Computers » Security

Security

Acceptable Use Policy Report
[ http://members.iinet.net.au/~colinwee/mbt/acceptableuse/ ]

Provides a free report on the Acceptable Use Policy as well as a case study and guide for designing your own.

Defensive Programming
[ http://en.wikipedia.org/wiki/Defensive_programming ]

Looks at the concept of defensive programming. Gives a general ideal into the method as well as more specific examples.

Do you have an intrusion detection response plan?
[ http://www.networkworld.com/newsletters/sec/0913sec1.html ]

Online discussion in relating to how to create an intrusion detection plan, what the content should be and the results.

Mobile Authentication Technologies
[ http://www.mobileauthenticationtechnologies.com ]

Mobile Authentication Technologies offers mobile security and authentication solutions using smart cards, biometrics, FIDO U2F and tokens for iOS and Android. User-friendly mobile security.

Packet Defense
[ http://www.packetdefense.com/ ]

Information security resource containing extensive information on biometrics, viruses, vpns, firewalls, web site security, BS7799, ISO 17799, and more.

Remove Virus
[ http://www.geeksonsitevirusinfo.com/how-geeks-on-site-can-help/ ]

Find information about viruses, where they come from, how they work and what you can do to prevent an attack. This information is brought to you by Geeks On Site.

SearchSecurity.com
[ http://searchsecurity.techtarget.com/ ]

Offers information security information, news and tips.

Secure Programming Techniques
[ http://www.onlamp.com/pub/a/onlamp/excerpt/PUIS3_chap16/index1.html ]

Is a series of extracts from computer software literature such as Practical Unix and Internet Security, 3rd Edition.

Security+ Classes Maryland
[ http://www.securityplusclasses.com/maryland-training/ ]

Security+ certification training courses in Maryland. Request schedule, pricing and location information online.

Venafi
[ http://www.venafi.com/asymmetric-key-management/ ]

Venafi is a market leader and creator of enterprise security systems. We specialize in enterprise key and certificate management (EKCM) solutions for businesses worldwide.