|Wilders Forum||Information and advice to secure your pc.|
|Insecure.org||Fyodor's web site. Download NMap. Links to the Top 75 Security Tools.|
|Rainbow Series Library||Rainbow Series. Contains the Orange Book (TSEC), Red Book (TNI), Acqua Book (Glossary), and many others.|
|Microsoft's Security Home Page.|
Counterpane Systems is a Minneapolis-based consulting firm specializing in cryptography and computer security. Bruce Schneier Counterpane's president designed the Blowfish algorithm.
Also see Counterpane's analysis of Microsoft PPTP Version 2. Also includes their analysis of version 1 and a FAQ.
This is a nonprofit group that aims to learn the tools, tactics, and motives of the blackhat community and share these lessons learned.
An outstanding effort! SANs also has a whitepaper concerning the Honey Pot concept. Honey Pots and Honey Nets - Security through Deception
|NIH Security Page||This site, developed by the Center for Information Technology, National Institutes of Health, features general information about computer security. Information is organized by source and topic.||Antionline||
ABC News described this site as "A Rick's Cafe in the Casablanca world of hacking." (You remember
This site's published mission statement is "To educate the public on computer security related issues."
|packet storm||A large up to date library of information security information. Now, moved out of the US!|
|DShield||Information site. Distributed ID information.|
Security News Portal
|Security Organizations||Various security related sites.|
Pictures of people who have made a mark in any of the following: programmable computer systems,
computer networks, the Internet or security.
Note. Large page may load slow.
Securing your network demands constant vigilance, and the knowledge to know what to look for. Foundstone's mission is to provide that continuous security intelligence.
Tools, White Papers, and other information.
|Network Defense||Richard Power and Rik Farrow's Network Defense Columns. Originally done for Network Magazine.|
|History of Espionage||
History of Espionage, an easy, linkable reference to Spies (who got caught), their Agencies, Equipment and the Events that surrounded them.
Information involving cryptography.
|Handbook of Cryptography||A resource for professionals in both research and industry. Explains technical matters clearly and in detail.|
|Security Class Journal||
Fall 02 Security Class Log.
This is an effort to link to the most significant Information System Security articles published during the Fall 02.
|Security Class Journal||
Fall 03 Security Class Log.
This is an effort to link to the most significant Information System Security articles published during the Fall 03.