Systems and Computer Security - System Security - resources selection for computer professionals.
|  |
|
| Ajax - US & International Government Military, Intelligence & Law Enforcement Agency Access
| Introduction |
bsy's Security Related Net-pointers (Bennet Yee)
| Introduction |
BugNet Since 1994, BugNet has delivered leading-edge information on PC software bugs, alerting readers to glitches, analyzing software trends, and compiling the industry's most comprehensive database of computer bug fixes.
| Introduction |
CIAC Security Web Site The CIAC Website provides an extensive, comprehensive resource for diverse computer security issues. These resources are presented in various forms and topics and are available to the public as well as the DOE (Department of Energy)
| Introduction |
COAST Hotlist: Computer Security, Law and provacy (Purdue University) COAST-- Computer Operations, Audit, and Security Technology -- is a multiple project, multiple investigator laboratory in computer security research in the Computer Sciences Department
| Introduction |
Computer Crime Problems Research Center. A Ukraine based resource
| Introduction |
Computer Crimes, Laws and Related Information (City University of Hong Kong) An extensive collection of references
| Introduction |
Computer Emergency Response Team - 'The CERT Coordination Center is part of the Survivable Systems Initiative at the Software Engineering Institute, a federally funded research and development center at Carnegie Mellon University. We were started by DARPA
| Introduction |
Computer Security (Wayne Summers) Computer Security should be a major concern of all those using computers today. This list includes many of the best sites on the Internet concerning computer security, computer crime and computer viruses.
| Introduction |
Computer Security FAQs
| Introduction |
The Computer Security Institute
| Introduction |
Computer Security News Daily - Latest Stories
| Introduction |
Computer Security Resource Clearinghouse (NIST) The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security profession
| Introduction |
Distributed Attack Tools - understanding them and defending against them (Packet Storm) 'Packet Storm is the largest Internet security tools database in the world. We provide intelligence ranging from security tools to system defense and assessment inform
| Introduction |
Electronic Commerce, Smart Cards and Security Resources (S. Prasad)
| Introduction |
Encryption and Security-related Resources (Peter Gutmann) A very extensive collection of resources
| Introduction |
Firewall Industry Guide (ICSA) Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another, which is obviously not what the Firewall Industry Guide is about! We are talking about Inter
| Introduction |
Firewalls FAQ
| Introduction |
Forum On Risks To The Public In Computers And Related Systems
| Introduction |
HACKER WHACKER Security Sites (Wallyware, Inc.) List of sites that contain the most up-to-date, and useful news and information
| Introduction |
ICSA Certified Firewall Products - Established in 1989 as an independent corporation, ICSA has successfully led the security industry in the development of high quality security products through product certification programs and in establishing better se
| Introduction |
ICSA Information Library - White Papers
| Introduction |
Information Security Policies & Computer Security Policies Directory (The Information Security Policies & Standards Group) 'Information security policies underpin the security and well being of information resources.. they are the foundation, the bottom l
| Introduction |
Information Security Resources/Links (ISSA) An extensive range of links, covering security tools, virus information, security alerts, security resources and security list servers, as well as links to disaster information
| Introduction |
Information Security Search Engine
| Introduction |
Information Technology Security - links to resources - The Communications Security Establishment (CSE) is a federal government lead agency that delivers Information Technology Security (ITS) solutions to the government of Canada.
| Introduction |
Intelligent Agents, Information System Security, Information Warfare, and Other Related Sources (Michael Bowman)
| Introduction |
International Computer Security Association (ICSA) ICSA is known worldwide as the objective source for security assurance services. Established in 1989 as an independent corporation, ICSA has successfully led the security industry in the development of hi
| Introduction |
Internet and System Security (Dave Dittrich) An extensive collection of resources
| Introduction |
Internet Explorer Security Center (Scott Schnoll) The purpose of this web site is to disseminate information regarding the security issues pertaining to Microsoft® Internet Explorer. This web site is UNOFFICIAL and in NO WAY sanctioned or authorized by Mi
| Introduction |
ISS' X-Force Threat and Vulnerability Database - ISS' X-Force Team continually updates this security repository with the latest network attack and vulnerability information.
| Introduction |
IT Security Cookbook (Sean Boran) This book is intended as a 'self help' guide to computer & network security, primarily for security managers, programmers and system administrators.
| Introduction |
ITtoolbox Security
| Introduction |
Java Security: Frequently Asked Questions (Princeton Secure Internet Programming Team) Nothing in life is completely secure; Java is no exception. Several specific security problems have been discovered and fixed since Java was first released. If you're u
| Introduction |
Microsoft ISA Server Firewall and Cache resource site
| Introduction |
Microsoft Security Advisor Program
| Introduction |
NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security profession
| Introduction |
NTBugtraq! (Russ Cooper ) NTBugtraq is a mailing list for the discussion of security exploits and security bugs in Windows NT and its related applications.
| Introduction |
Other Sources of Security Information (CERT) Sources of security information, tools, discussion groups, incident response help, and more
| Introduction |
searchSecurity.com (TechTarget.com) Security Specific Search Engine
| Introduction |
Secure Internet Programming (Princeton University, Department of Computer Science) 'We study problems in computer security, especially mobile code systems such as Java, ActiveX, and JavaScript. We try to understand how security breaks down, and to develop
| Introduction |
SecureZone (En Garde Systems) 'Here you will find over a thousand links, which, along with our custom preferences function, will help you locate the security information you need.'
