[Data breaches in 2009 | Quantifying IT estimation risks and quantifying requirements volatility effects | Privacy by design | Web application security trends, Q1-Q2, 2009]
A report by Cenzic.
Cenzic: Web applications security trends report, Q1-Q2, 2009 (PDF)
[Open link in this window | Open link in new window]
Cenzic: Cenzic wep application security trends report shows increase in hacker attacks on web sites exploiting faults in popular web browsers and software
[Open link in this window | Open link in new window]
Smashing magazine: Web security - are you part of the problem?
[Open link in this window | Open link in new window]
[10/01/31]
A website (including a book that can be downloaded) by the information and privacy commissioner of Ontario, Canada.
Privacy by design (website)
[Open link in this window | Open link in new window]
Privacy by design (book)
[Open link in this window | Open link in new window]
[10/01/25]
G.P.Kulk, R.J.Peters, C.Verhoef: Quantifying IT estimation risks (PDF)
[Open link in this window | Open link in new window]
G.P.Kulk, C.Verhoef: Quantifying requirements volatility effects (PDF)
[Open link in this window | Open link in new window]
[10/01/24]
A report by the Identity theft Resource Center.
ITRC: Data breaches - the insanity continues
[Open link in this window | Open link in new window]
[10/01/23]
On this page Transitional HTML 4.01 and CSS 1 are used. If you're seeing this text you either have CSS switched off in your browser, or you're using a browser that can't handle CSS. If you're using an older browser version, you might want to consider upgrading.