{"id":130254,"date":"2009-11-15T09:08:00","date_gmt":"2009-11-15T14:08:00","guid":{"rendered":"tag:blogger.com,1999:blog-7196788127833928948.post-1281325400417812451"},"modified":"2009-11-15T09:08:00","modified_gmt":"2009-11-15T14:08:00","slug":"information-security-and-strategy-carnival-issue-5","status":"publish","type":"post","link":"https:\/\/mereja.media\/index\/130254","title":{"rendered":"Information Security and Strategy Carnival &#8211; issue #5"},"content":{"rendered":"<p>For the fifth issue of the Information Security and Strategy Carnival, I am pleased to present the following texts:<\/p>\n<ul>\n<li>Dan Cornell over at Denim Group posts a great article on <a href=\"http:\/\/denimgroup.typepad.com\/denim_group\/2009\/09\/13-things-a-web-application-attacker-wont-tell-you.html\">13  Things a Web Application Attacker Won&#8217;t Tell You<\/a> as well as <strong style=\"font-weight: normal;\"><a href=\"http:\/\/denimgroup.typepad.com\/denim_group\/2009\/10\/5-more-things-a-web-application-attacker-wont-tell-you.html\">5  More Things a Web Application Attacker Won&#8217;t Tell You<\/a><\/strong><\/li>\n<\/ul>\n<p><\/p>\n<ul>\n<li>John P Mello at AllSpammedUp has a take on benefits of spamming social networks in <a href=\"http:\/\/www.allspammedup.com\/2009\/11\/why-social-networking-spam-reaps-more-rewards-than-email\/\" rel=\"bookmark\" title=\"Permanent Link to Why social networking spam reaps more rewards than email\">Why social networking spam reaps more rewards than email<\/a><\/li>\n<\/ul>\n<p><\/p>\n<ul>\n<li>Roger Halbheer from Microsoft discusses <a id=\"bp___v___r___postlist___EntryItems_ctl01_PostTitle\" href=\"http:\/\/blogs.technet.com\/rhalbheer\/archive\/2009\/11\/13\/why-it-pays-to-be-secure-chapter-4-i-want-to-learn.aspx\">Why it pays to be secure \u2013 Chapter 4 \u2013 I want to learn!<\/a><\/li>\n<\/ul>\n<p>Please send submissions by the 25th each month to e-mail:shortinfosec _at_ gmail dot com<\/p>\n<p>Related posts<br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/05\/information-security-and-strategy.html\">Information Security and Strategy Carnival &#8211; Issue #1<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/06\/information-security-and-strategy.html\">Information Security and Strategy Carnival &#8211; Issue #2<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/06\/information-security-and-strategy_30.html\">Information Security and Strategy Carnival &#8211; Issue #3<\/a><br \/><a href=\"http:\/\/www.shortinfosec.net\/2008\/08\/information-security-and-strategy.html\">Information Security and Strategy Carnival &#8211; Issue #4<\/a><\/p>\n<div class=\"blogger-post-footer\"><img width='1' height='1' src='https:\/\/blogger.googleusercontent.com\/tracker\/7196788127833928948-1281325400417812451?l=www.shortinfosec.net' alt='' \/><\/div>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/feeds.feedburner.com\/~r\/shortinfosec\/~4\/3ADJNeRBsvo\" height=\"1\" width=\"1\"\/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For the fifth issue of the Information Security and Strategy Carnival, I am pleased to present the following texts: Dan Cornell over at Denim Group posts a great article on 13 Things a Web Application Attacker Won&#8217;t Tell You as well as 5 More Things a Web Application Attacker Won&#8217;t Tell You John P Mello [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-130254","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/comments?post=130254"}],"version-history":[{"count":0,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/posts\/130254\/revisions"}],"wp:attachment":[{"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/media?parent=130254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/categories?post=130254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mereja.media\/index\/wp-json\/wp\/v2\/tags?post=130254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}