Cyber Security Expo
Home
About Us

ISW News & Events

Text Library

Submit Your Paper
Contest
Recommended Reading
Contact Us
 

Subscribe to our monthly newsletter and receive updates on:
 
Security/Hack Challenges
ISW's Monthly Contest Prizes & Winners
Recommended Security Books & Reviews
Recently Published Papers
Click here to subscribe/unsubscribe!

Opt-in Terms | Archives
What is the top security concern you have today?
 
Virtual System Attacks
Cloud
Social Network
Web
Email
   

Best Security Papers of the Month Contest:

Contest FAQs

Prizes Catalog



Markus Jakobsson & Zulfikar Ramzan

Read the review here!
 

 

Available Prizes

Submissions | Contest FAQs | Prizes Catalog | Past Winners




Privacy: What Developers and IT Professionals Should Know
J. C. Cannon
Security Warrior
Anton Chuvakin


Malicious Cryptography: Exposing Cryptovirology
Adam L. Young, Moti Yung
Malware: Fighting Malicious Code
Ed Skoudis, Lenny Zeltser

Astalavista Security Toolbox DVD v1.0
Astalavista
Information Trickery: The Great IT Upgrade Scam
Brian Hitchen, Mike Lee


Network Security Training Course: A Desktop Seminar from Ed Skoudis
Edward Skoudis
Counter Hack: A Step-by-Step Guide to Computer Attacks...
Edward Skoudis
Black Ice: The Invisible Threat of Cyber-Terrorism
Dan Verton, Jane Brownlow (Editor)
Securing Wireless LANs: A Practical Guide for Network Managers, LAN Administrators and the Home Office User
Gilbert Held
   
HackNotes Windows Security Portable Reference
Michael O'Dea, Chris Weber

 

Infosec Writers and their respective affiliates, sponsors and promoters are not in any way responsible or liable for damages and loss in shipping and handling, or use of any prize awarded to a winner.


All images, content & text (unless other ownership applies) are © copyrighted 2000 -  , Infosecwriters.com. All rights reserved. Comments are property of the respective posters.