Skip to main content

Home/ Information Security/ Group items tagged resources

Rss Feed Group items tagged

1More

Identity and Access Management: Explained in Detail - 0 views

  •  
    Identity and Access Management is an information security framework which focuses on the security of the digital identities in a workplace and enables an administrator to maintain control over the access to the company resources, both physical and digital
1More

SP-800-66-Revision1.pdf (application/pdf Object) - 0 views

  •  
    Introductory Resource Guide for Implementing HIPPA Security Rule
1More

Country Blocks - 4 views

  •  
    Great IP blocklist resource
1More

Infrastructure - Exigo Tech - 0 views

  •  
    At Exigo Tech, we understand the importance of data networks and infrastructure. Being the backbone for your business, we believe that your network should be dynamic and should enable you to seize opportunities as your company grows, while maximising resources.
1More

Forensickb Similar Sites | 50 Websites Like Forensickb.com - SimilarSiteSearch.com - 0 views

  •  
    computer forensic resources specific to ediscovery; EnCase Certification Experience
1More

Application Security in the Software Development Lifecycle Issues, Challenges and Solut... - 0 views

  •  
    This white paper will discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and how it helps cut down business cost and increase the level of organizational information security.
1More

Linux StepByStep - 0 views

  •  
    neat resource
3More

Denial of service denial | Science Blog - 3 views

  • However, current filters usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not. This consumes its resources and in the case of a massive DDoS can compound the problem.
  • The user's computer has to present a filter value for the server to do a quick check. The filter value is a one-time secret that needs to be presented with the pseudo ID. The pseudo ID is also one-time use. Attackers cannot forge either of these values correctly and so attack packets are filtered out.
  • Indeed, the IPACF takes just 6 nanoseconds to reject a non-legitimate information packet associated with the DoS attack.
1More

TrustedSource - Internet reputation system - 0 views

shared by John Li on 23 Aug 10 - Cached
    • John Li
       
      The reputation resource from trustedsource, now it's McAfee
1More

Psychology and Security Resource Page - 3 views

  •  
    Amazing collection of studies and papers about the security
1 - 14 of 14
Showing 20 items per page