Research: Difference between revisions
Jump to navigation
Jump to search
(InfoSec Research Resources) |
No edit summary |
||
Line 1: | Line 1: | ||
==''' | =='''Information Security Research Resources'''== | ||
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br> | |||
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.<br> | |||
<br> | |||
:[[Regulatory and Industry Standards:|'''Regulatory and Industry Standards''']]<br> | |||
:This section provides solutions for industry-specific security regulations such as Gramm-Leach-Bliley Act (GLBA) and Health Insurance Portability and Accountability Act (HIPAA), as well as security standards such as International Organization for Standardization (ISO 17799).<br> | |||
<br> | |||
:[[Recommended Links:|'''Recommended Links''']]<br> | |||
:Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br> | |||
<br> |
Revision as of 12:10, 28 July 2006
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.
- Regulatory and Industry Standards
- This section provides solutions for industry-specific security regulations such as Gramm-Leach-Bliley Act (GLBA) and Health Insurance Portability and Accountability Act (HIPAA), as well as security standards such as International Organization for Standardization (ISO 17799).
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)