Useful Resources & White papers

ISSA Journals 2017
January 2017
Machine Learning
Machine Learning
Article of the Year: Machine Learning: A Primer for Security - Stephan Jou Enterprise Security Architecture: Key for Aligning Security Goals with Business Goals - Seetharaman Jeganathan The Role of the Adjunct in Educating the Security Practitioner - Karen Quagliata Fragmentation in Mobile Devices - Ken Smith Gaining Confidence in the Cloud - Phillip Griffin and Jeff Stapleton Crypto Wars II - Luther Martin and Amy Vosters

To gain full access to the ISSA Journal. Join ISSA today

February 2017
Blended Families
Blended Families
Blended Families: Initial Steps to Security and Privacy Collaboration - Grace Buckler Practical Steps for Compliance with New EU Data Privacy Regulations - Patrick Looney Contextualizing the Blurring Boundaries of Information Security, Privacy, and Legal Aspects - Muzamil Riffat Regulatory Review of 2016 and a Look Ahead - David Jackson Achieving Compliance with Internal Controls - Carlos Valiente, Jr.

To gain full access to the ISSA Journal. Join ISSA today

Annual 2005 Regional Computer Forensics Laboratory (RCFL) Report
RCFL is a one stop, full service forensics laboratory and training center devoted entirely to the examination of digital evidence in support of criminal investigations.

National White Collar Crime Center report
The mission of NW3C is to provide a nationwide support system for agencies involved in the prevention, investigation, and prosecution of economic and high-tech crimes and to support and partner with other appropriate entities in addressing homeland security initiatives, as they relate to economic and high-tech crimes.

Brainbench ITAA Global Cyber Security Survey 2003 (74k)

DOS and DDOS Attacks (70k)

Global Information Security Survey 2004 (1.6m)

InfoWorld Phishing (1.2m)

InfoWorld Spyware (3.8m)

Intrusion Detection Systems(75k)

IPSec IPSecurity What Makes it Work (131k)

NIST CA Presentation(367k)

Public Key Infrastructure(123k)

Symantec Threat Report VII(1.4m)

Virtual Private Networks How They Work (132k)