×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents of rochester-security-summit
Losing Control to the Cloud
1.061 views
State of the EULA -- "Who pays for Secure Code?"
1.056 views
IPv6 Can No Longer Be Ignored
3.066 views
WHOIS the Master - An Introduction to ShoNuff
1.858 views
A Plan to Control and Protect Data in the Private and Public Cloud
1.425 views
Emerging Threats
705 views
Maximizing ROI through Security Training (for Developers)
572 views
Firewall Defense against Covert Channels
2.170 views
It's All About the Data!
673 views
Business Impact and Risk Assessments in Business Continuity and Disaster Recovery
1.434 views
Finding Patterns in Data Breaches
668 views
Real Business Threats!
932 views
Dissecting the Hack: Malware Analysis 101
772 views
A Security Testing Methodology that Fits Every IT Budget
1.572 views
Application Threat Modeling
1.390 views
Baking It In – Towards Abuse-Resistant Web Applications
798 views
You Know You Need PCI Compliance Help When…
1.145 views
GRC– The Way Forward
1.018 views