Research: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
No edit summary
 
Line 1: Line 1:
=='''Information Security Research Resources'''==
=='''Information Security Research Resources'''==
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br>
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br>
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.<br>
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting web applications.<br>
<br>
<br>
:[[Recommended Links:|'''Recommended Links''']]<br>
:[[Recommended Links:|'''Recommended Links''']]<br>

Latest revision as of 00:00, 26 March 2007

Information Security Research Resources

Best Practices Research Reports
A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting web applications.


Recommended Links
Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)


References
Links to helpful or interesting information security documents.


Tools
Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.