Research: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
|||
Line 1: | Line 1: | ||
=='''Information Security Research Resources'''== | =='''Information Security Research Resources'''== | ||
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br> | :[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br> | ||
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting | :A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting web applications.<br> | ||
<br> | <br> | ||
:[[Recommended Links:|'''Recommended Links''']]<br> | :[[Recommended Links:|'''Recommended Links''']]<br> |
Latest revision as of 00:00, 26 March 2007
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting web applications.
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)
- References
- Links to helpful or interesting information security documents.
- Tools
- Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.