Joomla TemplatesWeb HostingFree Money

Felix Uribe's List of the Best Websites in Cybersecurity and Privacy

The classification of Internet of Things (IoT) devices Based on their impact on Living Things (Paper)

English
Spanish

Home White Papers

White Papers

You are welcome to contribute to The Reading Room with any article, white paper or any other Cybersecurity document for public distribution. Contact me!

Display # 
# Web Link Hits
1   Link   Malsubjects and Malware: A Malicious Combination
2588
2   Link   Security for Cloud Computing Ten Steps to Ensure Success Version 2.0
2652
3   Link   Unreliable Informants: IP Addresses, Digital Tips and Police Raids
5360
4   Link   Facebook Forensics
3994
5   Link   Broken Trust: Exposing the Malicious Use of Digital Certificates and Cryptographic Keys
2749
6   Link   Web 2.0 A Complex Balancing Act
2893
7   Link   Protecting your computer against malware and malsubjects
2984
8   Link   IT White Papers
2157
9   Link   Protecting your passion: Cyber Risk and Small Business
3886
10   Link   Wi-Fi Positioning Systems: Beware of Unintended Consequences
3253
11   Link   Supplement to Authentication in an Internet Banking Environment
3115
12   Link   Protecting Users From Firesheep and other Sidejacking Attacks with SSL
17226
13   Link   Social networking and security risks
3046
14   Link   Can we learn from SCADA security incidents?
3268
15   Link   Doppelganger Domains
2800
16   Link   Differences explained: Private vs. public vs. hybrid cloud computing
7321
17   Link   The Truth Cost of Compliance
4929
18   Link   Raising the Bar for Cybersecurity
16880
19   Link   The 2013 (ISC)2 Global Information Security Workforce Study
4062
20   Link   Insider Threats to Cloud Computing: Directions for New Research Challenges
2586
21   Link   Changin the Game
2235
22   Link   White Paper Wizard
2821
23   Link   Safe A TARGETED THREAT
2932
24   Link   Defending your Data: A few things you should (at least) know about privacy and data protection
2527
25   Link   When Malware Goes Mobile: Causes, Outcomes and Cures
10496
26   Link   Comprehensive Experimental Analyses of Automotive Attack Surfaces
2582
27   Link   The Next Wave - NSA
8259
28   Link   CISO Guide to Next Generation Threats
2596
29   Link   Privacy Policies: How To Communicate Effectively with Consumers
3361
30   Link   Keep Cyber Threats from Destroying
4847
31   Link   WHEN ENOUGH IS ENOUGH: LOCATION TRACKING, MOSAIC THEORY, AND MACHINE LEARNING
2684


Cibersecurity, Privacy and the Internet of Things (IoT) - Internet Society WEBINAR

 

BIG DATA: Presente y Futuro de los Datos (Webinar)