SearchBeat Home
comparison shop | family | fashion | gov't | games | genealogy | history | kids/teens | movies | repairs | traffic | weather | featured sites | site map |

    Top > Computers > Security > Publications

Featured Topics

Poor web site text puts people off says new survey

Illustrated Library.Com Offers Personal Reading Rooms to View and Buy Books Online

Study: Reveals Internet Communication Breakdown - Gives you an accurate national search Launches Redesigned Person-To-Person Search Assistance Portal

Apple Computers

Audio & Video Web Links

Computer Books

Computer Resources

Computer Shopping

Computer Support

Cyber Culture

Free Stuff on the Web

HTML Tutorial

Internet Jobs

Internet Search



Shockwave and Flash Gallery

Shockwave Flash Ratings

Useful Web Sites

Web Cams

Web Design and Graphics

Web Site Announcements

Discount Shopping
Home and Garden
Jobs and Careers
Movies & Music
From Over 300 Stores!

Sponsored Link

   See Also:

    Designing Secure Software - A methodology for avoiding the security holes that drive you mad, an article from SunWorld.

    Site Security Handbook (RFC 2196) - This handbook is a guide to developing computer security policies and procedures for sites that have systems on the Internet. The purpose of this handbook is to provide practical guidance to administrators trying to secure their information and services.

    Evolution of malicious agents - This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the threat of a new breed of malicious agents being developed on the Internet.

    Internet Security News List - Internet Security News is a privately run, medium traffic list that caters to distribution of information security news articles. These articles will come from newspapers, magazines, online resources, and more.

    Introduction to Network Security - A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management.

    Source Code Review Guidelines - Before programs may be placed in the firewall system, the source code is reviewed for deficiencies in the areas of security, reliability and operations. This document is dual purposed; first it is a guideline and checklist for security groups performing the code review; second, it is an attempt to provide development teams with information about what we look for in a review.

    How to find security holes - Written as a primer for people participating in the Linux Security Audit project, which is intended to find security holes so they can be fixed before people use them to break into things.

    SuraSoft's Security FAQ - Provides questions and answers to the most commonly asked security questions without the techno words

    NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.

    ACM Crossroads Security feature articles - ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index.

    ICSA Information Security Magazine - ICSA an independent organization offering objective views and opinions on computer security issues. Improve computer security through knowledge sharing, information dissemination, and security products certification.

    Access Center for privacy, security, and consumer resources - Privacy, security, and consumer resources for internet users. Also resources for reporting illegal internet acitivity online.

    Network Security Library - Windows, unix, netware, WWW, firewalls, intrusion detection systems, security policy, books, papers, articles, etc.

    CERT Coordination Center Vulnerability Database - Vulnerability Notes published by the CERT Coordination Center.

    National Computer Security Center - Information on trusted product security evaluations, the criteria and processes used for evaluations (TCSEC and Common Criteria), and the programs supported by the Center.

    DoD Regulations, Instructions, and Publications - Reliable and complete source for all U.S. Department of Defense security regulations, instructions, manuals, and memoranda.

    HIPAA Health Insurance Portability & Accountability Act - U.S. Department of Health and Human Services Web site is the authoritative source for the HIPAA security standards and their implementation schedules. Also contains FAQs, comments to proposed rules, links, and a news bulletin listserver.

    SC Magazine - SC Magazine is the leading computer security magazine in the USA. It's a mix of Product Reviews, Solutions and Articles supported by news and commentary that gets to the heart of information and computer security issues.

    Cipher - the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy.

    Information Security Statistics - Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter.

    BaDc0deD - Computer Security Documents - White papers, tutorials and source code about secure programming, bugs, buffer overflows,user supplied format string, exploit coding, shellcode programming and assembly.(English & EspaƱol)

    The Orange Book Site - Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out.

    Anton Chuvakin, Ph.D. Infosecurity Publications - This page contains links to all the information security articles the author has written on Linux security, vulnerabilities, people issues of infosec and others topics.

    ACM Crossroads Student Magazine - Column: Security for Wide-Area Internet Routing. Nick Feamster.

    TheCyberPunk - network security tutorial database - A collection of network security tutorials. You can add your own security tutorial to the collection.

    Anonymous and Pseudonymous communications and systems bibliography - A compilation of bibliographic references and links to influential papers relating to anonymity.

    2002 UK Information Security Breaches Survey - UK Government Department of Trade & Industry Information Security Breaches Survey web-site.

    The ISO 17799 Security Standard - Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard. - Constantly growing white-paper library including information on networking, programming, honey-pots, IDS (Intrusion Detection Systems), programming, networking, hundreds of tools to protect your network against crackers, latest security issues, an ideal place for any security minded system administrator to learn and protect against crackers and script-kiddies.

Help build the largest human-edited directory on the web.
Submit a Site - Open Directory Project - Become an Editor

Computer Store

| Feedback
| Contact us | Our Story | Privacy Policy | Terms and Conditions
Copyright © 1997-2020 SearchBeat, All Rights Reserved