White Papers

View All RSS Feed

Last Updated on 14 Oct. 2015, Total: 1068 White Papers

26 Anti Spam
12 Anti Virus
56 Auditing
60 Auth. & Access Control
3 Content Management
103 Cryptography
12 Disaster Recovery
84 Firewalls & VPN's
6 Forensics
41 Harmless hacking book
1 Honeypots
14 Information Warfare
26 Intrusion Detection
8 Law
3 Managed Security Solutions
109 Misc
24 Mobile Code
32 NCSC&DoD Rainbow series
34 NetWare
33 Network Security
4 Patch Management
3 Phishing
49 Policy & Standards
25 Privacy
21 Software Engineering
2 Trojans
2 Underground
167 Unix Security
48 Web Security
54 Windows Security
6 Wireless Security
  1. Best Practices for Security Incident Response

    Are you prepared to make the best decisions and responses to security incidents in your business?... Read More

  2. How to protect from Spoofed/Forged Email

    CERT recommendations... Read More

  3. Presentation: Investigating and Prosecuting Network Intrusions

  4. Service Management Functions: Security Management (Part 2)

    The business world is increasingly reliant on technology to supply information and communications facilities to staff, partners, and customers. Securing organizational information and the systems that are used to manage and transmit data has become a high profile function. Failure to secure information can have a severe impact on business credibility... Read More

  5. To Outsource or Ally - What is the Difference?

    A current and increasing trend in business is to engage in relationships with external entities in order to achieve strategic goals or obtain synergistic benefits. Two of the more dominant expressions in modern business literature relating to this intermingling of enterprises are outsourcing and strategic alliance... Read More

  6. The Complete Windows Trojans Paper

    The Complete Trojans Text is a paper about Windows Trojans, how they work, their variations and, of course, strategies to minimise the risk of infection... Read More

  7. Maximum Security - Appendix A - How to Get More Information

  8. Design Principals for Tamper-Resistant Smart Card Processors

Featured Links