-
1
-
-
36248965112
-
Web 2.0 Creates Security Challenges
-
Oct
-
George Lawton, "Web 2.0 Creates Security Challenges", IEEE Computer, Oct. 2007. p. 17-20.
-
(2007)
IEEE Computer
, pp. 17-20
-
-
Lawton, G.1
-
2
-
-
57949085753
-
-
Blogging and the Wisdom of Crowds, In: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html?page=3.
-
Blogging and the Wisdom of Crowds, In: http://www.oreillynet.com/pub/a/ oreilly/tim/news/2005/09/30/what-is-web-20.html?page=3.
-
-
-
-
4
-
-
51849113693
-
-
Hsinchun Chen, Sven Thoms, T. J. Fu, Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups, IEEE International Conference on Intelligence and Security Informatics, 2008.
-
Hsinchun Chen, Sven Thoms, T. J. Fu, "Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Group"s, IEEE International Conference on Intelligence and Security Informatics, 2008.
-
-
-
-
5
-
-
51849146839
-
-
R. Jones, "Jihadinets," http://counterterrorismblog.org/2007/ 12/jihadinets.php
-
Jihadinets
-
-
Jones, R.1
-
6
-
-
57949097658
-
-
Second Life, Virtual Worlds + Botnets = Terrorist Training, http://www.boxxet.com/Second_Life/Virtual_Worlds_Botnets_Terrorist_Training. 1f6ycp.d
-
Second Life, "Virtual Worlds + Botnets = Terrorist Training," http://www.boxxet.com/Second_Life/Virtual_Worlds_Botnets_Terrorist_Training. 1f6ycp.d
-
-
-
-
7
-
-
57949090405
-
-
Websense Security Labs. Research highlights Q3-Q4, 2007.
-
Websense Security Labs. Research highlights Q3-Q4, 2007.
-
-
-
-
8
-
-
57949096945
-
-
http://www.fortify.com/advisory.jsp
-
-
-
-
9
-
-
47749117614
-
SOA and Web Services: New Technologies, New Standards - New Attacks
-
Halle Saale, Germany, November
-
Jensen, M., Gruschka, N., Herkenhöner, R., Luttenberger, N., "SOA and Web Services: New Technologies, New Standards - New Attacks", In: The 5th IEEE European Conference on Web Services (ECOWS 2007), Halle (Saale), Germany, November 2007, pp.26-28.
-
(2007)
The 5th IEEE European Conference on Web Services (ECOWS
, pp. 26-28
-
-
Jensen, M.1
Gruschka, N.2
Herkenhöner, R.3
Luttenberger, N.4
-
10
-
-
57949090786
-
Web Application Firewalls: Application Protection and Much More
-
Gerald Arcuri.," Web Application Firewalls: Application Protection and Much More", Business Market Strategies, Volume 1, Number 13
-
Business Market Strategies
, vol.1
, Issue.13
-
-
Arcuri, G.1
-
12
-
-
36248965112
-
-
Web 2.0 Creates Security Challenges, Lawton, G. IEEE Computer, 40, Issue 10, Oct. 2007. 13-16.
-
Web 2.0 Creates Security Challenges, Lawton, G. IEEE Computer, Vol. 40, Issue 10, Oct. 2007. 13-16.
-
-
-
-
13
-
-
51849113693
-
-
Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups Hsinchun Chen, Sven Thoms, T. J. Fu, In: IEEE International Conference on Intelligence and Security Informatics, 2008.
-
Cyber Extremism in Web 2.0: An Exploratory Study of International Jihadist Groups Hsinchun Chen, Sven Thoms, T. J. Fu, In: IEEE International Conference on Intelligence and Security Informatics, 2008.
-
-
-
-
15
-
-
37249087196
-
Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks
-
November/December
-
Markus Jakobsson, Sid Stamm, Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks, IEEE Security & Privacy, November/December 2007. Vol. 5, No. 6. pp. 16-24.
-
(2007)
IEEE Security & Privacy
, vol.5
, Issue.6
, pp. 16-24
-
-
Jakobsson, M.1
Stamm, S.2
|