Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Virus (Page 6 of 7)   < Prev  1 2 3 4 5 6 7  Next >
Dealing with Viruses - Taking another look at the approaches used
By: Robert Vibert 2000-06-17
http://www.securityfocus.com/infocus/1280

The Gentlemen's Review of Computer Viruses in the Media
By: George C. Smith 2000-09-04
http://www.securityfocus.com/infocus/1279

Understanding Macro Viruses
By: Denis Zenkin 2000-08-21
http://www.securityfocus.com/infocus/1278

Infectable Objects Part Five - HTML and Other Scripts
By: Robert Vibert 2001-04-18
http://www.securityfocus.com/infocus/1276

Infectable Objects Part Four- Viruses in Archive Files and Compressed Files

By: Robert Vibert 2001-01-10
http://www.securityfocus.com/infocus/1275

Infectable Objects Part Three - Win Apps

By: Robert Vibert 2000-10-27
http://www.securityfocus.com/infocus/1274

Infectable Objects Part Two - Windows Infectable

By: Robert Vibert 2000-10-23
http://www.securityfocus.com/infocus/1273

Infectable Objects Part One - DOS

By: Robert Vibert 2000-09-29
http://www.securityfocus.com/infocus/1272

Protecting Your Organization From Electronic MessageViruses
By: Robert Grupe 2001-06-04
http://www.securityfocus.com/infocus/1271

The Negatives of (False) Positives
By: Jennifer Lapell 2000-06-17
http://www.securityfocus.com/infocus/1270

Virus (Page 6 of 7)   < Prev  1 2 3 4 5 6 7  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus