The ISO 17799 Security Standard - Publication of ISO 17799 provided a milestone in the evolution of information security. This site provides background, information and resources on this important standard. - http://17799.macassistant.com
Lenny Zeltser - Article examining the evolution of malicious agents by analyzing features and limitations of popular viruses, worms, and trojans, detailing the possibility of a new breed of malicious agents currently being developed on the Internet. - http://www.zeltser.com/malicious-agents/
Information Systems Security Journal - Monthly print magazine for information security managers and others responsible for the daily, efficient operation of security policies, procedures, standards, and practices. - http://www.infosectoday.com/
CSO (Chief Security Officer) Magazine - Provides information security executives with high-level information, best practices and strategic insight. - http://www.csoonline.com/
Infosecurity Today Magazine - Infosecurity Today focuses on the practical experiences of IT security professionals, provides analysis of current tends, independent reporting, and more. - http://www.infosecurity-magazine.com
CSOinformer - Monthly newsletter targeted at people who need a strategic, multi-year view of the information security industry. - http://reavis.org/informer.shtml
SC Magazine - Online - Online counterpart to Secure Computing monthly magazine. Provides product reviews, solutions and articles for the systems security professional. - http://www.scmagazine.com/
Crypto-Gram - Monthly e-mail newsletter written by Bruce Schneier. Back issues available on site. - http://www.schneier.com/crypto-gram.html
Computers at Risk: Safe Computing in the Information Age - Complete text of the book by the System Security Study Committee, National Research Council, U.S, that presents a comprehensive agenda for developing nationwide policies and practices for computer security. - http://www.nap.edu/catalog/1581.html
ACM Crossroads Student Magazine - Column: Security for Wide-Area Internet Routing. Nick Feamster. - http://www.acm.org/crossroads/columns/onpatrol/november00.html
The Orange Book Site - Contains a summary of the DoD's "Trusted Computer System Evaluation Criteria" (Orange Book) - if you've ever wondered what a C2 security rating is, this is the place to find out. - http://www.dynamoo.com/orange
Information Security Statistics - Provides a central repository for computer crime and Internet security statistics, reports, trends, and news. Also has numerous security awareness tools, including an online industry best practice password strength meter. - http://www.securitystats.com
Cipher - the Electronic Newsletter of the IEEE Computer Society Technical Committee on Security and Privacy. - http://www.ieee-security.org/cipher.html
ACM Crossroads Security feature articles - ACM Crossroads is the student magazine of the Association for Computing Machinery. Crossroads has published several articles about computer security, as listed in this index. - http://www.acm.org/crossroads/doc/indices/features.html#Security
NIST Computer Security Resource Clearinghouse - The Computer Security Resource Clearinghouse (CSRC) is designed to collect and disseminate computer security information and resources to help users, systems administrators, managers, and security professionals better protect their data and systems. - http://csrc.ncsl.nist.gov
Introduction to Network Security - A gentle introduction to the complex topic of network security. Geared especially toward those new to security, including end users and management. - http://www.interhack.net/pubs/network-security/
Designing Secure Software - A methodology for avoiding the security holes that drive you mad, an article from SunWorld. - http://www.sun.com/sunworldonline/swol-04-1998/swol-04-security.html