Εγκυρα περιοδικά και συνέδρια σε Ασφάλεια στις ΤΠΕ
Security Portals
- Security Focus
- Cotse , The Computer Professional's Reference
- Security News Portal
- The Security Portal for Information System
- The Internet Security Resource
- Security News portal
- General security portal
- Certified Information Systems Security Professional
- Security Service Provider
Hacking News and Tools
- AppSec Street Fighter - SANS Institute
- Password Crackers Blog
- Metasploit Blog
- Darkoperator Blog
- Carnal0wnage Blog
- Hack In the Box
- Exploit-DB
- Packet Storm Security
- Will Hack For SHSHI
- GNUCITIZEN
- Hack this site
- hackers.org
- ASTALAVISTA.com - the hacking & security community Community Blog
- CGISecurity - Website and Application Security News
- Confessions of a Penetration Tester
Technology News
- BusinessWeek
- CNN.com - Technology
- Common Criteria Web Application Security Scoring
- IEEE Spectrum: Computing
- InformationWeek
- Reuters: Internet News
- Threat Level
Security and Cryptography Journals
- ACM Transactions on Information and System Security (TISSEC)
- IEEE Security & Privacy
- IEEE Transactions on Dependable and Secure Computing (TDSC)
- Journal of Computer Security
- Journal of Cryptology
- International Journal: Designs, Codes and Cryptography
Security and Cryptography Magazines
- Communications of the ACM
- IEEE Computer
- IEEE Internet Computing
- Information Security Magazine
- Secure Computing Magazine
- Information Security Magazine
- 2600 - The Hacker Quarterly
- Hacker magazine by the community, for the community
- Elsevier Science
Security Issues
General Security
- The Microsoft Security Response Center
- NIST IT Security
- CERIAS Blog
- Center for Internet Security Resource Updates
- CERT
- Cloud Security Alliance Blog
- CSO Online
- Infosec Writers
- SANS ISC
- House Cyber Security Caucus
- MM86 Security Labs
- MITRE
- Schneier's Blog
Operating System Security
- LinuxSecurity.com
- NTBugtraq
- Windows and NET Magazine Network - Security Administrator
- IT World - Unix Insider
- Microsoft security site
- Microsoft Windows security site: intrusion detection, anti-virus etc
Information Systems Security & Risk Management
- The world's largest IT security management
- Security Management On-Line
- Information Assurance Advisory Council (UK)
- Information Security Forum
- Technical Surveillance Counter Measures
- Security resource net's computer security
- IT Security Cookbook
- The Center for Internet Security
- Frequently asked questions on IT security, especially unix .
- InfoSec and InfoWar Portal
- Resource for telemarketing and Internet fraud information
- Management tools
Network Security
Databases Security
- Database with lots of security research publications Search engine for publications
- FIP Workshop on Database Security (DBSec)
Intrusion Detection Systems
- Dshield - Distributed Intrusion Detection System
- Internet Eng, Task Force, Intrusion Detection and Exchange Format
- RAID Symposium
- Columbia University, Project IDS
- Gatech University, Readings in Intrusion detection
- University of California Irvine, KDDCUP 1999 Data
Vulnerabilities and Virus
- Anti Virus Information Exchange Network
- Internet Security Systems Alerts and Advisories
- Common Vulnerabilities and Exposures CVE
- Vmyths.com - Truth about Computer Virus Myths and Hoaxes
Security tokens
- Gemplus SmartCards
- Schlumberger SmartdCards
- Official details on the Java Card specification
- Product information on PC/SC
- Specifications for the personal computer-/smart-card standard
- On the subject of OpenCard supporting smart cards on all platforms
Privacy, Anonymity, and Law
- Helenic Data Protection Authority
- High Tech Crime Consortium
- Mailing - List in security crime
- Institute of Communications, Arbitration and Forensics
- International Crime Prevention Through Environment Design
- Privacy Foundation
- Trust-e (Privacy resource site)
- Computer Privacy Digest
- Computer Crime and Intellectual Property Section (CCIPS)
- US Department of Commerce - Safe Harbor
- Computer forensics information and research site
- JAP Anonymity & Privacy Project
Security Economics
Cryptography
- Number theory
- Prime numbers
- Computation number theory and data security
- N!+-1 Factoring Page
- RSA algorithm
- Digital Certificates and LDAP
- PKI white papers
- Homomorphic Encryption
- PKI Forum
- Data Encryption Standard(DES)
- Advanced Encryption Standard (AES) l
- Blowfish
- RC5
- Block Cipher Modes
- Algorithms and protocols
- Secure Hash Standard SHA-1
- MD5 and family
- Digital Signature Standard (DSS)
- Cryptograpic Toolkit (digital Signatures)
- Confirmer Signature Schemes and Undeniable Signature Schemes
- Blind signatures
Authentication
Quantum Cryptography
Elliptic Curves
- Elliptic Curve Cryptography
- Elliptic Curve Cryptography Implementation
- Hyper Elliptic Curves
- Elliptic curves : a collection of links
Cryptographic standards and patents
Cryptographic Software
- Core Java Security and the Java Platform
- Cryptographic Libraries:
- Delphi Cryptography page
- Open Source, implementation of RSA Security's BSAFE Crypto-C API
Audit and Control
Security and Cryptography Education and Training
- Center for multidisciplinary research and education in areas of information security
- Better Business Bureau Online
- CyberAngels
- Human Firewall
- Security aware ness products and courses.
- Center for Education and Research in Information Assurance and Securtiy from Purdue University
- Naval Postgraduate School, Center for Information Systems Security Studies and Research
- Carnegie Mellon University, Software Engineering Institute
- University of Carolina at Davis, Matt Bishop
- National Colloquium for Information Systems Security Education
Spyware Scanners
- Spyware Guide
- Spyware BeGone!
- NoAdware
- EarthLink Spyware Scan
- PAL Spyware Remover
- Windows Security Trojan Scan