Sans

Syndicate content SANS Information Security Reading Room
Last 25 Computer Security Papers added to the Reading Room
Updated: 6 years 18 weeks ago

Electronic Medical Records: Success Requires an Information Security Culture

Mon, 06/10/2013 - 23:43

Categories: HIPAA,Compliance

Paper Added: June 5, 2013

Categories: Security Articles

Analyzing Polycom® Video Conference Traffic

Mon, 06/10/2013 - 23:43

Category: Protocols

Paper Added: June 4, 2013

Categories: Security Articles

Corporate vs. Product Security

Mon, 06/10/2013 - 23:43

Categories: Best Practices,Incident Handling,Security Policy Issues,Management & Leadership

Paper Added: June 3, 2013

Categories: Security Articles

Securing BYOD With Network Access Control, a Case Study

Mon, 06/10/2013 - 23:43

Category: Network Access Control

Paper Added: May 23, 2013

Categories: Security Articles

Event Monitoring and Incident Response

Mon, 06/10/2013 - 23:43

Categories: Incident Handling,Intrusion Detection

Paper Added: May 15, 2013

Categories: Security Articles

Dead Linux Machines Do Tell Tales

Mon, 06/10/2013 - 23:43

Category: GIAC Honors Papers

Paper Added: May 15, 2013

Categories: Security Articles

Setting Up a Database Security Logging and Monitoring Program

Mon, 06/10/2013 - 23:43

Category: Application and Database Security

Paper Added: May 10, 2013

Categories: Security Articles

Managing the Implementation of a BYOD Policy

Mon, 06/10/2013 - 23:43

Category: Management & Leadership

Paper Added: May 8, 2013

Categories: Security Articles

Analysis of the building blocks and attack vectors associated with the Unified Extensible Firmware Interface (UEFI)

Mon, 06/10/2013 - 23:43

Category: Managed Services

Paper Added: May 2, 2013

Categories: Security Articles

Log2Pcap

Mon, 06/10/2013 - 23:43

Categories: Intrusion Detection,Forensics

Paper Added: May 1, 2013

Categories: Security Articles

Information Risks & Risk Management

Mon, 06/10/2013 - 23:43

Categories: Best Practices,Getting Started/InfoSec,Security Awareness,Security Policy Issues,Management & Leadership,Data Loss Prevention

Paper Added: May 1, 2013

Categories: Security Articles

Using IOC (Indicators of Compromise) in Malware Forensics

Mon, 06/10/2013 - 23:43

Categories: Incident Handling,Malicious Code,Forensics

Paper Added: April 22, 2013

Categories: Security Articles

Methodology for Firewall Reviews for PCI Compliance

Mon, 06/10/2013 - 23:43

Category: Auditing & Assessment

Paper Added: April 18, 2013

Categories: Security Articles

InfoWar: Cyber Terrorism in the 21st Century Can SCADA Systems Be Successfully Defended, or are They Our "Achilles Heel"?

Mon, 06/10/2013 - 23:43

Category: Information Warfare

Paper Added: April 16, 2013

Categories: Security Articles

Custom Full Packet Capture System

Mon, 06/10/2013 - 23:43

Category: Logging Technology and Techniques

Paper Added: April 16, 2013

Categories: Security Articles

Implementing a Vulnerability Management Process

Mon, 06/10/2013 - 23:43

Category: Threats/Vulnerabilities

Paper Added: April 16, 2013

Categories: Security Articles

Website Security for Mobile

Mon, 06/10/2013 - 23:43

Category: PDAs and Other Mobile Devices

Paper Added: April 16, 2013

Categories: Security Articles

Endpoint Security through Application Streaming

Mon, 06/10/2013 - 23:43

Category: Application and Database Security

Paper Added: March 25, 2013

Categories: Security Articles

Indicators of Compromise in Memory Forensics

Mon, 06/10/2013 - 23:43

Category: Forensics

Paper Added: March 25, 2013

Categories: Security Articles

Creating a Bastioned Centralized Audit Server with GroundWork Open Source Log Monitoring for Event Signatures

Mon, 06/10/2013 - 23:43

Category: Logging Technology and Techniques

Paper Added: March 25, 2013

Categories: Security Articles