You can't secure what you don't acknowledge.SM

Friday, June 26, 2009

My latest security content

Here's my latest information security content you may be interested in:

Testing rich Internet applications for security holes

The pros and cons of host-based vs. appliance-based tape encryption

As always, be sure to check out for all of my information security articles, podcasts, webcasts, screencasts and more.

No comments:

Post a Comment