1©2013 Check Point Software Technologies Ltd. [Protected] Non-confidential content Top 10 Security Best Practices for Small Business Small business need.
Recon This presentation is an amalgam of presentations by Mark Michael, Randy Marchany and Ed Skoudis. I have edited and added material. Dr. Stephen C.
Leaked Network Security Information Analysis
End User Security Awareness Presentation
Sharon Conheady - Social engineering & social networks (4 novmber Jaarbeurs Utrecht)
Seminar Hacking & Security Analysis
Dang et al. (2013), "Contextual difference and intention to perform information security behaviours: a Protection Motivation Theory approach", ACIS 2013
More fun using Kautilya
Mere Paas Teensy Hai (Nikhil Mittal)
The latest threats on digital security -
The cree.py side of geolocation
Security testing for web developers