presenters |
topic |
abstract | presentation slides |
|
IPSec: Authentication Header and
Encapsulating Security Payload Protocols
|
IPsec.doc |
IpSec.ppt |
|
ARP Poisoning Attacks |
PresentationTopicARPattack.doc | ARPPoisoningAttacks.ppt |
|
Web
Services Security (WS-Security) |
Web Services Security.doc | Web Service Security.ppt |
|
IP Spoofing |
IP Spoofing.doc | IPSpoofing.ppt |
|
SSH - the "Secure" Shell |
SSH-CSCI5931.doc | SSH.ppt |
|
Database Encryption | Database Encryption.doc | Database vulnerability and encryption.ppt |
|
Vulnerabilities in SNMP
Implementations |
SNMP_abs.doc |
SNMP.ppt |
|
Security Risks of Instant Messaging in the Workplace | RisksInstantMessaging.doc |
ImtiazOralPresentation.ppt |
|
Buffer Overflow |
bufferOverflow.doc |
bufferoverflow.ppt |
|
Windows Authentication |
windowsAuthentication.doc |
presentation.ppt |
|
Session Hijacking |
Session
Hijacking.doc |
Session Hijacking.ppt |
|
Security Vulnerabilities in
Remote Procedure Calls (RPC) |
vulnerabilityRPC.doc |
RPC Vulnerabilities.ppt |
|
Vulnerabilities in peer to peer
communication |
p2p.doc |
presentation1.ppt |
|
Wireless security |
Wireless_Security.doc |
Wireless Security.ppt |
|
Session Fixation Vulnerability
in Web Applications |
SessionFixation.doc |
|
|
A Stateful Intrusion Detection
System for World-Wide Web Servers |
statefulIDS.doc |
5932-pres-slides.ppt |
|
Web Service Security |
WebServiceSecurity.doc
|
WS Security Roadmap.ppt |
|
Measures to prevent
man-in-the-middle attack and their effectiveness |
man-in-the-middle attacks.doc
|
MITM_attacks.ppt |
|
Introduction to Intrusion Detection | IDabstract.doc | Intro_ID.ppt |