On Jan 19, 2008 8:05 PM, Drexx Laggui [personal] <[EMAIL PROTECTED]> wrote: > 19Jan2008 (UTC +8) > > On 1/19/08, Rogelio Serrano <[EMAIL PROTECTED]> wrote: > > Anybody aware of any effort to do that? > > > > What university courses are required to be able to do this? > > What exactly is "provable security" ?
Sorry. I was referring to formal methods I found extensive resources in the web. There is more than enough for an intensive self study already. > > > Drexx Laggui -- CISA, CISSP, CFE Associate, ISO27001 LA-C, CCSI, CSA > http://www.laggui.com ( Singapore / Manila / California ) > Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer > PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4 8363 FFEC 3976 FF31 8A4E > _________________________________________________ > Philippine Linux Users' Group (PLUG) Mailing List > [email protected] (#PLUG @ irc.free.net.ph) > Read the Guidelines: http://linux.org.ph/lists > Searchable Archives: http://archives.free.net.ph > -- Lay low and nourish in obscurity _________________________________________________ Philippine Linux Users' Group (PLUG) Mailing List [email protected] (#PLUG @ irc.free.net.ph) Read the Guidelines: http://linux.org.ph/lists Searchable Archives: http://archives.free.net.ph

