Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

The classification of Internet of Things (IoT) devices Based on their impact on Living Things (Paper)

English
Spanish

Home Guides

Guides

You are welcome to contribute to The Reading Room with any article, white paper or any other Cybersecurity document for public distribution. Contact me!

Display # 
# Web Link Hits
1   Link   Guide to International Law and Surveillance 9094
2   Link   7 Tips for Securing Mobile Workers 3883
3   Link   FCC Small Biz Cyber Planner 2.0 3165
4   Link   iPad in Business - Security Overview 2845
5   Link   The Unwitting Danger Within: Understanding and Mitigating User-Based Risk 2752
6   Link   OAS Awareness Campaign Toolkit 1658
7   Link   Proactive Steps to Protect Your Identity 2914
8   Link   An Overview of Cryptography 145087
9   Link   A Guide to Facebook Security 10470
10   Link   Debunking the Myths SSL VPN Security 3053
11   Link   Veterans Cybersecurity Training and Education Guide 4463
12   Link   Best Practices for Keeping Your Home Network Secure 3129
13   Link   Cyber Security Incident Management Guide 1416
14   Link   Data Privacy and Security: A Practical Guide for In-House Counsel 23354
15   Link   Mobile Security Toolkit 3010
16   Link   Intrusion Prevention Systems for Dummies 3400
17   Link   Double Trouble (a guide to identity theft prevention) 2976
18   Link   Best Practices for Seizing Electronic Evidence 3702
19   Link   Brute forcing Wi-Fi Protected Setup 2837
20   Link   Modern Malware for Dummies 2000
21   Link   White House Consumer Privacy Bill of Rights 2766
22   Link   Ten Ways to Improve the Security of a New Computer 4443
23   Link   How a Credit Card is Processed 3713
24   Link   Take control of your personal data 2779
25   Link   SSL/TLS Deployment Best Practices 3385
26   Link   Staying Secure Online While Traveling 2721
27   Link   User Guide for the NIST Green Button Software Development Kit 2679
28   Link   20 Critical Security Controls - Poster 3301
29   Link   20 Critical Controls for E ffective Cyber Defense 3152
30   Link   Common Sense Guide to Mitigating Insider Threats, 4th Edition 5650
31   Link   Seizing Opportunity: Good Privacy Practices for Developing Mobile Apps 2879
32   Link   Defending your Data Breach notification laws per state 2369
33   Link   Facts on the Collection of Intelligence Pursuant to Section 702 of the Foreign Intelligence Surveillance Act 2808
34   Link   Bring Your Own Device (BYOD) Policy Guidebook 2566
35   Link   The Password Management Guide 5201
36   Link   Privacy Best Practices for Social Media 3779
37   Link   MOBILE SECURITY FOR THE REST OF US 3672
38   Link   Your Guide for Migrating from 1024-bit to stronger SSL certificate key lengths 2148
39   Link   Web Application Security Insight from Industry Leaders 7564
40   Link   Cyber Security Guides 2174
41   Link   Cyber Threats to Mobile Phones 3851
42   Link   Internet Security Essentials for Business 2.0 3886
43   Link   Security Guidance for Critical Areas of Focus in Cloud Computing V3.0 4272
44   Link   An introduction to detecting and deterring an insider spy 1482
45   Link   Start with Security, a Guide for Business 1278
46   Link   Password Guidance 1649
47   Link   THE UNOFFICIAL OFFICIAL VCAP5-DCA STUDY GUIDE 2608
48   Link   Department of Justice Policy Guidance on Domestic Use of Unmanned Aircraft Systems (UAS) 1715
49   Link   Global Guide to Data Breach Notifications 1579
50   Link   Australian Government Information Security Manual (ISM) 3478
51   Link   The Ultimate Guide to Social Engineering 1326
52   Link   Best Practices for Establishing a National CSIRT 4908
53   Link   Small Business Information Security: The Fundamentals 877
54   Link   A Framework for a Vulnerability Disclosure Program for Online Systems 1634
55   Link   A Worldwide Survey of Encryption Products 1188


Cibersecurity, Privacy and the Internet of Things (IoT) - Internet Society WEBINAR

 

BIG DATA: Presente y Futuro de los Datos (Webinar)