www.nasact.org/IISAF/pubs.html |
www.speedguide.net/scan.php |
|
www.tbs-sct.gc.ca/pubs_pol/dcgpubs/tb_h4/01 |
www.theiia.org/itaudit/ |
www.theiia.org/iia/index.cfm?doc_id=2458 |
www.security-audit-internal-audit.com/ |
www.security-audit-internal-audit.com/rusec |
www.insecure.org/nmap/ |
www.sheshunoff.com/store/H42.html |
|
www.sans.org/rr/ |
www.security-manual.com/man-audit.htm |
www.security-manual.com/ |
www.securityfocus.com/infocus/1697 |
lists.jammed.com/securityjobs/2003/06/0036. |
www.itm.iit.edu/578/audit.html |
www.infoworld.com/cgi-bin/displayTC.pl?/980 |
www.netbsd.org/Security/ |
www.techlearning.com/story/showArticle.jhtm |
www.securityforum.org/assests/pdf/audit_che |
|
www.securitypolicy.co.uk/securityaudit/ |
www.secureroot.com/category/security/ |
www.masp.com/publications/ |
www.compsec2002.com/ |
www.security.gatech.edu/architecture/system |
www.pwcglobal.com/extweb/newcoweb.nsf/docid |
www.techsupportalert.com/search/t04123.pdf |
www.sacs.co.za/ |
www.sacs.co.za/Consulting.htm |
secinf.net/ |
csrc.nist.gov/ispab/2002-06/Rau-06-2002.pdf |
www.securitypolicy.co.uk/securitymanagement |
www.cs.purdue.edu/coast/coast.html |
www.noweco.com/smhe.htm |
www.entrepreneur.com/article/0,4621,307326, |
searchcio.techtarget.com/sDefinition/0,,sid |
support.microsoft.com/default.aspx?scid=kb; |
www.iso17799software.com/ |
www.stuhenderson.com/XNTSEC1.HTM |
www.stuhenderson.com/XSTUHTXT.HTM |
www.sec.gov/about/oig/audit/audmem24final.h |
www.auditnet.org/docs/Application%20Securit |
www.isaca.org/ |
members.tripod.com/njISACA/ |
www.visa.co.jp/secured/includes/AIS_vs_BS77 |
www.visa.co.jp/secured/includes/AIS_Securit |
www.linuxsecurity.com/feature_stories/featu |
www.giac.org/GSAE.php |
www.giac.org/subject_certs.php |
www.protectdata.com/common/upl/solution_pdf |
www.paragonsystems.com.au/securityaudit.htm |
|
www.crg.com/html/service_level3.php?id=455 |
www.isaca.org/nsc2004/ |
www.bindview.com/About/IR/display.cfm?Relea |
www.paladion.net/services/enterprise_securi |
usa.visa.com/media/business/cisp/Security_A |
techrepublic.com.com/5100-6329-1059736.html |
techrepublic.com.com/5100-6329-1051365-1-1. |
www.rothstein.com/links/rothstein_recommend |
www.euromoneytraining.com/MIS/about.asp |
www.euromoneytraining.com/MIS/instructors.a |
www.dcit.cz/web/en/bezpecnost/sluzby/audit_ |
www.computerworld.com/news/2003/story/0,112 |
www.gao.gov/special.pubs/mgmtpln.pdf |
www.computerworld.com/securitytopics/securi |
www.itsecurity.com/papers/iomart2.htm |
www.itsecurity.com/papers/papers.htm |
www.windowsecurity.com/ |
wwws.sun.com/software/security/audit/ |
www.austinfosec.com/audits.php |
www.securitydocs.com/library/23 |
reform.house.gov/UploadedFiles/Best%20Pract |
www.kpmg.com/aci/roundtable_fall2001.htm |
www.qualys.com/docs/customers/casestud/ici- |
www.e-security-e-commerce-security.com/ |
www.qualys.com/docs/corporate-brochure.pdf |
www.ulb.ac.be/soco/solvay/ict/ |
infosecuritynetbase.com/ejournals/books/boo |
infosecuritynetbase.com/ |
www.e-securityworld.com/ |
www.openbsd.org/security.html |
www.thejobco.com/str-asp-4_349833-end-5.htm |
www.thejobco.com/str-asp-4_376771-end-5.htm |
www.eeproductcenter.com/showPressRelease.jh |
www.thawte.com/qualys/ |
|
www.securityspace.com/ |
|
www.threatfocus.com/vulnerability_audits.ph |
www.nii.co.in/services.html |
www.misti.com/ |
www.neb-one.gc.ca/Publications/InternalAudi |
www.wustl.edu/policies/infosecurity.html |
www.theregister.co.uk/2003/12/10/federal_ag |
content.techweb.com/encyclopedia/defineterm |
insight.zdnet.co.uk/hardware/servers/0,3902 |
www.4terrorism.com |