X hits on this document

PDF document

SRA111: Introduction to Security and Risk Analysis - page 15 / 15

86 views

0 shares

0 downloads

0 comments

15 / 15

Appendix C: Selected Web Links

  • Center for Information Assurance at Penn State. http://net1.ist.psu.edu/cica/

  • CERT Coordination Center, Carnegie Mellon University. http://www.cert.org/

  • CERT Virtual Training Environment. https://vte.cert.org/aboutvte.html

  • CIA, Criminal Intelligence Analysis, Interpol. http://www.interpol.int/Public/cia/default.asp.

  • CIA, Financial and high-tech crimes, Interpol. http://www.interpol.int/Public/FinancialCrime/Default.asp

  • Computer Forensics, Cybercrime and Steganography Resources. http://www.forensics.nl/

  • Computer Security Resources Center (CSRC), National Institute of Standard and Technology (NIST). http://csrc.nist.gov/

  • Dan Farmer and Wietse Venema, Forensic Discovery, Addison-Wesley, http://www.porcupine.org/forensics/forensic-discovery/

  • History of Computer Security, Computer Security Division, National Institute of Standards and Technology (NIST). http://csrc.nist.gov/publications/history/

  • IAPP – International Association of Privacy Professionals: https://www.privacyassociation.org/

  • ICSA Information Security Magazine. http://informationsecurity.techtarget.com/

  • Identity Theft Resources. http://www.privacyrights.org/identity.htm

  • Information and Computer Security Resources, SANS.org. http://www.sans.org/resources/

  • ISACA: http://www.isaca.org/

  • IT Audit – The Institute of Internal Auditors, http://www.theiia.org/ITAudit/

  • IWS- The Information Warfare Site. http://www.iwar.org.uk/cip/

  • Network Security Library. http://www.windowsecurity.com/whitepaper/

  • National Coordination Office for Networking and Information Technology Research and Development (NITRD). http://www.nitrd.gov/pubs/

  • Privacy.Org: http://privacy.org/

  • Richards J. Heuer, Jr., Psychology of Intelligence Analysis, Center for the Study of Intelligence, Central Intelligence Agency,

    • 1999.

      http://www.cia.gov/csi/books/19104/index.html

  • Security and Risk Analysis (http://www.cert.org/octave/methodintro.html)

  • Wikipedia, the Free Encyclopedia. http://en.wikipedia.org/wiki/

  • Wireless LAN Security & Wardriving (http://www.wardrive.net/)

  • ZDNet: Security White Papers, Webcast, and Case Studies. http://whitepapers.zdnet.com/search.aspx?kw=Security http://whitepapers.zdnet.com/search.aspx?&kw=Security&dtid=2

15

Document info
Document views86
Page views87
Page last viewedSun Jan 22 23:06:49 UTC 2017
Pages15
Paragraphs335
Words2813

Comments