Security Papers II



Network Security Best Practices
http://cisco.com/warp/public/126/secpol.html

Secure Operating System
http://www.jya.com/paperF1.htm

Virus in UNIX Networks
http://www.cybersoft.com/whitepapers/papers/print/networks_print.html

Linux Network Security
http://www.tldp.org/HOWTO/Security-HOWTO/

Spyware, Adware Security
http://ww2.websense.com/docs/whitepapers/spywareyouprobablyhaveit.pdf

Network Security Whitepapers
http://www.securitydocs.com/

Sun Software White Papers
http://www.sun.com/software/whitepapers/index.xml

Virus, Malicious Code Protection for Wireless Devices
http://download.antivirus.com/ftp/white/wireless_protection022801.doc

Instant Messaging Security, privacy tips
http://www.microsoft.com/athome/security/online/imsafety.mspx

Network Security Issues
http://download.zonelabs.com/bin/media/pdf/Hurwitz_wp.pdf

Email exploit detection engine
http://secinf.net/anti_virus/why_you_need_an_email_exploit_detection_en

Collection of Network Security Whitepapers and Presentations
http://cyber.com/section.php?section=papers

Why Phishing Works
http://people.deas.harvard.edu/~rachna/papers/why_phishing_works.pdf

Trojan White Paper
http://whitepapers.zdnet.com/whitepaper.aspx?docid=235631&promo=100202

Antivirus Vendor Whitepapers
http://antivirus.about.com/od/vendorwhitepapers/

Window Security Whitepapers
http://www.windowsecurity.com/whitepaper/misc/

enjoy! (:
Security Papers II Security Papers II Reviewed by Kembolle Amilkar on domingo, agosto 05, 2012 Rating: 5

Nenhum comentário