tag:blogger.com,1999:blog-5388115022531534533.post4301422928851020000..comments2024-03-07T21:21:45.209+11:00Comments on /dev/null - ramblings of an infosec professional: Book Review: Professional Penetration TestingJarrodhttp://www.blogger.com/profile/09705073585945953338noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-5388115022531534533.post-27739859692216375482013-07-03T15:56:31.398+10:002013-07-03T15:56:31.398+10:00Thank you for sharing a useful post with us! Thank you for sharing a useful post with us! Drawing classes melbournehttp://artencounters.com.aunoreply@blogger.comtag:blogger.com,1999:blog-5388115022531534533.post-22855119561570622112010-05-28T04:37:36.868+10:002010-05-28T04:37:36.868+10:00I read the comment about my talk and I agree that ...I read the comment about my talk and I agree that I should have jammed more cites into the talk - I would suggest not bad science just slacked on providing all the references. The numbers for the jargon file research come from two studies I did - one in 2002 and the other in 2009. Some of the data for the 1994 jargon file figures appears in the Profiling chapter of Know Your Enemy, 2nd edition (2004, book author - Honeynet Project) while some of the 2003 jargon file data can be found in a forthcoming chapter “Social Dynamics and the Future of Technology-Driven Crime”, in Corporate Hacking and Technology-Driven Crime, Holt, T. and Schell, B. eds., forthcoming.<br /><br />Hope that this helps...<br /><br />cheers,<br /><br />max kilgermax kilgernoreply@blogger.com