Xssandcsrf
Firewalls (Distributed computing)
Token Authentication for Java Applications
Securing Web Applications with Token Authentication
Securing and Monitoring the Domain Name System
SOMA: Mutual Approval for Included Content in Web Pages Terri Oda, Glenn Wurster, P.C. van Oorschot, Anil Somayaji Carleton Computer Security Lab Carleton.
©2015 Check Point Software Technologies Ltd. 1 Rich Comber SME, Threat Prevention Check Point Software Technologies Moving to a Prevent Based Security.
PPD Computing Group Christmas Lectures 2004 Security Issues Gareth Smith.