Data Communications and Computer Networks: A Business User’s Approach.
Chapter 6 Attacking Authentication