Skip to content
Latest

Issue 19, March 2014

Topic: Review Ten Years of Mobile Malware, NTP Reflection & Amplification attack, Greylisting as a First Line of Defence Against Spam, Enabling Diffie-Hellman Key Exchange in Web Servers, Securing your Network Camera

Download Version: PDF

Online Version: Link

Issue 18, September 2013

Topic: D3 for Security Dashboard and Attack Visualization, Trends of IT Business Continuity Planning in Hong Kong, Security and Cloud Computing in the wake of Snowden Leak, CentOS 6 Linux Container Guide, Data Driven Application Risk Assessment, Cyber Security Initiative in Pakistan, Book Review: Security in a Web 2.0+ World

Download Version: PDF

Online Version: Link

Issue 17, March 2013

Topic: A Glance of Data Protection and Privacy, Internet Governance and Freedom, Book Review : “IT Security Metrics”, Practical Guide to SELinux, The 3Ws of NFC

Download Version: PDF

Online Version: Link

Issue 16, September 2012

Topic: BYOD Dilemma and Tactics, Securing Amazon Linux AMI, Book Review : “IT Security Metrics”, Targeted Attack Analysis, 「域」見未來 (Future of global top level domain)

Download Version: PDF

Online Version: Link

Issue 15, March 2012

Topic: HTML5 and the Implication to Web Security, Decade of Hong Kong WiFi Security Survey, Application Design Defense against DoS Attack, Why some Malicious Mobile Apps go on Shelves?, Challenges in Information Security Management , If a Tree Falls in the Forest…, Book Review: “What I Wish I Knew When I Was 20”

Download Version: PDF

Online Version: Link