Security Update (February 2004)
The Failure of Cyber Forces You’re doing it wrong soldier
Firewalls (Distributed computing)
Security Dangers of Social Networking
Return Oriented Programming (ROP) Based Exploits - Part I
Writing for a Web 2.0 World
Platform-independent static binary code analysis using a meta-assembly language
SyScan Singapore 2011 - Stefan Esser - Targeting the iOS Kernel
Fuzzing Techniques for Software Vulnerability Discovery
Tools Catalog
Virtual machine security
GCC eGov Cyberwar, Cybercrime Risks and Defences 2010