Research: Difference between revisions

From HORSE - Holistic Operational Readiness Security Evaluation.
Jump to navigation Jump to search
(InfoSec Research Resources)
 
No edit summary
Line 1: Line 1:
=='''Best Practices Research Resources'''==
=='''Information Security Research Resources'''==
:[[Best Practices Research Reports:|'''Best Practices Research Reports''']]<br>
:A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.<br>
<br>
:[[Regulatory and Industry Standards:|'''Regulatory and Industry Standards''']]<br>
:This section provides solutions for industry-specific security regulations such as Gramm-Leach-Bliley Act (GLBA) and Health Insurance Portability and Accountability Act (HIPAA), as well as security standards such as International Organization for Standardization (ISO 17799).<br>
<br>
:[[Recommended Links:|'''Recommended Links''']]<br>
:Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)<br>
<br>

Revision as of 12:10, 28 July 2006

Information Security Research Resources

Best Practices Research Reports
A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting Web applications.


Regulatory and Industry Standards
This section provides solutions for industry-specific security regulations such as Gramm-Leach-Bliley Act (GLBA) and Health Insurance Portability and Accountability Act (HIPAA), as well as security standards such as International Organization for Standardization (ISO 17799).


Recommended Links
Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)