Call for papers

SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: editor@securityfocus.com

Infocus: Microsoft (Page 7 of 8)   < Prev  2 3 4 5 6 7 8  Next >
The Crux of NT Security - Phase 2

By: Hal Flynn 2000-10-30
http://www.securityfocus.com/infocus/1324

The Crux of NT Security - Phase 1

By: Hal Flynn 2000-10-11
http://www.securityfocus.com/infocus/1323

DoD-Certified Trusted Systems And You - Part Two
By: Ben Malisow 2000-03-22
http://www.securityfocus.com/infocus/1322

DoD-Certified Trusted Systems And You - Part One

By: Ben Malisow 2000-02-08
http://www.securityfocus.com/infocus/1321

Windows 2000 - Living in the new (Security) Millennium
By: Hal Flynn 2000-01-25
http://www.securityfocus.com/infocus/1320

FOCUS on Microsoft: Securing NT - Choosing Strong Passwords
By: Eric Schultz 2000-12-28
http://www.securityfocus.com/infocus/1319

Ten Steps to a Cleaner Web Root

By: Mark Burnett 2000-06-12
http://www.securityfocus.com/infocus/1318

Showcode.asp - A lesson in Internet Security
By: Mark Burnett 2000-05-15
http://www.securityfocus.com/infocus/1317

Running Snort Part 2
By: Mark Burnett 2001-03-07
http://www.securityfocus.com/infocus/1316

Running Snort Part 1

By: Mark Burnett 2000-01-17
http://www.securityfocus.com/infocus/1315

Microsoft (Page 7 of 8)   < Prev  2 3 4 5 6 7 8  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus