[Owasp-appsensor-project] CrossTalk article?
colin.watson at owasp.org
Tue Mar 22 12:47:09 EDT 2011
(resend to list due to file attachment problem)
I have written up a draft document. It needs a lot more editing to
get the ideas across and to make it flow, but rather than sit on it, I
thought I would share it now. If anyone wants to edit it, with track
changes on, please feel free to do so and send it back. Don't worry
about formatting. I can collate changes.
Author guidelines are here:
Table 3 is rather long, but the CrossTalk editors can decide on how
much space they want to provide.
John and Michael - I've extracted some bio details from elsewhere in
the expectation you might be co-authors.
Everyone else - please feel free to contribute, and let me know if you
want to be a co-author.
The file is here as a PDF:
I have an OO text file which the OWASP wiki won't upload, and is
marginally too large to send to this list - just ask if you want me to
On 16 February 2011 17:39, John Melton <jtmelton at gmail.com> wrote:
> +1 I'll help wherever I can.
> On Wed, Feb 16, 2011 at 11:49 AM, Michael Coates <michael.coates at owasp.org>
>> I'd be happy to help as needed. However if someone else wants to get more
>> involved with appsensor please also join in.
>> On Feb 16, 2011 7:53 AM, "Colin Watson" <colin.watson at owasp.org> wrote:
>> > Hi
>> > I hesitate to suggest something else to do, but I had an email from
>> > the US DHS Software Assurance (SwA) Community about CrossTalk, the
>> > Journal of Defense Software Engineering. They have an upcoming issue
>> > which I thought might be worth writing an AppSensor article for:
>> > -------------------------
>> > The September/October 2011 theme is "Protecting Against Predatory
>> > Practices"
>> > Articles due 08 April 2011
>> > Wireless network sniffing and probing, denial of service, forged
>> > de-authentications, and phishing are some of the more well-known
>> > predatory practices the DoD has come to expect—but new, larger, and
>> > more orchestrated attacks such as ”ghost networks” have recently come
>> > to the attention of anti-cyberterrorist experts. CrossTalk is
>> > exploring the most recent dangers our community faces and
>> > methodologies used to protect information against cyber espionage.
>> > Articles will explore the latest threats, security measures, software
>> > security automation, and even social networking dangers.
>> > Crosstalk magazine: http://www.crosstalkonline.org/
>> > Issue themes: http://www.crosstalkonline.org/theme-calendar/
>> > Author guidelines: http://www.crosstalkonline.org/submission-guidelines/
>> > -------------------------
>> > I'm happy to do some of the effort, but can anyone else help and act
>> > as senior/co-authors in the next month?
>> > Colin
>> > _______________________________________________
>> > Owasp-appsensor-project mailing list
>> > Owasp-appsensor-project at lists.owasp.org
>> > https://lists.owasp.org/mailman/listinfo/owasp-appsensor-project
>> Owasp-appsensor-project mailing list
>> Owasp-appsensor-project at lists.owasp.org
More information about the Owasp-appsensor-project