Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

Home Guides

Guides

You are welcome to contribute to The Reading Room with any article, white paper or any other Cybersecurity document for public distribution. Contact me!

Display # 
# Web Link Hits
1   Link   A Worldwide Survey of Encryption Products 98
2   Link   Small Business Information Security: The Fundamentals 78
3   Link   A Framework for a Vulnerability Disclosure Program for Online Systems 23
4   Link   7 Tips for Securing Mobile Workers 2352
5   Link   FCC Small Biz Cyber Planner 2.0 1313
6   Link   iPad in Business - Security Overview 1855
7   Link   The Unwitting Danger Within: Understanding and Mitigating User-Based Risk 1809
8   Link   OAS Awareness Campaign Toolkit 503
9   Link   Proactive Steps to Protect Your Identity 1983
10   Link   An Overview of Cryptography 2628
11   Link   A Guide to Facebook Security 2617
12   Link   Debunking the Myths SSL VPN Security 2097
13   Link   Veterans Cybersecurity Training and Education Guide 343
14   Link   Best Practices for Keeping Your Home Network Secure 2148
15   Link   Cyber Security Incident Management Guide 357
16   Link   Data Privacy and Security: A Practical Guide for In-House Counsel 433
17   Link   Mobile Security Toolkit 2095
18   Link   Intrusion Prevention Systems for Dummies 2460
19   Link   Double Trouble (a guide to identity theft prevention) 2058
20   Link   Best Practices for Seizing Electronic Evidence 2669
21   Link   Brute forcing Wi-Fi Protected Setup 1980
22   Link   Modern Malware for Dummies 1054
23   Link   White House Consumer Privacy Bill of Rights 1871
24   Link   Ten Ways to Improve the Security of a New Computer 2636
25   Link   How a Credit Card is Processed 2869
26   Link   Take control of your personal data 1940
27   Link   SSL/TLS Deployment Best Practices 2561
28   Link   Staying Secure Online While Traveling 1829
29   Link   User Guide for the NIST Green Button Software Development Kit 1777
30   Link   20 Critical Security Controls - Poster 2435
31   Link   20 Critical Controls for E ffective Cyber Defense 2316
32   Link   Common Sense Guide to Mitigating Insider Threats, 4th Edition 1994
33   Link   Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 2031
34   Link   Defending your Data Breach notification laws per state 1426
35   Link   Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act 1951
36   Link   Bring Your Own Device (BYOD) Policy Guidebook 1491
37   Link   The Password Management Guide 1692
38   Link   Privacy Best Practices for Social Media 2817
39   Link   MOBILE SECURITY FOR THE REST OF US 1608
40   Link   Your Guide for Migrating from 1024-bit to stronger SSL certificate key lengths 1249
41   Link   Web Application Security Insight from Industry Leaders 1656
42   Link   Cyber Security Guides 1355
43   Link   Cyber Threats to Mobile Phones 2453
44   Link   Internet Security Essentials for Business 2.0 2323
45   Link   Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 2579
46   Link   An introduction to detecting and deterring an insider spy 647
47   Link   Start with Security, a Guide for Business 532
48   Link   Password Guidance 577
49   Link   THE UNOFFICIAL OFFICIAL VCAP5-DCA STUDY GUIDE 1619
50   Link   Department of Justice Policy Guidance on Domestic Use of Unmanned Aircraft Systems (UAS) 769
51   Link   Global Guide to Data Breach Notifications 301
52   Link   Australian Government Information Security Manual (ISM) 2516
53   Link   The Ultimate Guide to Social Engineering 471
54   Link   Best Practices for Establishing a National CSIRT 327