Secure Business Infrastructure - SBI

Home | About us | Contact us | Careers
search engine optimization consultation, Canada, Egypt, France
Network Security solution

White Papers

These are our most recent White Papers. It is published here to share them with you. Whenever, there is a new paper    published for us, you'll find it here. We would appreciate hearing your comments and participations, as well. 

 

Packet Saga:

Find available information about Packet Saga in this paper. What is meant by Packet Saga? Click here to read more about Packet Saga, or view online presentation here.

 

Multiple Vulnerabilities in ADSL router:

"... the encrypted passwords are not shadowed.......! look closer..... all users have the same user ID !!!! you do not have to escalate all users are administrators.

It may not be important but there is one issue that is left unwrapped which ..."

Read full paper.

 

Information Security Frame Work:

Download full version of the  presentation . Learn about what is meant by Information Security Frame, how to implement security solutions to your business and what is the weak points to be attacked by malicious actions.

Find hereunder more white papers

    ppt pdf ps doc  
  Information Security Framework ppt        
  Open Virtual Organization ppt html      
  Packet saga ppt        
  Cyber threats          
  Building a small data center          
  Multiple vulnerabilities in ADSL router          
  Buffer overflow illustrated         paused
  Simulation Documentation in Egypt2020       Ch. One  
          Ch. Two  
          Ch. Three  
          Ch. Four  
          Ch. Five  
          Ch. Six  
  The Youth and the Education System   pdf ps rtf  
  The Demography Model: Computer Design, Interface, and Software.   pdf ps rtf

original mirror PDF0.12MB, PS0.11MB, Word0.77MB

  Demographic, Economic, and Environmental Interactions: A Proposal for Design and Software Needs, Using Visual Basic & Access.   pdf ps rtf

original mirror PDF0.8MB, PS1.0MB, Word0.9MB

 
  Simulation as Implemented in Egypt2020 Model   part1 part1 part1  
      part2 part2 part2  
      part3 part3 part3  
      part4 part4 part4  
      part5 part5 part5  
  Risk Calculation in a Linux Environment          
  The future of IT, telecom          
  Electronic Government Presentation ppt       A Presentation at El-Mishkat Research Center
  Pharaonic concept ppt        
  Building a career in information security          

About Us | Site Map | Contact Us | Newsletters |©2005 www.sbi-secureit.com PageRank verification www.sbi-secureit.com Valid CSS!

Network Security | Network Auditing | E-commerce |White Papers | News | Career | SEO Tools | Experience List | Packages & Special Offers