January 2006
the Red-Library
by xenomorph (via)Access Control
Affiliates
Auditing
Authentication
C.A.D.
Computer Crime
Confidentiality
Cryptography
E-Books
HAWT!!
E-Commerce
Graphic Art
Hot!!
Hacking/Phreaking
Honeypots/Honeynets
Hostile Code
Incident Handling
Information Warfare
Internet Law
Intrusion Detection
IRC
IT Education
Missions Network
Take More Action(21)
Networking
Operating Systems
PC Modding
Proxies
HOT!!!
RFC
Science Articles
New Topic!!
Security
Shell Accounts
Software
Software Programming
Standards
Symposiums & Proceedings
Technology Articles
New Topic!!
Vulnerabilities
Wireless Articles
New Topic!!
World Affairs
New Topic!!
December 2005
October 2005
September 2005
CVE Reference Maps
by xenomorphThe following information sources publish documents that are used
as references for CVE entries and candidates. Click on the source
to view a map from the source's references to the associated CVE
names.
US-CERT RSS Channels
by xenomorphUS-CERT publishes a number of XML RSS 1.0 feeds containing
headlines about recently published US-CERT documents. RSS, or RDF Site Summary, allows web publishers to access constantly updated information from other web sites. For example, US-CERT provides an RSS feed for its Cyber Security Tips channel that web publishers can access. By installing calls to the US-CERT RSS files into their web sites, web publishers can ensure that their sites include up-to-date computer security information that is available on the US-CERT site.
August 2005
Information Security Glossary
by xenomorph- The Information Security Policies Glossary
Welcome to the glossary of information security and computing terms and phrases. This resource will hopefully prove to be useful in helping you to understand the jargon and terminology used within the information security industry and sector.
1
(8 marks)