| Introduction |
Security (ZDNet's Devhead)
| Introduction |
Security and Encryption-related Resources and Links (Peter Gutmann) Covers Crypto Link Farms, Crypto Archives, Crypto Social Issues, Crypto Software, Anonymity and Privacy, Random Numbers, Public Key Infrastructure (PKI), Security Agencies and Organizatio
| Introduction |
Security FAQs (Internet Security Systems, Inc.) Includes FAQs on Securing a Network, Compromise, File Sharing, Windows NT, Security Patches and Network Packet Capture
| Introduction |
Security in agent-based systems (Massively Distributed Systems Group, IBM) Agent-based systems require new thinking, to avoid both security holes and unexpected global effects. When agent-based systems are combined with electronic commerce, the need for a
| Introduction |
Security in Computer Networks (Michael Waidner ) SIRENE (from the German, SIcherheit in REchnerNEtzen) is a loosely collaborating group of researchers from different organizations. We share an interest in security and privacy. In particular, we work on mu
| Introduction |
Security Information Management Online Network - SIMON
| Introduction |
Security Issues in Embedded Networking (Mark Eichin) As embedded systems have become more advanced, the tools for working with them have also improved. Often the easiest way to debug an embedded device is to hook it up to a local network, and then interro
| Introduction |
Security Mailing Lists FAQ (Internet Security Systems, Inc.) mailing lists include Alert, Intrusion Detection System, Network Security Assessment, and NT Security
| Introduction |
Security News links (SSE) Here are links to over 60 of the best Security News sites, many of which are updated daily
| Introduction |
Security Portal - Computer Network Telecommunications Physical Security Information Systems @ Algonquin College (InfoSysSec, Inc.) 'This Web Site contains over 10,000 Security Articles, Information and Downloads for Information System Security Professiona
| Introduction |
Security Professionals' sites Links to physical security information
| Introduction |
Security Related Links (Secure Electronic Marketplace for Europe) (Michael Waidner) SEMPER is a European R&D project in the area of secure electronic commerce over open networks, especially the Internet. It is executed by an interdisciplinary consortium,
| Introduction |
Security Research Center (SecurityPortal.com)
| Introduction |
Security Resource Center (ZDNet) Articles, tips, white papers, etc.
| Introduction |
Security Risk Analysis Directory
| Introduction |
Security Space (E-Soft Inc) SecuritySpace.com is a web security portal, providing internet security related news, resources, tools and services
| Introduction |
Security World Wide Web (WWW) Sites (Center for Information Technology, National Institutes of Health, Bethesda, MD)
| Introduction |
Security: Frequently Asked Questions (FAQ) (Center for Information Technology, National Institutes of Health, Bethesda, MD)
| Introduction |
SecurityFocus.com - Home of BugTraq
| Introduction |
SESAME (A Secure European System for Applications in a Multi-vendor Environment ) (Joris Claessens, Mark Vandenwauver and Paul Ashley) SESAME (a Secure European System for Applications in a Multi-vendor Environment) is a European research and development
| Introduction |
Six Steps Towards Better Security (AppGate)
| Introduction |
TECS: The Encyclopaedia of Computer Security (Townsend & Taphouse) 'TECS is a free security resource for anybody interested in IT security. It is all things security to all security people.'
| Introduction |
Terms and definitions - Security (PC Webopedia) See this page for definition of these terms: access, access code, access control, audit trail, authentication, authorization, bastion host, biometrics, Certificate Authority, challenge-response, CHAP, Clippe
| Introduction |
Tom Dunigan's Security page (Tom Dunigan) This page points to resources covering PGP, one-time passwords, kerberos, Crypto API's, random numbers, secure applications, intrusion detection, vulnerabilities, Java and WWW, UNIX security, and NT security
| Introduction |
Trusted Computing Platform Alliance (TCPA) The Trusted Computing Platform Alliance, or TCPA, was formed by Compaq, HP, IBM, Intel and Microsoft. All five companies have been individually working on improving the trust available within the PC for years. Th
| Introduction |
Understanding Malicious Content Mitigation For Web Developers (CERT® Coordination Center) 'CERT Advisory CA-2000-02 describes a problem with malicious tags embedded in client HTTP requests, discusses the impact of malicious scripts, and offers ways to pre
| Introduction |
Unix Computer Security (UnixTools.com)
| Introduction |
Unix Security Page (Matthew Deter)
| Introduction |
Viruses, Worms and Security Holes (Computerworld)
| Introduction |
W3C Security Resources (w3.org) Web security is a complex topic, encompassing computer system security, network security, authentication services, message validation, personal privacy issues, and cryptography. This page contains links to various aspects o
| Introduction |
Web Security Links (Web Developer)
| Introduction |
Web site for the Security Community (I.T. Works bvba)
| Introduction |
Windows 2000 Security - News, information and products for Network Security and Windows 2000.
| Introduction |
Windows Security News (Duke Communications International Inc.)
| Introduction |
The World Wide Web Virtual Library: Safety-Critical Systems (Oxford University) This document contains pointers to information on Safety-Critical Systems, where human lives may be at risk, especially involving software and computers, available around the
| Introduction |
The WWW Security FAQ - It's a maxim in system security circles that buggy software opens up security holes. It's a maxim in software development circles that large, complex programs contain bugs. Unfortunately, Web servers are large, complex programs that
| Introduction |
www.incidents.org (SANS Institute) Incidents.org is about community and industry collaboration on security related matters. The results of this collaboration take the form of practical technologies, tools, and processes that can be used by the entire Inte
| Introduction |
Web Security Center (Symantec) Internet Security is an important topic these days. The Symantec Security Center staff believes that it is important for all Internet users to understand a little bit about the risks of using the Internet, and to learn some
| Introduction |
Keywords: Systems and Computer Security - System Security Nb of links = 80 |  |
|