mirror of
https://github.com/mohitmishra786/amILearningEnough.git
synced 2025-12-17 20:34:40 +03:00
55 lines
2.5 KiB
Markdown
55 lines
2.5 KiB
Markdown
# Security Mechanisms
|
|
## Official Documentation
|
|
- **NIST Special Publications**
|
|
- [Link](https://csrc.nist.gov/publications/sp)
|
|
- **IETF Security Area**
|
|
- [Link](https://datatracker.ietf.org/wg/#sec)
|
|
- **W3C Web Security Context**
|
|
- [Link](https://www.w3.org/TR/WSC-UI/)
|
|
- **OWASP Cheat Sheet Series**
|
|
- [Link](https://cheatsheetseries.owasp.org/)
|
|
|
|
## Research Papers
|
|
- **"A Survey of Access Control Models" by R. Sandhu and P. Samarati (1994)**
|
|
- [Link](https://ieeexplore.ieee.org/document/312842)
|
|
- **"The Evolution of Access Control Models" by D. Ferraiolo and D. Kuhn (2009)**
|
|
- [Link](https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=901428)
|
|
- **"A Survey of Trust and Reputation Systems for Online Service Provision" by A. Jøsang et al. (2007)**
|
|
- [Link](https://dl.acm.org/doi/10.1016/j.dss.2005.05.019)
|
|
|
|
## Additional Online Resources
|
|
- **Cryptography and Security on ArXiv**
|
|
- [Link](https://arxiv.org/list/cs.CR/recent)
|
|
- **Mozilla Web Security Guidelines**
|
|
- [Link](https://infosec.mozilla.org/guidelines/web_security)
|
|
- **SANS Reading Room**
|
|
- [Link](https://www.sans.org/reading-room/)
|
|
|
|
## Books
|
|
- **"Cryptography and Network Security: Principles and Practice" by William Stallings**
|
|
- ISBN: 0134444280
|
|
- Provides a comprehensive overview of the principles and practices of cryptography and network security.
|
|
- **"Computer Security: Principles and Practice" by William Stallings and Lawrie Brown**
|
|
- ISBN: 0134794109
|
|
- Offers a broad introduction to the various aspects of computer security.
|
|
- **"Security Engineering: A Guide to Building Dependable Distributed Systems" by Ross Anderson**
|
|
- ISBN: 0470068523
|
|
- Covers a wide range of security mechanisms and their applications in various systems.
|
|
- **"Applied Cryptography: Protocols, Algorithms, and Source Code in C" by Bruce Schneier**
|
|
- ISBN: 1119096723
|
|
- Provides an in-depth look at cryptographic algorithms and protocols.
|
|
|
|
## Standards
|
|
- **ISO/IEC 27002:2013 Code of practice for information security controls**
|
|
- Provides best practice recommendations on information security controls
|
|
- **FIPS 140-3 Security Requirements for Cryptographic Modules**
|
|
- [Link](https://csrc.nist.gov/publications/detail/fips/140/3/final)
|
|
|
|
## Online Courses
|
|
- **Coursera: Cryptography I by Stanford University**
|
|
- [Link](https://www.coursera.org/learn/crypto)
|
|
- **edX: Introduction to Cybersecurity**
|
|
- [Link](https://www.edx.org/course/introduction-to-cybersecurity)
|
|
- **Udacity: Applied Cryptography**
|
|
- [Link](https://www.udacity.com/course/applied-cryptography--cs387)
|