IT Security Cookbook A guide to computer and network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators. http://www.boran.com/security/ Boran.com~Site InfoWhoisTrace RouteRBL Check
Policy Over Policing InfoWorld article - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success. http://archive.infoworld.com/cgi-bin/displayArchive.pl?/96/34/e01-34.55.htm Infoworld.com~Site InfoWhoisTrace RouteRBL Check
Information Security Program Development Security standards are needed by organizations because of the amount of information, the value of the information, and ease with which the information can be manipulated or moved. http://www.blackmagic.com/ses/bruceg/progmgt.html Blackmagic.com~Site InfoWhoisTrace RouteRBL Check
Best Practices in Network Security Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures. http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347 Symantec.com~Site InfoWhoisTrace RouteRBL Check
The Information Security Forum It has produced the standard to provide guidelines on all aspects of information security including IT, data, and computer controls. http://www.isfsecuritystandard.com Isfsecuritystandard.com~Site InfoWhoisTrace RouteRBL Check
What makes a good security policy and why is one necessary? Security does not come from automated applications, rather it is compromised of security applications or systems, processes and procedures and the personnel to implement both the systems and processes. In order to properly address security, the most fun http://www.giac.org/practical/Caroline_Reyes_GSEC.doc Giac.org~Site InfoWhoisTrace RouteRBL Check