Acceptable Use Policy Report
[ http://members.iinet.net.au/~colinwee/mbt/acceptableuse/ ]
Provides a free report on the Acceptable Use Policy as well as a case study and guide for designing your own.
[ http://en.wikipedia.org/wiki/Defensive_programming ]
Looks at the concept of defensive programming. Gives a general ideal into the method as well as more specific examples.
Do you have an intrusion detection response plan?
[ http://www.networkworld.com/newsletters/sec/0913sec1.html ]
Online discussion in relating to how to create an intrusion detection plan, what the content should be and the results.
Mobile Authentication Technologies
[ http://www.mobileauthenticationtechnologies.com ]
Mobile Authentication Technologies offers mobile security and authentication solutions using smart cards, biometrics, FIDO U2F and tokens for iOS and Android. User-friendly mobile security.
[ http://www.packetdefense.com/ ]
Information security resource containing extensive information on biometrics, viruses, vpns, firewalls, web site security, BS7799, ISO 17799, and more.
[ http://www.geeksonsitevirusinfo.com/how-geeks-on-site-can-help/ ]
Find information about viruses, where they come from, how they work and what you can do to prevent an attack. This information is brought to you by Geeks On Site.
[ http://searchsecurity.techtarget.com/ ]
Offers information security information, news and tips.
Secure Programming Techniques
[ http://www.onlamp.com/pub/a/onlamp/excerpt/PUIS3_chap16/index1.html ]
Is a series of extracts from computer software literature such as Practical Unix and Internet Security, 3rd Edition.
Security+ Classes Maryland
[ http://www.securityplusclasses.com/maryland-training/ ]
Security+ certification training courses in Maryland. Request schedule, pricing and location information online.
[ http://www.venafi.com/asymmetric-key-management/ ]
Venafi is a market leader and creator of enterprise security systems. We specialize in enterprise key and certificate management (EKCM) solutions for businesses worldwide.