From HORSE - Holistic Operational Readiness Security Evaluation.
Information Security Research Resources
- Best Practices Research Reports
- A sampling of industry-leading published articles, research reports, and presentations from many security professionals. Topics include public key infrastructure (PKI), incident response, secure architecture, and protecting web applications.
- Recommended Links
- Links to categories of Internet resources on Information Security, such as FAQs (on cryptography, hacking, firewalls, etc.) and Tools (on IP Filter, Logsurfer, TCP Wrapper, etc.)
- Links to helpful or interesting information security documents.
- Links to freely available security tools that are useful for auditing and securing applications, networks, and systems. Care should be taken when running these tools on production systems or networks.