english deutsch
2002 UK Information Security Breaches Survey
UK Government Department of Trade & Industry Information Security Breaches Survey web-site.
ACM Crossroads Security feature articles
ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index.
ACM Crossroads Student Magazine
Column: Security for Wide-Area Internet Routing. Nick Feamster.
Anonymous and Pseudonymous Communications and Syst
A compilation of bibliographic references and links to influential papers relating to anonymity.
Anton Chuvakin, Ph.D. Infosecurity Publications
This page contains links to all the information security articles the author has written on Linux security, vulnerabilities, people issues of infosec and others topics.
BaDc0deD - Computer Security Documents
White papers, tutorials and source code about secure programming, bugs, buffer overflows, user-supplied format string, exploit coding, shellcode programming and assembly. (English and Español)
CERT Coordination Center Vulnerability Database
Vulnerability Notes published by the CERT Coordination Center.
Cipher
the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy.
Computers at Risk: Safe Computing in the Informati
Complete text of the book by the System Security Study Committee, National Research Council, U.S, that presents a comprehensive agenda for developing nationwide policies and practices for computer security.
Crypto-Gram
Monthly computer security newsletter written by Bruce Schneier.
Crypto-Gram
Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site.
CSO (Chief Security Officer) Magazine
Provides information security executives with high-level information, best practices and strategic insight.
CSOinformer
Monthly newsletter targeted at people who need a strategic, multi-year view of the information security industry.
Designing Secure Software
A methodology for avoiding the security holes that drive you mad, an article from SunWorld.
Information Security Statistics
Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter.
Information Systems Security Journal
Monthly print magazine for information security managers and others responsible for the daily, efficient operation of security policies, procedures, standards, and practices.
Infosecurity Today Magazine
Infosecurity Today focuses on the practical experiences of IT security professionals, provides analysis of current tends, independent reporting, and more.
Introduction to Network Security
A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management.
Lenny Zeltser
Article examining the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet.
National Computer Security Center
Information on trusted product security evaluations, the criteria and processes used for evaluations (TCSEC and Common Criteria), and the programs supported by the Center.
Network Security Library
Windows, unix, netware, WWW, firewalls, intrusion detection systems, security policy, books, papers, and articles.
NIST Computer Security Resource Clearinghouse
The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems.
SC Magazine - Online
Online counterpart to Secure Computing monthly magazine. Provides product reviews, solutions and articles for the systems security professional.
Secure Business Quarterly
Quarterly publication focused on digital security business issues, metrics, and investments. Published by @stake.
SuraSoft's Security FAQ
Provides questions and answers to the most commonly asked security questions without the techno words
The ISO 17799 Security Standard
Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard.
The Orange Book Site
Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out.
The Security Journal
Free, quarterly e-magazine offers a variety of articles for both information security managers and technical staff.
TheCyberPunk
A collection of network security tutorials. Users can add their own security tutorial to the collection.