Software security (vulnerabilities) and physical security
Security Dangers of Social Networking
Phi 235 social media security users guide presentation
APPLICATION VULNERABILITY ASSESSMENTS REVISITED COMPUTING AND COMMUNICATIONS Jared Perry GSEC, GWAPT, GCWN Application testing at Memorial University.
Experiences Using Minos as a Tool for Capturing and Analyzing Novel Worms for Unknown Vulnerabilities Jedidiah R. Crandall†, S. Felix Wu†, and Frederic.
Shield & Friends Troubleshooting Networks Helen J. Wang Researcher System and Networking Research Group Microsoft Research Helen J. Wang Researcher System.
Network security Worms Botnets Wireless networks.
Mike Hsiao 20070928 Shield: Vulnerability-Driven Network Filters for Preventing Known Vulnerability Exploits Helen J. Wang, Chuanxiong Guo, Daniel R. Simon,
Jedidiah R. Crandall † , S. Felix Wu † , and Frederic T. Chong ‡ †University of California, Davis