O'Reilly logo

The InfoSec Handbook by Umesha Nayak, Umesh Hodeghatta Rao

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Bibliography

Chapter 1

Footnotes

  1. MIMOSO, MICHAEL & THREATPOST, THE KASPERSKY LAB SECURITY NEWS SERVICE. (2013). BREACH Compression Attack Steals HTTPS Secrets in Under 30 Seconds. [Online] 5th August 2013. Available from: http://threatpost.com/breach-compression-attack-steals-https-secrets-in-under-30-seconds/101579.
  2. FISHER, DENNIS & THREATPOST, THE KASPERSKY LAB SECURITY NEWS. (2013). Most Surprising NSA Capability: Defeating the Collective Security Prowess of Silicon Valley. [Online] 30th December 2013. Available from: http://threatpost.com/the-year-in-nsa/103329.
  3. SYMANTEC CORPORATION. (2014). 2013 Norton Report. [Online] Available from: http://www.symantec.com/about/news/resources/press_kits/detail.jsp?pkid=norton-report-2013
  4. INTERNATIONAL ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required