|
Digital Security and Privacy
- Security Information
Information and news about security on the Internet,
Software and Application Security.
- Entities and Centers
Entities and centers on Internet security, Certification for security professionals,
Vendor security information centers, Security Professional Certification.
- Cryptography
Cryptography, Public-Key, Hash Algorithms, MAC, Digital Signature.
- PKI
Digital signature, Digital certificate, Public Key Infrastructure (PKI),
Certification Authority (CA), Registration Authority (RA).
- Malware
Virus, Anti-Virus, Virus Hoaxes, Chain Letters.
Spyware, anti-spyware, adware, keyloggers.
Phishing Scam - Internet Frauds.
- E-Mail Security
Spam - Unsolicited Junk E-mail, Spam Black-Lists, Software Anti-Spam for
Users and E-mail Clients, Software for scanning against virus and spam
on email gateway servers.
- Firewall
Firewall. Tools for Network firewall and Personal firewall.
- Intrusion Prevention & Detection
Network Monitoring, Intrusion Prevention Systems (IPS) & Intrusion
Detection Systems (IDS). Log Analysis.
- Standards
Security Standards: ISO/IEC 15408 - Common Criteria (CC),
ISO/IEC 27000 series, ISO/IEC 17799 (British Standard BS7799).
Public-Key Cryptography and Digital Signature Standards: PKCS, CMS,
Advanced Electronic Signatures (CAdES, XAdES, PAdES).
-
Protocols & Applications
Cryptographic Tunneling in Networks: SSH - Secure Shell, TLS & SSL, VPN, IPsec.
Cryptographic Hash & Message Digest: MD5, SHA/SHS, HMAC.
Public-Key Cryptography: S/MIME, PGP - Pretty Good Privacy.
Secret-Key Cryptography: AES.
Authentication & Access Control: Kerberos, SOCKS, PAM, SGC.
- Privacy
Privacy on the Internet and outside it.
- Hacker
Hacker. Vulnerabilities, Threats, Attacks. War Games.
- Books
Books on Network security, Computer security, Cryptography, Firewalls.
- Security Topics
XML Security, Law and Security, CGI Security.
|