Good stuff in here for the security professional. 

This issue:

  • Structured traffic analysis
  • Access Control Lists in Tiger and Tiger Server – true permission management
  • Automating I.T. security audits
  • Biometric security
  • PDA attacks, part 2: airborne viruses – evolution of the latest threats
  • Build a custom firewall computer
  • Lock down your kernel with grsecurity
  • Interview with Sergey Ryzhikov, director of Bitrix
  • Best practices for database encryption solutions

Link here via ToaSecurity

 

Alex Eckelberry