Create an Account
username: password:
 
  MemeStreams Logo

Latest Issue of IEEE Security & Privacy

search

noteworthy
Picture of noteworthy
My Blog
My Profile
My Audience
My Sources
Send Me a Message

sponsored links

noteworthy's topics
Arts
  Literature
   Fiction
   Non-Fiction
  Movies
   Documentary
   Drama
   Film Noir
   Sci-Fi/Fantasy Films
   War
  Music
  TV
   TV Documentary
Business
  Tech Industry
  Telecom Industry
  Management
Games
Health and Wellness
Home and Garden
Miscellaneous
  Humor
  MemeStreams
   Using MemeStreams
Current Events
  War on Terrorism
  Elections
  Israeli/Palestinian
Recreation
  Cars and Trucks
  Travel
   Asian Travel
Local Information
  Food
  SF Bay Area Events
Science
  History
  Math
  Nano Tech
  Physics
  Space
Society
  Economics
  Education
  Futurism
  International Relations
  History
  Politics and Law
   Civil Liberties
    Surveillance
   Intellectual Property
  Media
   Blogging
  Military
  Philosophy
Sports
Technology
  Biotechnology
  Computers
   Computer Security
    Cryptography
   Human Computer Interaction
   Knowledge Management
  Military Technology
  High Tech Developments

support us

Get MemeStreams Stuff!


 
Latest Issue of IEEE Security & Privacy
Topic: Computer Security 9:36 am EDT, Aug  2, 2007

Subscription required for access to full text of most articles, but I wanted to point out a couple of articles that you might find it worthwhile to track down:

What Hackers Learn that the Rest of Us Don't: Notes on Hacker Curriculum

The hacker culture has accumulated a wealth of efficient practices and approaches to computer technologies -- in particular, to analysis, reverse engineering, testing, and software and hardware modification -- that differ considerably from those of both the IT industry and traditional academia.

The above article references the article by Greg Conti that appears in the same issue as Academic freedom and the hacker ethic. It also references a book by Jonathan Rosenberg, How Debuggers Work.

The End of Black and White, by Dan Geer

It's no longer just black hats or white hats in computer security. The more someone has to lose, the less likely they should be to trust the computer. It means that all people, all programs, all transactions are shades of grey. Black and white are just a memory.

This one appears to be freely available:

Estimating Software Vulnerabilities

Any given piece of software has some number of publicly disclosed vulnerabilities at any moment, leaving the system exposed to potential attack. A method for identifying and analyzing these vulnerabilities uses public data from easily accessible sources.

Latest Issue of IEEE Security & Privacy



 
 
Powered By Industrial Memetics
RSS2.0