CBR
Vulnerability Management
Social Engineering
Security Program Development: Read Chapter 12 and pages 373-381
08.02.03.053
Enough is not enough - Test Strategy for Mobile
OS Fingerprinting For Fun and Profit Christopher Soghoian JHU Information Security Institute December 8 2003.
Web Application Firewalls Detection, Bypassing And Exploitation
Practical exploitation and social engineering
Ponemon report : 'Critical Infrastructure: Security Preparedness and Maturity -
La sicurezza delle Web Application - SMAU Business Bari 2013
High Performance Greases