* All About ISOC: Conferences - NDSS
* Anonymous remailer @ Wikipedia
* AntiOnline " Maximum Security for a Connected World: Info on C... DDOS attacks, Encryption, Hot Fixes, Security News and More!!"
* Apple.com Security-announce Info Page
* Article : "30 Lies About Secure Electronic Commerce: The Truth Exposed"
* Article : "50 Ways to Defeat Your Firewalls"
* Article : "50 Ways to Defeat Your Intrusion Detection System"
* Article : "50 Ways to Defeat Your PKI and Other Cryptosystems"
* Article : "50 Ways to Protect Your Information Assets When Cruising the Internet"
* Article : "Acoustic Surveillance of Physically Unmodified PCs" .PDF @ seclab.uiuc.edu
* Article : Anonymity Bibliography - Anonymous Communication @ freehaven.net
* Article : "A Review of TEMPEST Legal Issues" @ Cryptome.org
* Article : "Assessment of Access Control Systems" @ NIST.gov .PDF
* Article : "Deception for Protection"
* Article : "Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems" .PDF file
* Article : "Emissions from Bank Computer Systems Make Eavesdropping Easy, Expert Says" @ Cryptome.org
* Article : "Encrypt your web browsing session (with an SSH SOCKS proxy)" @ Lifehacker.com
* Article : "Five Stages of Violent Crime"
* Article : "Guidance for Securing Microsoft Windows XP Home Edition: A NIST Security Configuration Checklist" @ NIST.gov
* Article : "Guide to Computer Security Log Management" @ NIST.gov .PDF
* Article : "Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities" @ NIST.gov .PDF
* Article : idemix (identity mixer) "an anonymous credential system (or pseudonym system) that we are developing here." @ zurich.ibm.com - security - idemix
* Article : "Information Security Handbook Harvard University Version 2, November 1991"
* Article : "Information Warfare"
* Article : "InfoSec Baselines"
* Article : IPv6 testing howto force use and much more @ afraid.org
* Article : LASER Microphone @ williamson-labs.com
* Article : "Managing Network Security"
* Article: "Mitnick - The Art Of Intrusion" "Ch 1 - Hacking The Casinos For A Million Bucks"
* Article : Navy Handbook for the Computer Security Certification of Trusted Systems
* Article : "OpenSSH key management, Part 1" @ IBM.com
* Article : "OpenSSH key management, Part 2" @ IBM.com
* Article : "OpenSSH key management, Part 3" @ IBM.com
* Article : "Optical Emission Security FAQ" @ cl.cam.ac.uk
* Article : "Practical Aspects of Modern Cryptography" CSE P 590TU Winter 2006
* Articles: Dan Frankowski - Publications
* Article : "Secrets of Computer Espionage: Tactics and Countermeasures" @ wiley.com
* Article : Security Engineering - A Guide to Building Dependable Distributed Systems .PDF
* Article : "Set up a personal, home SSH server" @ Lifehacker.com
* Article : Trusted Computing @ Wikipedia
* Article : "Working with or around Bogus DNS" @ crash-override.net
* Article : "You Are What You Say: Privacy Risks of Public Mentions" .PDF file
* Black Hat Briefings, Training and Consulting
* "Book List of all cool things to know" @ defcon.org
* cDc communications - Cult of The Dead Cow
* Cipher: "The Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy"
* Cisco.com Products & Services Security Advisories
* COINTELPRO @ Wikipedia
* Computer surveillance @ Wikipedia
* CriticalSecurity.com "Free security planning template, links, and white papers: Computer Security, Internet Security and Network Security"
* Crypto-Gram Newsletter
* Digital signature @ Wikipedia
* Economic And Competitive Intelligence
* Electromagnetic pulse @ Wikipedia
* EPIC "Tools for Protecting Online Privacy"
* Faraday cage @ Wikipedia
* Federation of American Scientists
* Fork bomb @ Wikipedia
* Gibson Research Corporation
* Hacker's Choice, The :: THC
* Home Security, Burglary Prevention, Chris McGoey, home security expert
* Home Security News
* Honeypot (computing) @ Wikipedia
* .htaccess @ Wikipedia
* Identity Theft Resource Center
* IEEE Symposium on Security and Privacy
* Interest Groups in Criminal Justice
* Internet Firewalls Frequently Asked Questions
* Internet Notes, including RFCs, FYIs, STDs, and IMRs.
* Internet protocol suite @ Wikipedia
* Internet Resources for Intelligence Analysis
* Internet Security Mega-site
* ISC DHCP
* List of TCP and UDP port numbers @ Wikipedia
* MAC address @ Wikipedia
* Media Archives @ defcon.org
* Military Intelligence
* MIT PGP Key Server
* National Security Archive, The @ gwu.edu
* NSWC Dahlgren Lab - WWW Information System Assurance Site
* NSWC Shadow IDS WWW Information System Assurance Site
* NTBugtraq - NTBugtraq Home
* Officer.com discussion forums
* OpenID @ Wikipedia
* Panopticon @ Wikipedia
* PhotoRec @ cgsecurity.org "PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from Hard Disks and CDRom and lost pictures (Photo Recovery) from digital camera memory. PhotoRec ignores the filesystem and goes after the underlying data, so it'll work even if your media's filesystem is severely damaged or formatted. PhotoRec is safe to use, it will never attempt to write to the drive or memory support you are about to recover lost data from."
* port ip lookup @ SANS Internet Storm Center; Cooperative Network Security Community - Internet Security - isc search in top right hand corner of page
* Port-numbers - iana.org
* Proxy server @ Wikipedia
* RFIDvirus.org - "RFID Viruses and Worms"
* RISKS-LIST: RISKS-FORUM Digest
* Ronald L. Rivest "Cryptography and Security"
* Rootkit @ Wikipedia
* Schneier on Security
* SecLists.Org Security Mailing List Archive
* Security and Counterintelligence Links
* Security+Encryption Links @ cs.auckland.ac.nz
* SecurityFocus.com Mailing Lists
* Side channel attack @ Wikipedia
* Spamhaus Project, The
* Steganography @ Wikipedia
* Stopping Spambots: A Spambot Trap - by Neil Gunton
* Strategic Intelligence
* Sygate Security Scan
* Tempest for Eliza
* TEMPEST Information Page, The Complete, Unofficial
* TEMPEST @ Wikipedia
* U.S. DOE-CIAC (Computer Incident Advisory Capability)
* USENIX Conferences Calendar
* Van Eck phreaking @ Wikipedia
* Wired Equivalent Privacy - WEP @ Wikipedia
* Wireless Application Protocol - WAP @ Wikipedia
* Zone Labs Security Scanner
Page generated on Mon May 7 07:37:17 2007