[Owasp-appsensor-project] CrossTalk article?
michael.coates at owasp.org
Tue Mar 22 13:47:23 EDT 2011
Reading now and working on some comments.
On Mar 22, 2011, at 9:47 AM, Colin Watson wrote:
> (resend to list due to file attachment problem)
> I have written up a draft document. It needs a lot more editing to
> get the ideas across and to make it flow, but rather than sit on it, I
> thought I would share it now. If anyone wants to edit it, with track
> changes on, please feel free to do so and send it back. Don't worry
> about formatting. I can collate changes.
> Author guidelines are here:
> Table 3 is rather long, but the CrossTalk editors can decide on how
> much space they want to provide.
> John and Michael - I've extracted some bio details from elsewhere in
> the expectation you might be co-authors.
> Everyone else - please feel free to contribute, and let me know if you
> want to be a co-author.
> The file is here as a PDF:
> I have an OO text file which the OWASP wiki won't upload, and is
> marginally too large to send to this list - just ask if you want me to
> send directly.
> On 16 February 2011 17:39, John Melton <jtmelton at gmail.com> wrote:
>> +1 I'll help wherever I can.
>> On Wed, Feb 16, 2011 at 11:49 AM, Michael Coates <michael.coates at owasp.org>
>>> I'd be happy to help as needed. However if someone else wants to get more
>>> involved with appsensor please also join in.
>>> On Feb 16, 2011 7:53 AM, "Colin Watson" <colin.watson at owasp.org> wrote:
>>>> I hesitate to suggest something else to do, but I had an email from
>>>> the US DHS Software Assurance (SwA) Community about CrossTalk, the
>>>> Journal of Defense Software Engineering. They have an upcoming issue
>>>> which I thought might be worth writing an AppSensor article for:
>>>> The September/October 2011 theme is "Protecting Against Predatory
>>>> Articles due 08 April 2011
>>>> Wireless network sniffing and probing, denial of service, forged
>>>> de-authentications, and phishing are some of the more well-known
>>>> predatory practices the DoD has come to expect—but new, larger, and
>>>> more orchestrated attacks such as ”ghost networks” have recently come
>>>> to the attention of anti-cyberterrorist experts. CrossTalk is
>>>> exploring the most recent dangers our community faces and
>>>> methodologies used to protect information against cyber espionage.
>>>> Articles will explore the latest threats, security measures, software
>>>> security automation, and even social networking dangers.
>>>> Crosstalk magazine: http://www.crosstalkonline.org/
>>>> Issue themes: http://www.crosstalkonline.org/theme-calendar/
>>>> Author guidelines: http://www.crosstalkonline.org/submission-guidelines/
>>>> I'm happy to do some of the effort, but can anyone else help and act
>>>> as senior/co-authors in the next month?
>>>> Owasp-appsensor-project mailing list
>>>> Owasp-appsensor-project at lists.owasp.org
>>> Owasp-appsensor-project mailing list
>>> Owasp-appsensor-project at lists.owasp.org
> Owasp-appsensor-project mailing list
> Owasp-appsensor-project at lists.owasp.org
More information about the Owasp-appsensor-project