Call for papers

SecurityFocus ( ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to:

Infocus: Foundations (Page 10 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Secure Online Behavior, Part 3: Using the World WideWeb

By: Dr. Sunil Hazari 2001-07-02

Secure Online Behavior, Part 2: E-Mail

By: Dr. Sunil Hazari 2001-06-20

Secure Online Behavior, Part 1: Introduction

By: Sunil Hazari 2001-05-28

Internet Security and Your Business - Knowing the Risks
By: Joe Jenkins 2000-11-06

Introduction to Security Policies, Part One: An Overview of Policies
This is the first in a series of four articles devoted to discussing about how information security policies can be used as an active part of an organization's efforts to protect its valuable information assets. In a world that is essentially technology driven; where the latest IIS exploit is countered with a mad rush to install the relevant patch and where the number of different operating systems in a network exceeds the number of hairs on the security administrator's head that haven't turn...
By: Charl van der Walt 2001-08-27

Password Crackers - Ensuring the Security of Your Password
By: A. Cliff 2001-02-19

Designing Secure Networks Based on the Software ProcessModel
By: Paul Innella 2001-04-09

An Introduction to Viruses and Malicious Code, Part Three: Recovery
By: Brad Griffin 2001-04-30

An Introduction to Viruses and Malicious Code, Part Two: Protection
By: Brad Griffin 2000-12-27

An Introduction to Viruses and Malicious Code, Part One: Overview
By: Brad Griffin 2000-11-06

Foundations (Page 10 of 11)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


Privacy Statement
Copyright 2010, SecurityFocus