Top 5: Corporate Losses Due to Hacking http://www.hotforsecurity.com/blog/top-5-corporate-losses-due-to-hacking-1820.html
Top 5: Corporate Losses Due to Hacking http://www.hotforsecurity.com/blog/top-5-corporate-losses-due-to-hacking-1820.html
Cisco Study: IT Saying Yes To BYOD http://newsroom.cisco.com/press-release-content?articleId=854754&type=webcontent
A Security-Oriented Approach to IP Addressing http://www.cisco.com/web/about/security/intelligence/security-for-ip-addr.html
ExitProcess Shellcode http://blog.didierstevens.com/2012/05/14/exitprocess-shellcode/
The Art of Exploiting SQL Injection https://www.blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_exploiting-sql-injection.html
The Debian Administrator’s Handbook http://static.debian-handbook.info/browse/stable/
Building the Network You Need with OpenBSD’s PF http://home.nuug.no/~peter/pf/bsdcan2012/
truecrack – Password cracking for truecrypt(c) volume files. https://code.google.com/p/truecrack/
A look at object confusion vulnerability (CVE-2012-0779) in Adobe Flash http://scrammed.blogspot.it/2012/05/look-at-object-confusion-vulnerability.html
Manual Unpacking of UPX Packed Binary File http://securityxploded.com/unpackingupx.php