Search The Infography: 
The Infography

Computer Security -- Digital

The following sources are recommended by an expert whose research specialty is computer security.


 

Six Superlative Sources

· CERT/CC. Unit of the Software Engineering Institute (SEI), a federally funded research and development center at Carnegie Mellon University in Pittsburgh, that provides vulnerability analysis, incident handling, and information dissemination. http://www.cert.org/certcc.html

· F-Secure Security Center. News, hoax warnings, screen shots, and bulletins about new computer viruses. http://www.f-secure.com/security_center/

· InfoSysSec. Security and hacking guides, tutorials, downloads. http://www.infosyssec.com/

· InfraGuard. Public-private-sector organization to fight cyber and physical threats to critical infrastructures, with 80 local chapters and with industry and FBI representatives. http://www.infragard.net/

· Internet Storm Center. System that gathers millions of intrusion detection log entries from around the world to find new virus and worm attacks. http://isc.sans.org/

· McAfee AVERT Virus Information Library. Information viruses, how they infect systems, and how to remove them. http://vil.nai.com/vil/

Other Excellent Sources

· Central Command. Virus information for corporate and home users. http://www.centralcommand.com/index.html

· CIO: Security. Articles, book reviews, and reports. http://www.cio.com/topic/index/1419/1

· CISSP and SSCP Open Study Guides. Study guides, tips, and resources. http://www.cccure.org/

· Common Vulnerabilities and Exposures (CVE). List of standardized names for vulnerabilities and other information-security exposures. http://www.cve.mitre.org/

· Computer Associates Global Security Advisor. Detailed information on the latest viruses, worms, Trojans, and hoaxes. http://www.ca.com/us/securityadvisor/default.aspx

· GFI Security Labs. Virus threats, security tests, information about security. http://www.gfi.com/security/

· Information Security Magazine. Online magazine about computer security. http://searchsecurity.techtarget.com/magazineCurrent/

· Internet Security Review. Online magazine about computer security. http://www.isr.net/

· MessageLabs Intelligence. Information on email security threats. http://www.messagelabs.com/intelligence.aspx

· Microsoft Security Central. Security tools, documentation, tips, and other information regarding security for users, developers, and businesses. http://www.microsoft.com/security/default.mspx

· NIST Computer Security Resource Center. The National Institute of Standards and Technology's Computer Security Division provides information on security, awareness of IT risks, vulnerabilities, and protection requirements. http://csrc.ncsl.nist.gov/

· Panda Security Info. Information and resources about viruses. http://www.pandasecurity.com/homeusers/security-info/?

· SC Magazine. Online magazine about computer security. http://www.scmagazine.com/

· Security Magazine. Online magazine about computer security. http://www.securitymagazine.com/

· SecurityFocus. Extensive computer-security information. http://www.securityfocus.com/

· SecurityGeeks. Security, cryptography, and privacy news. http://securitygeeks.shmoo.com/

· Sophos: Security Information. Analysis, articles, and other computer-virus information. http://www.sophos.com/security/

· Symantec Security Response. Information on virus threats, security advisories, tools, and other security topics. http://www.symantec.com/security_response/

· Trend Micro Virus Information Center. News of viruses, an encyclopedia, security alerts, options to submit suspicious files. http://www.trendmicro.com/vinfo/

· U.S. Federal Trade Commission. Information on computer security and e-commerce. http://www.ftc.gov/bcp/conline/edcams/infosecurity/index.html

Search The Infography
 
Advanced Search

   Page Through The Infography Alphabetically   
Computer Graphics
   Computer Security -- Digital
Computer Software -- Modular Verification

About The Infography
published by Fields of Knowledge


Clicking this button will display the HTML code.

"The Infography about Computer Security and Malicious Code"
http://www.infography.com/content/506676504624.html
© 2009 Fields of Knowledge
Essex, Iowa 51638-4608 USA