Ya podemos descargar el magazine número 7 de HITB, cuyos contenidos son los siguientes:
Cover Story![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHBU1RLqTT9AlWFQQPZABKQAEM1uMmR4n8d4EOzD-ORIbF9MJx9iHgDeqoTkUCOt8ZiL4wMf1lls5uISEdyzsQCg20G9O-cFVJD-VB9Rhw3EbfmCGTu5L1s_XSsAE7-LGv4xIsPwzRBvQ3/s320/HITB7.jpg)
- What Would We Do Without Enemies
Database Security
- Extending SQL Injection Attacks Using Buffer Overflows – Tactical Exploitation
Windows Security
- Windows Security Hardening Through Kernel Address Protection
Professional Development
- CISSP® Corner
Books
- Application Security Beyond Fuzzing: Exploit Automation with PMCMA
Network Security
- Intrusion as a Service Using SHODAN
- Studies on Distributed Security Event Analysis in Cloud
Cover Story
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHBU1RLqTT9AlWFQQPZABKQAEM1uMmR4n8d4EOzD-ORIbF9MJx9iHgDeqoTkUCOt8ZiL4wMf1lls5uISEdyzsQCg20G9O-cFVJD-VB9Rhw3EbfmCGTu5L1s_XSsAE7-LGv4xIsPwzRBvQ3/s320/HITB7.jpg)
- What Would We Do Without Enemies
Database Security
- Extending SQL Injection Attacks Using Buffer Overflows – Tactical Exploitation
Windows Security
- Windows Security Hardening Through Kernel Address Protection
Professional Development
- CISSP® Corner
Books
- Application Security Beyond Fuzzing: Exploit Automation with PMCMA
Network Security
- Intrusion as a Service Using SHODAN
- Studies on Distributed Security Event Analysis in Cloud
Comentarios
Publicar un comentario