Research: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
:[[Recommended Links:|'''Recommended Links''']]<br> | :[[Recommended Links:|'''Recommended Links''']]<br> | ||
:Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br> | :Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br> | ||
<br> | |||
:[[References:|'''References''']]<br> | |||
Links to helpful or interesting information security documents.<br> | |||
<br> | |||
:[[Tools:|'''Tools''']]<br> | |||
Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.<br> | |||
<br> | <br> |
Revision as of 20:37, 30 July 2006
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)
Links to helpful or interesting information security documents.
Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.