
En el caso de que quieras descargar alguno de los números anteriores puedes hacerlo desde la sección «archivo«, allí encontraras la ilustración de la portada y el un índice de contenidos del número elegido.
A continuación, la lista de temas de Junio;
– Malicious PDF: Get owned without opening
– Review: IronKey Personal
– Windows 7 security features: Building on Vista
– Web 2.0 emerging threats
– Using Wireshark to capture and analyze wireless traffic
– Q&A: Paul Cooke on Windows 7
– RSA Conference 2009
– Your applications are trying to tell you something – are you listening?
– Q&A: Hord Tipton on certification and (ISC)2
– «Unclonable» RFID – a technical overview
– The application security maturity (ASM) model
– Secure development principles
– Enterprise risk and compliance reporting
– Q&A: Ron Gula on Nessus and Tenable Network Security
– Infosecurity Europe 2009
– Establish your social media presence with security in mind
– HTTPS is bad?
– A historical perspective on the cybersecurity dilemma
– Q&A: Brent Huston on security in general, CEO challenges and Microsolved
– Black Hat Europe 2009
– Germany: The current debate on the Internet filter
– A risk-based, cost effective approach to holistic security
Descarga de (IN)SECURE Magazine nº21.




