William Slater's CYBR 515 Blog

William Slater's CYBR 515 Blog
CYBR 515 - Security Architecture and Design

Friday, September 9, 2011

Post 007 - CYBR 515

Here are some good, free resources on Information Security topics:

Engineering Security

http://www.cs.auckland.ac.nz/~pgut001/pubs/book.pdf

COINTELPRO and the Subversion of Anonymous

http://www.sott.net/articles/show/234259-The-New-COINTELPRO-Cyberwarfare-hacktivists-and-the-Subversion-of-Anonymous

Reengineering Security

http://classic.marshall.usc.edu/assets/036/8598.pdf

Computer Security Accidents that Might Have Led to Nuclear War

http://nuclearfiles.org/menu/key-issues/nuclear-weapons/issues/accidents/20-mishaps-maybe-caused-nuclear-war.htm

IT Security and Audit Policies

http://it.delhigovt.nic.in/doit/IT_Security_Audit_Policy.pdf

Social Networking Treatise

http://www.law.cornell.edu/socsec/spring01/readings/martin.pdf

Introduction to Network Analysis

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597490733.pdf

PERL Scripting and Live Response

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/159749173X.pdf

Dumpster Diving

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597492159.pdf

Targeting Intellectual Property

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597492558.pdf

Open Source Security

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1597490741.pdf

Advanced Operators - Security Tactics

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/SecurityTactics/1597491764.pdf

Introducing NMAP

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1597492418.pdf

Vulnerability Assessment

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/OpenSourceSecurity/1931836086.pdf

Trademarks and Domain Names

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/9781597492560.pdf

Controls and Safeguards

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/9781597492393.pdf

Business Continuity/Disaster Recovery Plan Development

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597491721.pdf

Having Fun with Sysinternals

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597490792.pdf

Creating an Attack Lab

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597490113.pdf

Behind Cybercrime

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/1597490482.pdf

Incident Response - Live Forensics and Investigations

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/1597491330.pdf

Initial Triage and Live Response: Data Analysis

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Cybercrime/9781597492690.pdf

PDA, Blackberry, and iPod Forensics

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/Certification/9781597491976.pdf

Handheld Forensics

http://www.elsevierdirect.com/downloads/SyngressFreeE-booklets/ITManagement/1597491381.pdf

1 comment: