Research: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 9: | Line 9: | ||
:Links to helpful or interesting information security documents.<br> | :Links to helpful or interesting information security documents.<br> | ||
<br> | <br> | ||
:[[ | :[[Assessments|'''Tools''']]<br> | ||
:Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.<br> | :Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.<br> | ||
<br> | <br> |
Revision as of 22:02, 25 February 2007
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)
- References
- Links to helpful or interesting information security documents.
- Tools
- Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.