[pdf](IN)secure mag 20

* Improving network discovery mechanisms
* Building a bootable BackTrack 4 thumb drive with persistent changes and Nessus
* Q&A: Vincenzo Iozzo on Mac OS X security
* Phased deployment of Network Access Control
* Web 2.0 case studies: challenges, approaches and vulnerabilities
* ISP level malware filtering
* Q&A: Scott Henderson on the Chinese underground

Origine de l’article :