 |
IT Security Cookbook
A guide to computer and network security with a strong focus on writing and implementing security policy. This is primarily for security managers and system administrators.
http://www.boran.com/security/
Boran.com ~
Site Info
Whois
Trace Route
RBL Check
|
 |
Policy Over Policing
InfoWorld article - It's easy to develop e-mail and Internet policies, but education and documentation are crucial to their success.
http://archive.infoworld.com/cgi-bin/displayArchive.pl?/96/34/e01-34.55.htm
Infoworld.com ~
Site Info
Whois
Trace Route
RBL Check
|
 |
Best Practices in Network Security
Knowing how and what to protect and what controls to put in place is difficult. It takes security management, including planning, policy development and the design of procedures.
http://enterprisesecurity.symantec.com/article.cfm?articleid=42&PID=372347
Symantec.com ~
Site Info
Whois
Trace Route
RBL Check
|
|
|
|