Directory > Computers > Security > News and Media > Magazines and E-zines BaDc0deD - Computer Security Documents White papers, tutorials and source code about secure programming, bugs, buffer overflows, user-supplied format string, exploit coding, shellcode programming and assembly. (English and EspaƱol) http://community.core-sdi.com/~juliano/ Reviews Rating: Not yet Rated
Whois Check
Computers at Risk: Safe Computing in the Information Age Complete text of the book by the System Security Study Committee, National Research Council, U.S, that presents a comprehensive agenda for developing nationwide policies and practices for computer security. http://www.nap.edu/catalog/1581.html Reviews Rating: Not yet Rated
Whois Check
The Common Criteria International standards body which develops policies for evaluating IT security products and systems. http://www.commoncriteria.org/ Reviews Rating: Not yet Rated
Whois Check
Secure Programming for Linux and Unix HOWTO This document provides a set of design and implementation guidelines for writing secure programs for Linux and Unix systems. http://www.dwheeler.com/secure-programs Reviews Rating: Not yet Rated
Whois Check
The ISO 17799 Security Standard Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard. http://www.iso-17799-security-world.co.uk Reviews Rating: Not yet Rated
Whois Check
2002 UK Information Security Breaches Survey UK Government Department of Trade & Industry Information Security Breaches Survey web-site. https://www.security-survey.gov.uk/ Reviews Rating: Not yet Rated
Whois Check
Anonymous and Pseudonymous Communications and Systems Bibliography A compilation of bibliographic references and links to influential papers relating to anonymity. http://www.cl.cam.ac.uk/~gd216/anonymity.html Reviews Rating: Not yet Rated
Whois Check
TheCyberPunk A collection of network security tutorials. Users can add their own security tutorial to the collection. http://www.thecyberpunk.com/categories.asp?ParentID=93&SECID= Reviews Rating: Not yet Rated
Whois Check
ACM Crossroads Student Magazine Column: Security for Wide-Area Internet Routing. Nick Feamster. http://www.acm.org/crossroads/columns/onpatrol/november00.html Reviews Rating: Not yet Rated
Whois Check
Anton Chuvakin, Ph.D. Infosecurity Publications This page contains links to all the information security articles the author has written on Linux security, vulnerabilities, people issues of infosec and others topics. http://www.info-secure.org Reviews Rating: Not yet Rated
Whois Check
The Orange Book Site Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out. http://www.dynamoo.com/orange Reviews Rating: Not yet Rated
Whois Check
Information Security Statistics Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter. http://www.securitystats.com Reviews Rating: Not yet Rated
Whois Check
Cipher the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy. http://www.ieee-security.org/cipher.html Reviews Rating: Not yet Rated
Whois Check
SC Magazine SC Magazine is the leading computer security magazine in the USA. It's a mix of Product Reviews, Solutions and Articles supported by news and commentary that gets to the heart of information and computer security issues. http://www.scmagazine.com/index2.html Reviews Rating: Not yet Rated
Whois Check
National Computer Security Center Information on trusted product security evaluations, the criteria and processes used for evaluations (TCSEC and Common Criteria), and the programs supported by the Center. http://www.radium.ncsc.mil Reviews Rating: Not yet Rated
Whois Check
CERT Coordination Center Vulnerability Database Vulnerability Notes published by the CERT Coordination Center. http://www.kb.cert.org/vuls Reviews Rating: Not yet Rated
Whois Check
Network Security Library Windows, unix, netware, WWW, firewalls, intrusion detection systems, security policy, books, papers, and articles. http://secinf.net/ Reviews Rating: Not yet Rated
Whois Check
ACM Crossroads Security feature articles ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index. http://www.acm.org/crossroads/doc/indices/features.html#Security Reviews Rating: Not yet Rated
Whois Check
NIST Computer Security Resource Clearinghouse The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems. http://csrc.ncsl.nist.gov Reviews Rating: Not yet Rated
Whois Check
SuraSoft's Security FAQ Provides questions and answers to the most commonly asked security questions without the techno words http://www.surasoft.com/secfaq.html Reviews Rating: Not yet Rated
Whois Check
Introduction to Network Security A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management. http://www.interhack.net/pubs/network-security/ Reviews Rating: Not yet Rated
Whois Check
Evolution of malicious agents This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the threat of a new breed of malicious agents being developed on the Internet. http://www.zeltser.com/agents/ Reviews Rating: Not yet Rated
Whois Check
Designing Secure Software A methodology for avoiding the security holes that drive you mad, an article from SunWorld. http://www.sun.com/sunworldonline/swol-04-1998/swol-04-security.html Reviews Rating: Not yet Rated
Whois Check
|