Research: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br> | :[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br> | ||
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.<br> | :A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.<br> | ||
<br> | <br> | ||
:[[Recommended Links:|'''Recommended Links''']]<br> | :[[Recommended Links:|'''Recommended Links''']]<br> | ||
:Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br> | :Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br> | ||
<br> | <br> |
Revision as of 20:30, 30 July 2006
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)