Skip to content

CategoryPISA Journal

Issue 29, March 2019

Topic: Hardware Devices for Cryptographic Security, Secure your assets from Blockchain Galaxy to Fintech Universe, International Standard on Cyber-Insurance, How to Build a CSOC for SME

Download Version: PDF

Online Version: Link

Issue 22, September 2015

Topic: Transaction Security of Mobile Apps in Hong Kong, Secure Your Home Automation IoT, No Friend or No Privacy, Best Practice Guide (SSL Implementation) for Mobile App Development

Download Version: PDF

Online Version: Link

Issue 21, March 2015

Topic: Passive DNS – Open Source Intelligence for Tracing Malware Securing Email Transmission with Transport Layer Security, The Next Generation of HTTP Securing, Your Email System with DKIM, Hardening Joomla Content Management System

Download Version: PDF

Online Version: Link

Issue 20, September 2014

Topic: Building a Home Honeypot using Raspberry Pi, Securing your Internet of Things at Home, 閏秒危機, A Risk-based Approach to DDoS Attack Mitigation, Lesson from the iCloud Incident

Download Version: PDF

Online Version: Link

Issue 19, March 2014

Topic: Review Ten Years of Mobile Malware, NTP Reflection & Amplification attack, Greylisting as a First Line of Defence Against Spam, Enabling Diffie-Hellman Key Exchange in Web Servers, Securing your Network Camera

Download Version: PDF

Online Version: Link

Issue 18, September 2013

Topic: D3 for Security Dashboard and Attack Visualization, Trends of IT Business Continuity Planning in Hong Kong, Security and Cloud Computing in the wake of Snowden Leak, CentOS 6 Linux Container Guide, Data Driven Application Risk Assessment, Cyber Security Initiative in Pakistan, Book Review: Security in a Web 2.0+ World

Download Version: PDF

Online Version: Link

Issue 17, March 2013

Topic: A Glance of Data Protection and Privacy, Internet Governance and Freedom, Book Review : “IT Security Metrics”, Practical Guide to SELinux, The 3Ws of NFC

Download Version: PDF

Online Version: Link

Issue 16, September 2012

Topic: BYOD Dilemma and Tactics, Securing Amazon Linux AMI, Book Review : “IT Security Metrics”, Targeted Attack Analysis, 「域」見未來 (Future of global top level domain)

Download Version: PDF

Online Version: Link

Issue 15, March 2012

Topic: HTML5 and the Implication to Web Security, Decade of Hong Kong WiFi Security Survey, Application Design Defense against DoS Attack, Why some Malicious Mobile Apps go on Shelves?, Challenges in Information Security Management , If a Tree Falls in the Forest…, Book Review: “What I Wish I Knew When I Was 20”

Download Version: PDF

Online Version: Link