Search for
Home > Computers > Security >

Publications
New! Submit a site
 
whatUseek Collection Sites (submit a site ):
 
SpywareRemovalBasics.Com - Easy to understand spyware removal tools, tips, and articles for both non-technical and tech savvy people. Find information on a free spyware scan, and popular spyware removal tools.
 
 

whatUseek Directory Site Listings:
 
ACM Crossroads Security feature articles - ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index.
 
ACM Crossroads Student Magazine - Column: Security for Wide-Area Internet Routing. Nick Feamster.
 
Access Center for privacy, security, and consumer resources - Privacy, security, and consumer resources for internet users. Also resources for reporting illegal internet acitivity online.
 
Anonymous and Pseudonymous communications and systems bibliography - A compilation of bibliographic references and links to influential papers relating to anonymity.
 
BaDc0deD - Computer Security Documents - White papers, tutorials and source code about secure programming, bugs, buffer overflows,user supplied format string, exploit coding, shellcode programming and assembly.(English & EspaƱol)
 
CERT Coordination Center Vulnerability Database - Vulnerability Notes published by the CERT Coordination Center.
 
Cipher - the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy.
 
Collection of Documents at Rootshell - Every day people ranging from security consultants, Fortune 500 companies, and the U.S. Department of Defense make it a habit to visit our site.
 
Designing Secure Software - A methodology for avoiding the security holes that drive you mad, an article from SunWorld.
 
DoD Regulations, Instructions, and Publications - Reliable and complete source for all U.S. Department of Defense security regulations, instructions, manuals, and memoranda.
 
Evolution of malicious agents - This paper examines the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the threat of a new breed of malicious agents being developed on the Internet.
 
HIPAA Health Insurance Portability & Accountability Act - U.S. Department of Health and Human Services Web site is the authoritative source for the HIPAA security standards and their implementation schedules. Also contains FAQs, comments to proposed rules, links, and a news bulletin listserver.
 
How to find security holes - Written as a primer for people participating in the Linux Security Audit project, which is intended to find security holes so they can be fixed before people use them to break into things.
 
ICSA Information Security Magazine - ICSA an independent organization offering objective views and opinions on computer security issues. Improve computer security through knowledge sharing, information dissemination, and security products certification.
 
Info Sec News - InfoSec News is a privately run, medium traffic list that caters to distribution of information security news articles. These articles will come from newspapers, magazines, online resources, and more.
 
Information Security Statistics - Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter.
 
Introduction to Network Security - A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management.
 
NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
 
National Computer Security Center - Information on trusted product security evaluations, the criteria and processes used for evaluations (TCSEC and Common Criteria), and the programs supported by the Center.
 
 

[ 1 2 ]
Help build the largest human-edited directory on the web.
  Submit a Site - Open Directory Project - Become an Editor  
About   Help   Content Filter   Terms   Privacy Policy

© 2018 whatUseek