SANS Information Security Reading Room

Syndicate content
SANS Information Security Reading Room
Last 25 Computer Security Papers added to the Reading Room
Updated: 10 years 36 weeks ago

InfoWar: Cyber Terrorism in the 21st Century Can SCADA Systems Be Successfully Defended, or are They Our "Achilles Heel"?

Tue, 08/06/2013 - 22:59

Category: Information Warfare

Paper Added: April 16, 2013

Categories: Security

Custom Full Packet Capture System

Tue, 08/06/2013 - 22:59

Category: Logging Technology and Techniques

Paper Added: April 16, 2013

Categories: Security

Implementing a Vulnerability Management Process

Tue, 08/06/2013 - 22:59

Category: Threats/Vulnerabilities

Paper Added: April 16, 2013

Categories: Security

Website Security for Mobile

Tue, 08/06/2013 - 22:59

Category: PDAs and Other Mobile Devices

Paper Added: April 16, 2013

Categories: Security

Endpoint Security through Application Streaming

Tue, 08/06/2013 - 22:59

Category: Application and Database Security

Paper Added: March 25, 2013

Categories: Security

SANSFIRE 2011

Tue, 08/06/2013 - 22:59
SANSFIRE 2011
Categories: Security

Indicators of Compromise in Memory Forensics

Fri, 07/19/2013 - 21:42

Category: Forensics

Paper Added: March 25, 2013

Categories: Security

Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures

Fri, 07/19/2013 - 18:26

Category: Logging Technology and Techniques

Paper Added: March 25, 2013

Categories: Security

Detecting DNS Tunneling

Tue, 07/09/2013 - 21:37

Category: DNS Issues

Paper Added: March 25, 2013

Categories: Security

AirNIDS: The Need for Intrusion Detection on the Wireless Ether

Tue, 06/25/2013 - 01:37

Category: Intrusion Detection

Paper Added: March 19, 2013

Categories: Security

Beating the IPS

Thu, 06/20/2013 - 21:53

Category: Intrusion Prevention

Paper Added: March 15, 2013

Categories: Security

Implementing Redmine for Secure Project Management

Fri, 06/14/2013 - 21:33

Category: Penetration Testing

Paper Added: March 15, 2013

Categories: Security

Web Log Analysis and Defense with Mod_Rewrite

Thu, 06/06/2013 - 00:05

Category: Intrusion Prevention

Paper Added: March 15, 2013

Categories: Security

Windows Logon Forensics

Tue, 06/04/2013 - 17:14

Category: Forensics

Paper Added: March 15, 2013

Categories: Security

Project Management Approach to Yearly PCI Compliance Assessment

Thu, 05/23/2013 - 18:26

Category: Compliance

Paper Added: February 19, 2013

Categories: Security

Securing BYOD With Network Access Control, a Case Study

Thu, 05/16/2013 - 00:24

Category: PDAs and Other Mobile Devices

Paper Added: April 11, 2013

Categories: Security

Forensic Analysis on iOS Devices

Wed, 05/15/2013 - 18:43

Category: Forensics

Paper Added: January 25, 2013

Categories: Security

Monitoring Network Traffic for Android Devices

Sat, 05/11/2013 - 02:41

Category: Intrusion Detection

Paper Added: January 25, 2013

Categories: Security

What's Running on Your Network?

Wed, 05/08/2013 - 20:31

Category: Intrusion Detection

Paper Added: January 25, 2013

Categories: Security

Using the Center for Internet Security (CIS) Benchmarks to Support an Information Security Management System

Thu, 05/02/2013 - 20:50

Category: ISO-17799

Paper Added: January 25, 2013

Categories: Security

eXTReMe Tracker