Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Pen-Test (Page 4 of 4)   < Prev  1 2 3 4 
Exploiting Cisco Routers: Part 1
This is the first of a two-part series that will focus on identifying and then exploiting vulnerabilities and poor configurations in Cisco routers.
By: Mark Wolfgang 2003-09-29
http://www.securityfocus.com/infocus/1734

Demonstrating ROI for Penetration Testing (Part Three)
The third article in this series focuses on defining terms related to the Risk Analysis process and touches on Information Asset valuation methods that are critical when justifying the necessity and expense of a Pen Test.
By: Marcia Wilson 2003-09-11
http://www.securityfocus.com/infocus/1730

Penetration Testing for Web Applications (Part Three)
The third and final article in this series investigates session security issues and cookies, buffer overflows and logic flaws, and provides links to further resources for the web application penetration tester.
By: Jody Melbourne and David Jorm 2003-08-20
http://www.securityfocus.com/infocus/1722

Demonstrating ROI for Penetration Testing (Part Two)
The second article in this series will introduce Risk Management concepts as they relate to Information Asset valuation.
By: Marcia Wilson 2003-08-04
http://www.securityfocus.com/infocus/1718

Demonstrating ROI for Penetration Testing (Part One)
This is the first in a series of articles demonstrating ROI (return on investment) for a penetration test. You will have to step into the world of budgeting, cost justification, resource allocation, and learn a few unfamiliar terms.
By: Marcia Wilson 2003-07-24
http://www.securityfocus.com/infocus/1715

Penetration Testing for Web Applications (Part Two)
The second installment in this series expands upon issues of input validation - how developers routinely, through a lack of proper input sanity and validity checking, expose their back-end systems to server-side code-injection and SQL-injection attacks. It also explores the manner in which these issues may manifest the client-side as cross-site scripting and other content-manipulation vulnerabilities.
By: Jody Melbourne and David Jorm 2003-07-03
http://www.securityfocus.com/infocus/1709

Penetration Testing for Web Applications (Part One)
This is the first in a series of three articles on penetration testing for Web applications. The first installment provides the penetration tester with an overview of Web applications - how they work, how they interact with users, and most importantly how developers can expose data and systems with poorly written and secured Web application front-ends.
By: Jody Melbourne and David Jorm 2003-06-16
http://www.securityfocus.com/infocus/1704

Welcome to the SecurityFocus Pen-Test Focus Area
The new SecurityFocus Pen-Test focus area offers a unique forum for the exchange of pen-test information.
By: Ivan Arce 2003-06-02
http://www.securityfocus.com/infocus/1699

Pen-Test (Page 4 of 4)   < Prev  1 2 3 4 


 

Privacy Statement
Copyright 2010, SecurityFocus