Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

Home White Papers

White Papers

You are welcome to contribute to The Reading Room with any article, white paper or any other Cybersecurity document for public distribution. Contact me!

Display # 
# Web Link Hits
1   Link   Malsubjects and Malware: A Malicious Combination
1591
2   Link   Security for Cloud Computing Ten Steps to Ensure Success Version 2.0
1023
3   Link   Unreliable Informants: IP Addresses, Digital Tips and Police Raids
108
4   Link   Facebook Forensics
3165
5   Link   Broken Trust: Exposing the Malicious Use of Digital Certificates and Cryptographic Keys
1649
6   Link   Web 2.0 A Complex Balancing Act
1864
7   Link   Protecting your computer against malware and malsubjects
2107
8   Link   IT White Papers
1163
9   Link   Protecting your passion: Cyber Risk and Small Business
1582
10   Link   Wi-Fi Positioning Systems: Beware of Unintended Consequences
2154
11   Link   FireEye Advanced Threat Report 2H 2012
1849
12   Link   Supplement to Authentication in an Internet Banking Environment
1970
13   Link   Protecting Users From Firesheep and other Sidejacking Attacks with SSL
2449
14   Link   Social networking and security risks
2061
15   Link   Can we learn from SCADA security incidents?
2216
16   Link   Doppelganger Domains
1848
17   Link   Differences explained: Private vs. public vs. hybrid cloud computing
2278
18   Link   The Truth Cost of Compliance
2455
19   Link   M86 Security Labs: Threat Predictions 2012
2131
20   Link   Raising the Bar for Cybersecurity
2370
21   Link   The 2013 (ISC)2 Global Information Security Workforce Study
2535
22   Link   Insider Threats to Cloud Computing: Directions for New Research Challenges
1576
23   Link   Changing the game - Key findings from The Global State of Information Security® Survey 2013
1237
24   Link   White Paper Wizard
1680
25   Link   Safe A TARGETED THREAT
1701
26   Link   Defending your Data: A few things you should (at least) know about privacy and data protection
1284
27   Link   When Malware Goes Mobile: Causes, Outcomes and Cures
1910
28   Link   Comprehensive Experimental Analyses of Automotive Attack Surfaces
1607
29   Link   The Next Wave - NSA
1703
30   Link   CISO Guide to Next Generation Threats
1491
31   Link   McAfee® Labs 2014 Threats Predictions
2450
32   Link   Privacy Policies: How To Communicate Effectively with Consumers
2319
33   Link   Keep Cyber Threats From Destroying Your Clients’ Business
1759
34   Link   WHEN ENOUGH IS ENOUGH: LOCATION TRACKING, MOSAIC THEORY, AND MACHINE LEARNING
1309