From RMF Network Security
- One Page Checklist for Securing and Cleaning a Malware Infected Windows PC
- Some Thoughts on Computer Defense for Small Business
- The Current State of Network Security
- Testing Svchost
- Looking at Processes, Modules, and Threads with Powershell 2.0 Part I
- Implementing the Security Process
Third Party
2009 Data Breach Investigations Report
A study conducted by the Verizon Business RISK team
An Analysis of Conficker's Logic and Rendezvous Points
Phillip Porras, Hassen Saidi, and Vinod Yegneswaran
Sony, Rootkits and Digital Rights Management Gone Too Far
Mark Russinovich
THE PRICE OF RESTRICTING VULNERABILITY PUBLICATIONS Jennifer Stisa Granick
Qubes OS Architecture
Joanna Rutkowska Rafal Wojtczuk