Systems and Computer Security - System Security - resources selection for computer professionals.

Ajax - US & International Government Military, Intelligence & Law Enforcement Agency Access
Introduction
bsy's Security Related Net-pointers (Bennet Yee)
Introduction
BugNet Since 1994, BugNet has delivered leading-edge information on PC software bugs, alerting readers to glitches, analyzing software trends, and compiling the industry's most comprehensive database of computer bug fixes.
Introduction
CIAC Security Web Site The CIAC Website provides an extensive, comprehensive resource for diverse computer security issues. These resources are presented in various forms and topics and are available to the public as well as the DOE (Department of Energy)
Introduction
COAST Hotlist: Computer Security, Law and provacy (Purdue University) COAST-- Computer Operations, Audit, and Security Technology -- is a multiple project, multiple investigator laboratory in computer security research in the Computer Sciences Department
Introduction
Computer Crime Problems Research Center. A Ukraine based resource
Introduction
Computer Crimes, Laws and Related Information (City University of Hong Kong) An extensive collection of references
Introduction
Computer Emergency Response Team - 'The CERT Coordination Center is part of the Survivable Systems Initiative at the Software Engineering Institute, a federally funded research and development center at Carnegie Mellon University. We were started by DARPA
Introduction
Computer Security (Wayne Summers) Computer Security should be a major concern of all those using computers today. This list includes many of the best sites on the Internet concerning computer security, computer crime and computer viruses.
Introduction
Computer Security FAQs
Introduction
The Computer Security Institute
Introduction
Computer Security News Daily - Latest Stories
Introduction
Computer Security Resource Clearinghouse (NIST) The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security profession
Introduction
Distributed Attack Tools - understanding them and defending against them (Packet Storm) 'Packet Storm is the largest Internet security tools database in the world. We provide intelligence ranging from security tools to system defense and assessment inform
Introduction
Electronic Commerce, Smart Cards and Security Resources (S. Prasad)
Introduction
Encryption and Security-related Resources (Peter Gutmann) A very extensive collection of resources
Introduction
Firewall Industry Guide (ICSA) Originally, the term firewall referred to a construction technique designed to prevent the spread of fire from one room to another, which is obviously not what the Firewall Industry Guide is about! We are talking about Inter
Introduction
Firewalls FAQ
Introduction
Forum On Risks To The Public In Computers And Related Systems
Introduction
HACKER WHACKER Security Sites (Wallyware, Inc.) List of sites that contain the most up-to-date, and useful news and information
Introduction
ICSA Certified Firewall Products - Established in 1989 as an independent corporation, ICSA has successfully led the security industry in the development of high quality security products through product certification programs and in establishing better se
Introduction
ICSA Information Library - White Papers
Introduction
Information Security Policies & Computer Security Policies Directory (The Information Security Policies & Standards Group) 'Information security policies underpin the security and well being of information resources.. they are the foundation, the bottom l
Introduction
Information Security Resources/Links (ISSA) An extensive range of links, covering security tools, virus information, security alerts, security resources and security list servers, as well as links to disaster information
Introduction
Information Security Search Engine
Introduction
Information Technology Security - links to resources - The Communications Security Establishment (CSE) is a federal government lead agency that delivers Information Technology Security (ITS) solutions to the government of Canada.
Introduction
Intelligent Agents, Information System Security, Information Warfare, and Other Related Sources (Michael Bowman)
Introduction
International Computer Security Association (ICSA) ICSA is known worldwide as the objective source for security assurance services. Established in 1989 as an independent corporation, ICSA has successfully led the security industry in the development of hi
Introduction
Internet and System Security (Dave Dittrich) An extensive collection of resources
Introduction
Internet Explorer Security Center (Scott Schnoll) The purpose of this web site is to disseminate information regarding the security issues pertaining to Microsoft® Internet Explorer. This web site is UNOFFICIAL and in NO WAY sanctioned or authorized by Mi
Introduction
ISS' X-Force Threat and Vulnerability Database - ISS' X-Force Team continually updates this security repository with the latest network attack and vulnerability information.
Introduction
IT Security Cookbook (Sean Boran) This book is intended as a 'self help' guide to computer & network security, primarily for security managers, programmers and system administrators.
Introduction
ITtoolbox Security
Introduction
Java Security: Frequently Asked Questions (Princeton Secure Internet Programming Team) Nothing in life is completely secure; Java is no exception. Several specific security problems have been discovered and fixed since Java was first released. If you're u
Introduction
Microsoft ISA Server Firewall and Cache resource site
Introduction
Microsoft Security Advisor Program
Introduction
NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security profession
Introduction
NTBugtraq! (Russ Cooper ) NTBugtraq is a mailing list for the discussion of security exploits and security bugs in Windows NT and its related applications.
Introduction
Other Sources of Security Information (CERT) Sources of security information, tools, discussion groups, incident response help, and more
Introduction
searchSecurity.com (TechTarget.com) Security Specific Search Engine
Introduction
Secure Internet Programming (Princeton University, Department of Computer Science) 'We study problems in computer security, especially mobile code systems such as Java, ActiveX, and JavaScript. We try to understand how security breaks down, and to develop
Introduction
SecureZone (En Garde Systems) 'Here you will find over a thousand links, which, along with our custom preferences function, will help you locate the security information you need.'
