Samuel Ip and Benjamin Haastrup http://ahmedabbasi.com/uploads/AbbasiChen_Computer.pdf http://docs.apwg.org/reports/200603_NCL_Phishing_Report.pdf http://docs.apwg.org/reports/APWG_GlobalPhishingSurvey_2H2012.pdf http://www.eset.com/us/resources/white-papers/Pretty_Kettle_of_Phish.pdf
2) Web Bugs and Honeytokens: Who is tracking who?!
Armin Slopek and Dilara Cakir http://resources.infosecinstitute.com/means-and-methods-of-web-tracking-its- effects-on-privacy-and-ways-to-avoid-getting-tracked/ http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4076930 http://software-security.sans.org/blog/2009/06/04/my-top-6-honeytokens/
3) Botnets: Current Trends
Dan Palero, Nimrat Virk and Adrian Ng http://dl.acm.org/citation.cfm?id=2501659 http://www.eset.com/us/resources/white-papers/Trends-for-2011.pdf http://www.geant.net/Media_Centre/Media_Library/Media%20Library/botnet_tren ds_M2.pdf http://www.mcafee.com/ca/resources/white-papers/wp-new-era-of-botnets.pdf
4) Puppetnets and Social-DDoS Attacks
Abdulaziz Busbate and Simeon Lee http://cryptosec.ucsd.edu/miscpapers/puppetnets-ccs06.pdf http://www.cs.rutgers.edu/research/technical_reports/report.php?report_id=646& series_id=1.
5) Privacy and Security in Online Social Networks
Nnamdi George Okafor and Vadzim Staradzetka http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5510913 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6309700 http://www.cse.msu.edu/~soodadit/papers/ISACA_JAN_2011_Chain%20Exploita tion.pdf http://www.iseclab.org/papers/sonda-TR.pdf
6) Security and Privacy in Cloud Computing
Stephen Luk and Alexander Tran http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5487489 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5655238 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6123700 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6238281 7) Virtual Private Networks (VPNs) Baker El-Hoseiny and Harinder Sheena Guide to Network Defense and Countermeasures, 3rd edition, pp.385, Ch. 11. (hardcopy to be provided)
8) Same-Origin-Policy (SOP) and Its Security Implications
http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=5999631 http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.83.7753&rep=rep1&typ e=pdf http://codeprofilers.com/tl_files/codeprofiler/pdf/the_cross_site_scripting_threat.p df (more references provided on request)
10) Digital Steganography
Randy Ding and Dmytro Atamanchuk http://www.sciencedirect.com/science/article/pii/S0165168409003648 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=935180 http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=4655281
Microsoft Access Guide to Success: From Fundamentals to Mastery in Crafting Databases, Optimizing Tasks, & Making Unparalleled Impressions [III EDITION]