Syrinx Technologies Library
Syrinx Technologies
- In Search of Low-Hanging
Fruit: Improving Security and Privacy with Penetration Testing
- Don't Be a Box Checker
- Choosing a Penetration Test Partner
- Reducing the Cost of Compliance
- Why Simple Can Be Secure
- Embracing A Security Audit
- 10-8-2008 ISSA Meeting Presentation
- 10-29-2008 Cisco VATS PCI Presentation (3MB)
- Web/Database Server Security Best Practices
- Infrastructure Auditing
- Securing Remote Access to IT Resources
Other Authors
- How to Get the Job Done, by Sandro Gauci, EnableSecurity
- History of Hacking, by Dave Shackelford, CIS
- Lateral SQL Injection in Oracle, by David Litchfield, NGSSoftware
- Cracking SQL Passwords, by David Litchfield, NGSSoftware
- VoIP Security Threats, by Peter Thermos, Palindrome Technologies
- Data Leakage Study by Cisco Systems
TOP
- PCI Compliance Cheat Sheet
- PCI Page
TOP
Syrinx Technologies
- Code of Ethics
- Travel & Expense Policies
- Founding Principles
- Penetration Testing Methodology
- Service Offerings
- Defensive IT Security 101 Brochure
- Defensive IT Security 101 Class Schedule
- Laptop Audit
- Virtual CSO
- Innsbrook Today Magazine January 2008 Ad
- Innsbrook Today Magazine May 2008 Ad
- Innsbrook Today Magazine September 2008 Ad
- 2009 RMA Ad
- Privacy Policy
TOP
- Information
TOP
- OWASP 3.0 Web App Testing Guide
- Mitre Top 25 Most Dangerous Programming Errors
TOP
- Virtualization Security, by Daniel Ingevaldson (10MB ZIP)
- Virtualization FAQ
- "Virtualisation users should expect more attacks", by Tom Jowitt
TOP