Introduction
Security (ZDNet's Devhead)
Introduction
Security and Encryption-related Resources and Links (Peter Gutmann) Covers Crypto Link Farms, Crypto Archives, Crypto Social Issues, Crypto Software, Anonymity and Privacy, Random Numbers, Public Key Infrastructure (PKI), Security Agencies and Organizatio
Introduction
Security FAQs (Internet Security Systems, Inc.) Includes FAQs on Securing a Network, Compromise, File Sharing, Windows NT, Security Patches and Network Packet Capture
Introduction
Security in agent-based systems (Massively Distributed Systems Group, IBM) Agent-based systems require new thinking, to avoid both security holes and unexpected global effects. When agent-based systems are combined with electronic commerce, the need for a
Introduction
Security in Computer Networks (Michael Waidner ) SIRENE (from the German, SIcherheit in REchnerNEtzen) is a loosely collaborating group of researchers from different organizations. We share an interest in security and privacy. In particular, we work on mu
Introduction
Security Information Management Online Network - SIMON
Introduction
Security Issues in Embedded Networking (Mark Eichin) As embedded systems have become more advanced, the tools for working with them have also improved. Often the easiest way to debug an embedded device is to hook it up to a local network, and then interro
Introduction
Security Mailing Lists FAQ (Internet Security Systems, Inc.) mailing lists include Alert, Intrusion Detection System, Network Security Assessment, and NT Security
Introduction
Security News links (SSE) Here are links to over 60 of the best Security News sites, many of which are updated daily
Introduction
Security Portal - Computer Network Telecommunications Physical Security Information Systems @ Algonquin College (InfoSysSec, Inc.) 'This Web Site contains over 10,000 Security Articles, Information and Downloads for Information System Security Professiona
Introduction
Security Professionals' sites Links to physical security information
Introduction
Security Related Links (Secure Electronic Marketplace for Europe) (Michael Waidner) SEMPER is a European R&D project in the area of secure electronic commerce over open networks, especially the Internet. It is executed by an interdisciplinary consortium,
Introduction
Security Research Center (SecurityPortal.com)
Introduction
Security Resource Center (ZDNet) Articles, tips, white papers, etc.
Introduction
Security Risk Analysis Directory
Introduction
Security Space (E-Soft Inc) SecuritySpace.com is a web security portal, providing internet security related news, resources, tools and services
Introduction
Security World Wide Web (WWW) Sites (Center for Information Technology, National Institutes of Health, Bethesda, MD)
Introduction
Security: Frequently Asked Questions (FAQ) (Center for Information Technology, National Institutes of Health, Bethesda, MD)
Introduction
SecurityFocus.com - Home of BugTraq
Introduction
SESAME (A Secure European System for Applications in a Multi-vendor Environment ) (Joris Claessens, Mark Vandenwauver and Paul Ashley) SESAME (a Secure European System for Applications in a Multi-vendor Environment) is a European research and development
Introduction
Six Steps Towards Better Security (AppGate)
Introduction
TECS: The Encyclopaedia of Computer Security (Townsend & Taphouse) 'TECS is a free security resource for anybody interested in IT security. It is all things security to all security people.'
Introduction
Terms and definitions - Security (PC Webopedia) See this page for definition of these terms: access, access code, access control, audit trail, authentication, authorization, bastion host, biometrics, Certificate Authority, challenge-response, CHAP, Clippe
Introduction
Tom Dunigan's Security page (Tom Dunigan) This page points to resources covering PGP, one-time passwords, kerberos, Crypto API's, random numbers, secure applications, intrusion detection, vulnerabilities, Java and WWW, UNIX security, and NT security
Introduction
Trusted Computing Platform Alliance (TCPA) The Trusted Computing Platform Alliance, or TCPA, was formed by Compaq, HP, IBM, Intel and Microsoft. All five companies have been individually working on improving the trust available within the PC for years. Th
Introduction
Understanding Malicious Content Mitigation For Web Developers (CERT® Coordination Center) 'CERT Advisory CA-2000-02 describes a problem with malicious tags embedded in client HTTP requests, discusses the impact of malicious scripts, and offers ways to pre
Introduction
Unix Computer Security (UnixTools.com)
Introduction
Unix Security Page (Matthew Deter)
Introduction
Viruses, Worms and Security Holes (Computerworld)
Introduction
W3C Security Resources (w3.org) Web security is a complex topic, encompassing computer system security, network security, authentication services, message validation, personal privacy issues, and cryptography. This page contains links to various aspects o
Introduction
Web Security Links (Web Developer)
Introduction
Web site for the Security Community (I.T. Works bvba)
Introduction
Windows 2000 Security - News, information and products for Network Security and Windows 2000.
Introduction
Windows Security News (Duke Communications International Inc.)
Introduction
The World Wide Web Virtual Library: Safety-Critical Systems (Oxford University) This document contains pointers to information on Safety-Critical Systems, where human lives may be at risk, especially involving software and computers, available around the
Introduction
The WWW Security FAQ - It's a maxim in system security circles that buggy software opens up security holes. It's a maxim in software development circles that large, complex programs contain bugs. Unfortunately, Web servers are large, complex programs that
Introduction
www.incidents.org (SANS Institute) Incidents.org is about community and industry collaboration on security related matters. The results of this collaboration take the form of practical technologies, tools, and processes that can be used by the entire Inte
Introduction
Web Security Center (Symantec) Internet Security is an important topic these days. The Symantec Security Center staff believes that it is important for all Internet users to understand a little bit about the risks of using the Internet, and to learn some
Introduction
Keywords: Systems and Computer Security - System Security
Nb of links = 80

Please Login or Register.