Topics: Computers : Security

Concerns the protection of system resources and data from unauthorized use or access in stand alone or networked environments.Security measures are implemented through a combination of software, hardware and physical restrictions. They can operate across different selections of content from individual files up to an entire networked enterprise.

Advisories and Patches Advisories and Patches View: News Rack - Sub-Categories - DMoz
Advisories and patches relating to security issues.
Vendor Alert Subscriptions, Vendor Releases, More »

Authentication Authentication View: News Rack - Sub-Categories - DMoz
Authentication is the method a computer uses to ensure that you are who you say you are.
Access Control Hardware, Kerberos, One Time Passwords, RADIUS, Single Sign-On, More »

Biometrics Biometrics View: News Rack - Sub-Categories - DMoz
Biometric authentication is the science of verifying a person's identity based on personal characteristics, such as voice, facial characteristics and fingerprints.
Companies, Face Recognition, Fingerprint Recognition, Iris Recognition, Organizations, More »

Chats and Forums Chats and Forums View: News Rack - Sub-Categories - DMoz
Interactive, real-time online chat rooms, bulletin boards, discussion groups, and message boards relating to Computer Security.
More »

Conferences Conferences View: News Rack - Sub-Categories - DMoz
Conferences on computer security and related issues.
More »

Consultants Consultants View: News Rack - Sub-Categories - DMoz
Security consultants generally give advice regarding security, crime prevention, and loss prevention. True security consultants are independent and non-product affiliated.This category includes information systems related consulting services in environmental design, security system design and specification, access control, physical security, protection of assets, theft prevention, crime prevention, loss prevention, executive protection, information security, special event security, emergency and disaster planning, and security training.
Forensics and Incident Response, General and Freelance, Managed Security Service Providers, Penetration Testing, Training, More »

Directories Directories View: News Rack - Sub-Categories - DMoz
Lists of computer security related sites or software, sometimes with a brief description and not, generally, including additional information.
More »

FAQs, Help, and Tutorials FAQs, Help, and Tutorials View: News Rack - DMoz

Firewalls Firewalls View: News Rack - Sub-Categories - DMoz
FAQs, Help, and Tutorials, Products, Reviews, More »

Honeypots and Honeynets Honeypots and Honeynets View: News Rack - DMoz

Internet Internet View: News Rack - Sub-Categories - DMoz
The Internet is an insecure place. - a common view of security on the Internet.
Privacy, Products and Tools, Research, Services, WWW, More »

Intrusion Detection Systems Intrusion Detection Systems View: News Rack - Sub-Categories - DMoz
Intrusion detection systems, sometimes referred to as IDS, are tools or methods for detecting when a network or computer has been subject to unauthorized access.
FAQs, Help, and Tutorials, Products and Tools, Research, More »

Mailing Lists Mailing Lists View: News Rack - DMoz

Malicious Software Malicious Software View: News Rack - Sub-Categories - DMoz
Malicious Software (also known as malware) refers to viruses, trojans, worms, spyware, and similar threats.
Historic, Reference, Spyware and Adware, Trojan Horses, Viruses, More »

News and Media News and Media View: News Rack - Sub-Categories - DMoz
Sites offering general computer security news.
Magazines and E-zines, More »

Organizations Organizations View: News Rack - Sub-Categories - DMoz
Security Groups including sites to security groups from national or regional relevance. Some are offering services for security as CERT (Computer Emergency Response Teams).
More »

Policy Policy View: News Rack - Sub-Categories - DMoz
The computer security policy is a statement by management of the minimum expectations to maintain the confidentiality, integrity and availability of the corporate network and all data stored on the network.
Companies, HIPAA, Sample Policies, Standards, More »

Products and Tools Products and Tools View: News Rack - Sub-Categories - DMoz
Software and hardware products and tools that provide security functionality.
Cryptography, E-Commerce, Forensics and Anti-Forensic Degaussers, Monitoring, Open Source, More »

Public Key Infrastructure Public Key Infrastructure View: News Rack - Sub-Categories - DMoz
This category is for sites providing an overview of Public Key Infrastructure, what it is, how it works etc.
Application Areas, Laws and Policies, PKCS, PKIX, SPKI, More »

Research Research View: News Rack - Sub-Categories - DMoz
Sites related to computer security research.
More »

Virtual Private Networks Virtual Private Networks View: News Rack - Sub-Categories - DMoz
Through the use of authentication, encryption and tunneling technologies, Virtual Private Networks (VPN) permit the secure transmission of sensitive data through public networks, thus allowing organizations to reduce WAN costs by utilizing the Internet for site to site communications.
FAQs, Help, and Tutorials, Products and Tools, Protocols, More »

Help build the largest human-edited directory on the web.