Skip to main content

Home/ Information Security/ Group items tagged resource

Rss Feed Group items tagged

anonymous

Identity and Access Management: Explained in Detail - 0 views

  •  
    Identity and Access Management is an information security framework which focuses on the security of the digital identities in a workplace and enables an administrator to maintain control over the access to the company resources, both physical and digital
Rich Hintz

SP-800-66-Revision1.pdf (application/pdf Object) - 0 views

  •  
    Introductory Resource Guide for Implementing HIPPA Security Rule
Tsudo

Country Blocks - 4 views

  •  
    Great IP blocklist resource
vivektrivedi

Infrastructure - Exigo Tech - 0 views

  •  
    At Exigo Tech, we understand the importance of data networks and infrastructure. Being the backbone for your business, we believe that your network should be dynamic and should enable you to seize opportunities as your company grows, while maximising resources.
jamie sacks

Forensickb Similar Sites | 50 Websites Like Forensickb.com - SimilarSiteSearch.com - 0 views

  •  
    computer forensic resources specific to ediscovery; EnCase Certification Experience
loadperformance

Application Security in the Software Development Lifecycle Issues, Challenges and Solut... - 0 views

  •  
    This white paper will discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and how it helps cut down business cost and increase the level of organizational information security.
jamie sacks

Linux StepByStep - 0 views

  •  
    neat resource
wolf hesse

Denial of service denial | Science Blog - 3 views

  • However, current filters usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not. This consumes its resources and in the case of a massive DDoS can compound the problem.
  • The user's computer has to present a filter value for the server to do a quick check. The filter value is a one-time secret that needs to be presented with the pseudo ID. The pseudo ID is also one-time use. Attackers cannot forge either of these values correctly and so attack packets are filtered out.
  • Indeed, the IPACF takes just 6 nanoseconds to reject a non-legitimate information packet associated with the DoS attack.
John Li

TrustedSource - Internet reputation system - 0 views

shared by John Li on 23 Aug 10 - Cached
    • John Li
       
      The reputation resource from trustedsource, now it's McAfee
Tsudo

Psychology and Security Resource Page - 3 views

  •  
    Amazing collection of studies and papers about the security
1 - 14 of 14
Showing 20 items per page