Cyber Security Expo
About Us

ISW News & Events

Text Library

Submit Your Paper
Recommended Reading
Contact Us

Subscribe to our monthly newsletter and receive updates on:
Security/Hack Challenges
ISW's Monthly Contest Prizes & Winners
Recommended Security Books & Reviews
Recently Published Papers
Click here to subscribe/unsubscribe!

Opt-in Terms | Archives
What is the top security concern you have today?
Virtual System Attacks
Social Network

Best Security Papers of the Month Contest:

Contest FAQs

Prizes Catalog

Markus Jakobsson & Zulfikar Ramzan

Read the review here!


Available Prizes

Submissions | Contest FAQs | Prizes Catalog | Past Winners

Privacy: What Developers and IT Professionals Should Know
J. C. Cannon
Security Warrior
Anton Chuvakin

Malicious Cryptography: Exposing Cryptovirology
Adam L. Young, Moti Yung
Malware: Fighting Malicious Code
Ed Skoudis, Lenny Zeltser

Astalavista Security Toolbox DVD v1.0
Information Trickery: The Great IT Upgrade Scam
Brian Hitchen, Mike Lee

Network Security Training Course: A Desktop Seminar from Ed Skoudis
Edward Skoudis
Counter Hack: A Step-by-Step Guide to Computer Attacks...
Edward Skoudis
Black Ice: The Invisible Threat of Cyber-Terrorism
Dan Verton, Jane Brownlow (Editor)
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User
Gilbert Held
HackNotes Windows Security Portable Reference
Michael O'Dea, Chris Weber


Infosec Writers and their respective affiliates, sponsors and promoters are not in any way responsible or liable for damages and loss in shipping and handling, or use of any prize awarded to a winner.

All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , All rights reserved. Comments are property of the respective posters.