Real Time Application Defenses - The Reality of AppSensor & ESAPI
Virtual honeypot
Privacy-Preserving Attribution and Provenance UC San Diego & University of Washington Alex C. Snoeren & Yoshi Kohno, PIs Stefan Savage, Amin Vahdat, Geoff.
The Cross Site Scripting Guide
BAI Security - Brochure - Breach Risk Assessment
How to fight an APT attack: Identifying and Responding to a visit from China.
Privacy-Preserving Attribution and Provenance
sector