Journal: Inf. Sec. Techn. Report

Volume 8, Issue 4

5 -- 0Chez Ciechanowicz. Introduction
6 -- 13Glenn Gunara-Chen. The art of intrusion testing
14 -- 25Andrew Blyth. An XML-based architecture to perform data integration and data unification in vulnerability assessments
26 -- 33Gerhard Eschelbeck, Michael Krieger. Eliminating noise from intrusion detection systems
34 -- 44Andy Gray. An historical perspective of software vulnerability management
45 -- 55Evangelos Morakis, Stilianos Vidalis, Andrew Blyth. Measuring vulnerabilities and their exploitation cycle
56 -- 64Neil Barrett. Penetration testing and social engineering: Hacking the weakest link
65 -- 77Paul Midian. How to ensure an effective penetration test
78 -- 84Stein Mollerhaug. Useful vulnerability assessment