SANS Reading Room

Syndikovat obsah SANS Information Security Reading Room
Last 25 Computer Security Papers added to the Reading Room
Aktualizace: 10 let 34 týdny zpět

A Model for Licensing IT Security

6 Srpen, 2013 - 22:00

Category: Legal Issues

Paper Added: August 6, 2013

Kategorie: Hacking & Security

Discovering Security Events of Interest Using Splunk

6 Srpen, 2013 - 22:00

Category: Logging Technology and Techniques

Paper Added: July 17, 2013

Kategorie: Hacking & Security

Practical Cyber Security Training Techniques for New IT Support Employees

6 Srpen, 2013 - 22:00

Category: Best Practices

Paper Added: July 19, 2013

Kategorie: Hacking & Security

Detecting Security Incidents Using Windows Workstation Event Logs

6 Srpen, 2013 - 22:00

Category: Logging Technology and Techniques

Paper Added: July 9, 2013

Kategorie: Hacking & Security

Security Best Practices for IT Project Managers

6 Srpen, 2013 - 22:00

Category: Best Practices

Paper Added: June 24, 2013

Kategorie: Hacking & Security

A Practical Social Media Incident Runbook

6 Srpen, 2013 - 22:00

Category: Incident Handling

Paper Added: June 20, 2013

Kategorie: Hacking & Security

SANSFIRE 2011

6 Srpen, 2013 - 22:00
SANSFIRE 2011
Kategorie: Hacking & Security

Web Application Injection Vulnerabilities: A Web App's Security Nemesis?

6 Srpen, 2013 - 22:00

Categories: Application and Database Security,Securing Code,Security Basics

Paper Added: June 14, 2013

Kategorie: Hacking & Security

Electronic Medical Records: Success Requires an Information Security Culture

6 Srpen, 2013 - 22:00

Categories: HIPAA,Compliance

Paper Added: June 5, 2013

Kategorie: Hacking & Security

Corporate vs. Product Security

6 Srpen, 2013 - 22:00

Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership

Paper Added: June 3, 2013

Kategorie: Hacking & Security

Securing BYOD With Network Access Control, a Case Study

6 Srpen, 2013 - 22:00

Category: Network Access Control

Paper Added: May 23, 2013

Kategorie: Hacking & Security

Analyzing Polycom® Video Conference Traffic

6 Srpen, 2013 - 22:00

Category: Protocols

Paper Added: June 4, 2013

Kategorie: Hacking & Security

Event Monitoring and Incident Response

6 Srpen, 2013 - 22:00

Categories: Incident Handling,Intrusion Detection

Paper Added: May 15, 2013

Kategorie: Hacking & Security

Dead Linux Machines Do Tell Tales

6 Srpen, 2013 - 22:00

Category: GIAC Honors Papers

Paper Added: May 15, 2013

Kategorie: Hacking & Security

Setting Up a Database Security Logging and Monitoring Program

6 Srpen, 2013 - 22:00

Category: Application and Database Security

Paper Added: May 10, 2013

Kategorie: Hacking & Security

Managing the Implementation of a BYOD Policy

6 Srpen, 2013 - 22:00

Category: Management & Leadership

Paper Added: May 8, 2013

Kategorie: Hacking & Security

Log2Pcap

6 Srpen, 2013 - 22:00

Categories: Intrusion Detection,Forensics

Paper Added: May 1, 2013

Kategorie: Hacking & Security

Information Risks & Risk Management

6 Srpen, 2013 - 22:00

Categories: Best Practices,Getting Started/InfoSec,Security Awareness,Security Policy Issues,Management & Leadership,Data Loss Prevention

Paper Added: May 1, 2013

Kategorie: Hacking & Security

Using IOC (Indicators of Compromise) in Malware Forensics

6 Srpen, 2013 - 22:00

Categories: Incident Handling,Malicious Code,Forensics

Paper Added: April 22, 2013

Kategorie: Hacking & Security