Arts
Business
Computers
Games
Health
Home
Kids and Teens
News
Recreation
Reference
Regional
Science
Shopping
Society
Sports

   Home / Computers / Security / Publications
 
   See Also
   Web Sites
  • 2002 UK Information Security Breaches Survey - UK Government Department of Trade & Industry Information Security Breaches Survey web-site.
    https://www.security-survey.gov.uk
  • ACM Crossroads Security feature articles - ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index.
    www.acm.org/crossroads/doc/indices/features.html#Security
  • ACM Crossroads Student Magazine - Column: Security for Wide-Area Internet Routing. Nick Feamster.
    www.acm.org/crossroads/columns/onpatrol/november00.html
  • Anonymous and Pseudonymous Communications and Systems Bibliography - A compilation of bibliographic references and links to influential papers relating to anonymity.
    www.cl.cam.ac.uk/~gd216/anonymity.html
  • Anton Chuvakin, Ph.D. Infosecurity Publications - This page contains links to all the information security articles the author has written on Linux security, vulnerabilities, people issues of infosec and others topics.
    www.info-secure.org
  • BaDc0deD - Computer Security Documents - White papers, tutorials and source code about secure programming, bugs, buffer overflows,user supplied format string, exploit coding, shellcode programming and assembly.(English & EspaƱol)
    julianor.tripod.com
  • CERT Coordination Center Vulnerability Database - Vulnerability Notes published by the CERT Coordination Center.
    www.kb.cert.org/vuls
  • Cipher - the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy.
    www.ieee-security.org/cipher.html
  • Computers at Risk: Safe Computing in the Information Age - Complete text of the book by the System Security Study Committee, National Research Council, U.S, that presents a comprehensive agenda for developing nationwide policies and practices for computer security.
    www.nap.edu/catalog/1581.html
  • Designing Secure Software - A methodology for avoiding the security holes that drive you mad, an article from SunWorld.
    www.sun.com/sunworldonline/swol-04-1998/swol-04-security.html
  • DoD Regulations, Instructions, and Publications - Reliable and complete source for all U.S. Department of Defense security regulations, instructions, manuals, and memoranda.
    web7.whs.osd.mil/corres.htm
  • eSecurity Journal - An online repository of information security technical guides and whitepapers.
    www.eSecurityJournal.com
  • Evolution of malicious agents - This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the threat of a new breed of malicious agents being developed on the Internet.
    www.zeltser.com/agents
  • HIPAA Health Insurance Portability & Accountability Act - U.S. Department of Health and Human Services Web site is the authoritative source for the HIPAA security standards and their implementation schedules. Also contains FAQs, comments to proposed rules, links, and a news bulletin listserver.
    aspe.os.dhhs.gov/admnsimp
  • How to find security holes - Written as a primer for people participating in the Linux Security Audit project, which is intended to find security holes so they can be fixed before people use them to break into things.
    www.dnaco.net/~kragen/security-holes.html
  • ICSA Information Security Magazine - ICSA an independent organization offering objective views and opinions on computer security issues. Improve computer security through knowledge sharing, information dissemination, and security products certification.
    www.infosecuritymag.com
  • Information Security Statistics - Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter.
    www.securitystats.com
  • InfoSecNews - InfoSec News is a privately run, medium traffic list that caters to distribution of information security news articles. These articles will come from newspapers, magazines, online resources, and more.
    www.c4i.org/isn.html
  • Introduction to Network Security - A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management.
    www.interhack.net/pubs/network-security
  • National Computer Security Center - Information on trusted product security evaluations, the criteria and processes used for evaluations (TCSEC and Common Criteria), and the programs supported by the Center.
    www.radium.ncsc.mil
  • Network Security Library - Windows, unix, netware, WWW, firewalls, intrusion detection systems, security policy, books, papers, articles, etc.
    secinf.net
  • NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
    csrc.ncsl.nist.gov
  • S3cure.net - Constantly growing white-paper library including information on networking, programming, honey-pots, IDS (Intrusion Detection Systems), programming, networking, hundreds of tools to protect your network against crackers, latest security issues, an ideal place for any security minded system administrator to learn and protect against crackers and script-kiddies.
    www.s3cure.net
  • SC Magazine - SC Magazine is the leading computer security magazine in the USA. It's a mix of Product Reviews, Solutions and Articles supported by news and commentary that gets to the heart of information and computer security issues.
    www.scmagazine.com/index2.html
  • Secure Programming for Linux and Unix HOWTO - This document provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems.
    www.dwheeler.com/secure-programs
  • SuraSoft's Security FAQ - Provides questions and answers to the most commonly asked security questions without the techno words
    www.surasoft.com/secfaq.html
  • The Common Criteria - International standards body which develops policies for evaluating IT security products and systems.
    www.commoncriteria.org
  • The ISO 17799 Security Standard - Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard.
    www.iso-17799-security-world.co.uk
  • The Orange Book Site - Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out.
    www.dynamoo.com/orange
  • TheCyberPunk - network security tutorial database - A collection of network security tutorials. You can add your own security tutorial to the collection.
    www.thecyberpunk.com/categories.asp?ParentID=93&SECID=

Google
1995-2015 © Stunning, Inc.