GPU vs. CPU Supercomputing Security Shootout
Information disclosure via P2P networks: Why stealing an identity via Gnutella is like clubbing baby seals
Economics of Cyber Crime
Windows File Pseudonyms
Learning by Breaking: A New Project for Insecure Web Applications
Guest Stealing...The VMware Way