SANS Information Security Reading Room

Syndicate content
SANS Information Security Reading Room
Last 25 Computer Security Papers added to the Reading Room
Updated: 10 years 35 weeks ago

A Model for Licensing IT Security

Tue, 08/06/2013 - 22:59

Category: Legal Issues

Paper Added: August 6, 2013

Categories: Security

Discovering Security Events of Interest Using Splunk

Tue, 08/06/2013 - 22:59

Category: Logging Technology and Techniques

Paper Added: July 17, 2013

Categories: Security

Practical Cyber Security Training Techniques for New IT Support Employees

Tue, 08/06/2013 - 22:59

Category: Best Practices

Paper Added: July 19, 2013

Categories: Security

Detecting Security Incidents Using Windows Workstation Event Logs

Tue, 08/06/2013 - 22:59

Category: Logging Technology and Techniques

Paper Added: July 9, 2013

Categories: Security

Security Best Practices for IT Project Managers

Tue, 08/06/2013 - 22:59

Category: Best Practices

Paper Added: June 24, 2013

Categories: Security

A Practical Social Media Incident Runbook

Tue, 08/06/2013 - 22:59

Category: Incident Handling

Paper Added: June 20, 2013

Categories: Security

Web Application Injection Vulnerabilities: A Web App's Security Nemesis?

Tue, 08/06/2013 - 22:59

Categories: Application and Database Security,Securing Code,Security Basics

Paper Added: June 14, 2013

Categories: Security

Electronic Medical Records: Success Requires an Information Security Culture

Tue, 08/06/2013 - 22:59

Categories: HIPAA,Compliance

Paper Added: June 5, 2013

Categories: Security

Corporate vs. Product Security

Tue, 08/06/2013 - 22:59

Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership

Paper Added: June 3, 2013

Categories: Security

Securing BYOD With Network Access Control, a Case Study

Tue, 08/06/2013 - 22:59

Category: Network Access Control

Paper Added: May 23, 2013

Categories: Security

Event Monitoring and Incident Response

Tue, 08/06/2013 - 22:59

Categories: Incident Handling,Intrusion Detection

Paper Added: May 15, 2013

Categories: Security

Dead Linux Machines Do Tell Tales

Tue, 08/06/2013 - 22:59

Category: GIAC Honors Papers

Paper Added: May 15, 2013

Categories: Security

Setting Up a Database Security Logging and Monitoring Program

Tue, 08/06/2013 - 22:59

Category: Application and Database Security

Paper Added: May 10, 2013

Categories: Security

Managing the Implementation of a BYOD Policy

Tue, 08/06/2013 - 22:59

Category: Management & Leadership

Paper Added: May 8, 2013

Categories: Security

Analysis of the building blocks and attack vectors associated with the Unified Extensible Firmware Interface (UEFI)

Tue, 08/06/2013 - 22:59

Category: Managed Services

Paper Added: May 2, 2013

Categories: Security

Log2Pcap

Tue, 08/06/2013 - 22:59

Categories: Intrusion Detection,Forensics

Paper Added: May 1, 2013

Categories: Security

Information Risks & Risk Management

Tue, 08/06/2013 - 22:59

Categories: Best Practices,Getting Started/InfoSec,Security Awareness,Security Policy Issues,Management & Leadership,Data Loss Prevention

Paper Added: May 1, 2013

Categories: Security

Using IOC (Indicators of Compromise) in Malware Forensics

Tue, 08/06/2013 - 22:59

Categories: Incident Handling,Malicious Code,Forensics

Paper Added: April 22, 2013

Categories: Security

Methodology for Firewall Reviews for PCI Compliance

Tue, 08/06/2013 - 22:59

Category: Auditing & Assessment

Paper Added: April 18, 2013

Categories: Security

Analyzing Polycom® Video Conference Traffic

Tue, 08/06/2013 - 22:59

Category: Protocols

Paper Added: June 4, 2013

Categories: Security

eXTReMe Tracker