On Jan 19, 2008 8:05 PM, Drexx Laggui [personal] <[EMAIL PROTECTED]> wrote:
> 19Jan2008 (UTC +8)
>
> On 1/19/08, Rogelio Serrano <[EMAIL PROTECTED]> wrote:
> > Anybody aware of any effort to do that?
> >
> > What university courses are required to be able to do this?
>
> What exactly is "provable security" ?

Sorry. I was referring to formal methods

I found extensive resources in the web. There is more than enough for
an intensive self study already.

>
>
> Drexx Laggui  -- CISA, CISSP, CFE Associate, ISO27001 LA-C, CCSI, CSA
> http://www.laggui.com  ( Singapore / Manila / California )
> Computer forensics; Penetration testing; QMS & ISMS developers; K-Transfer
> PGP fingerprint = 6E62 A089 E3EA 1B93 BFB4  8363 FFEC 3976 FF31 8A4E
> _________________________________________________
> Philippine Linux Users' Group (PLUG) Mailing List
> [email protected] (#PLUG @ irc.free.net.ph)
> Read the Guidelines: http://linux.org.ph/lists
> Searchable Archives: http://archives.free.net.ph
>

-- 
Lay low and nourish in obscurity
_________________________________________________
Philippine Linux Users' Group (PLUG) Mailing List
[email protected] (#PLUG @ irc.free.net.ph)
Read the Guidelines: http://linux.org.ph/lists
Searchable Archives: http://archives.free.net.ph

Reply via email to