The Community for Technology Leaders
Green Image
TABLE OF CONTENTS
Issue No. 04 - July/August (vol. 4)
ISSN: 1540-7993
From the Editors
News

News Briefs (HTML)

Heather Drinan , I3P at Dartmouth College
Brent Kesler , I3P at Dartmouth College
pp. 6-8
Book Reviews

Why We Won't Review Books by Hackers (HTML)

Charles P. Pfleeger , Pfleeger Consulting Group
pp. 9
Interview
Web Security

Web Application Security Engineering (Abstract)

J.D. Meier , Microsoft
pp. 16-24

Web Application Security Assessment Tools (Abstract)

Mark Curphey , Foundstone
Rudolph Araujo , Foundstone
pp. 32-41

Security Policies and the Software Developer (Abstract)

Denis Verdon , Fidelity National Title Group
pp. 42-49
Education

Kafka in the Academy: A Note on Ethics in IA Education (Abstract)

Richard R. Brooks , Clemson University
Christopher Vutsinas , Clemson University
pp. 50-53
On the Horizon

Intrusion-Tolerant Middleware: The Road to Automatic Security (Abstract)

Yves Deswarte , Laboratory for Analysis and Architecture of Systems, CNRS
Christian Cachin , IBM Zurich Research
David Powell , Laboratory for Analysis and Architecture of Systems, CNRS
Robert Stroud , University of Newcastle upon Tyne
Paulo E. Ver?ssimo , University of Lisbon, Portugal
Ian Welch , University of Newcastle upon Tyne
Nuno F. Neves , University of Lisbon, Portugal
Jonathan Poritz , IBM Zurich Research
pp. 54-62
Privacy Interests

Lessons for Laptops for the 18th Century (Abstract)

E. Michael Power , Gowling LaFleur Henderson LLP
Roland L. Trope , Trope and Schramm LLP
pp. 64-68
Crypto Corner

RFID Malware: Truth vs. Myth (Abstract)

Melanie R. Rieback , Vrije Universiteit Amsterdam
Bruno Crispo , Vrije Universiteit Amsterdam
Andrew S. Tanenbaum , Vrije Universiteit Amsterdam
pp. 70-72
Basic Training
Attack Trends

Voices, I Hear Voices (Abstract)

Iv? Arce , Core Security Technologies
pp. 80-83
Secure Systems
Building Security In
Emerging Standards
Clear Text
88 ms
(Ver 3.3 (11022016))