[24980] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Techniques for Vulneability discovery

daemon@ATHENA.MIT.EDU (Ivan Arce)
Fri Apr 5 17:50:52 2002

Message-ID: <04cd01c1dced$66b0d7b0$8323a8c0@ffenomeno>
From: "Ivan Arce" <ivan.arce@corest.com>
To: <core.lists.bugtraq@corest.com>
Date: Fri, 5 Apr 2002 19:01:04 -0300
MIME-Version: 1.0
Content-Type: text/plain;
        charset="iso-8859-1"
Content-Transfer-Encoding: 7bit


Hi,

I just got an article on that very topic published in April's IEEE Computer
Magazine (they published a supplement on Security and Privacy as the first
output of the newly created IEEE Security and Privacy Task Force)


The online version is at:

http://www.corest.com/publications/IEEE.htm

or

http://www.computer.org/computer/sp/articles/arc/index.htm


I will  welcome your comments,
thanks

-ivan

--
Ivan Arce
CTO
CORE SECURITY TECHNOLOGIES

44 Wall Street - New York, NY 10005
Ph: (212) 461-2345
Fax: (212) 461-2346
http://www.corest.com

PGP Fingerprint: C7A8 ED85 8D7B 9ADC 6836  B25D 207B E78E 2AD1 F65A


home help back first fref pref prev next nref lref last post