Magazines
- (In)Secure Magazine: http://www.net-security.org/insecuremag.php
- Hackin9 Magazine – http://hakin9.org/, http://www.en.hakin9.org/
- SC Magazine – http://www.scmagazineus.com/ | digital downloads – http://www.scmagazineus.com/Digital-Download/section/ | podcast – http://www.scmagazineus.com/Digital-Download/section/255
- Infosecurity (USA) magazine – http://www.infosecurity-us.com/
- Club Hack Magazine (India) – http://chmag.in/
Knowledge and tools sites
- Biblio@Lotek.net – http://biblio.l0t3k.net/
- /dev/ttyS0 – Embedded Device Hacking – http://www.devttys0.com/
Hacking: a cultural phenomenon
- “The Hacker Manifesto” by “+++The Mentor+++” (1986.01.08) – http://www.mithral.com/~beberg/manifesto.html
- “How To Become A Hacker” by Eric Steven Raymond (2001) – http://www.catb.org/~esr/faqs/hacker-howto.html
- Eric Raymond’s FAQ collection – http://www.catb.org/~esr/faqs/
- “Hackers and Painters” by Paul Graham (2003.05) – http://www.paulgraham.com/hp.html
Other sites
- Ashkan Soltani’s site – http://www.ashkansoltani.org/ – an independent researcher and consultant focused on privacy, security, and behavioral economics.
- KnowPrivacy by Ashkan Soltani – http://knowprivacy.org/ – site dedicated to his Master’s thesis
- The National Software Reference Library (NSRL) Project Web Site (@NIST): http://www.nsrl.nist.gov/. They provide the Reference Data Set (RDS), which is a collection of digital signatures of known, traceable software applications. There are application hash values in the hash set which may be considered malicious, i.e. steganography tools and hacking scripts. There are no hash values of illicit data, i.e. child abuse images.
- (An compendium of US) State Security Breach Notification Laws – http://www.ncsl.org/IssuesResearch/TelecommunicationsInformationTechnology/SecurityBreachNotificationLaws/tabid/13489/Default.aspx
- Faves.com list of links:
- Hacking – http://faves.com/users/jopiter/friends/dots/tag/hacking
- Penetration testing – http://faves.com/users/jopiter/friends/dots/tag/penetration+testing
- Framework – http://faves.com/users/jopiter/friends/dots/tag/framework
- Security-Shell blog – http://security-sh3ll.blogspot.com/ – tools.
- “SecurityConfig” site – http://www.securityconfig.com/ – tools
- ::eSploit:: – http://esploit.blogspot.com/ – looks like a blog linking to the various security/hacking resources.
Conferences
- Hak5 – http://www.hak5.org/
Related content at this blog:
- Infosec pages at this blog – https://eikonal.wordpress.com/2011/05/17/information-security-sites/
- Infosec online – https://eikonal.wordpress.com/2010/02/01/infosec-online/
- Infosec blogs – https://eikonal.wordpress.com/2010/03/17/infosec-blogs/
- Infosec wikies – https://eikonal.wordpress.com/2010/03/17/infosec-wikies/
- Infosec books – https://eikonal.wordpress.com/2010/10/19/infosec-books/
- InfoSec lists and newsgroups – https://eikonal.wordpress.com/2010/03/15/infosec-man-lists-and-newsgroups/
- Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/
- “Book: Enterprise Security For the Executive” – https://eikonal.wordpress.com/2010/01/07/book-enterprise-security-for-the-executive/
- IT Magazines – https://eikonal.wordpress.com/2010/03/01/it-magazines/
[…] IT Magazines Filed under: it — Tags: IT journals, IT magazines — sandokan65 @ 14:01 Note: see also https://eikonal.wordpress.com/2010/02/01/infosec-online/. […]
LikeLike
Pingback by IT Magazines « Eikonal Blog — 2010.03.01 @ 14:02
[…] A Selection of INFOSEC Related Courses/Reports/Papers/Books Published and/or Authored by Dr. Bruce C. Gabrielson – http://blackmagic.com/ses/bruceg/bgrpts.html Similar at this blog: Book: Enterprise Security For the Executive – https://eikonal.wordpress.com/2010/01/07/book-enterprise-security-for-the-executive/ | Infosec pages at this blog – https://eikonal.wordpress.com/2011/05/17/information-security-sites/ | Infosec online (= infosec sites) – https://eikonal.wordpress.com/2010/02/01/infosec-online/ […]
LikeLike
Pingback by Infosec books « Eikonal Blog — 2011.07.05 @ 11:23