|
Resources
This paper, provided by Ronald L. Rivest, professor of Electrical Engineering and Computer Science at the Massachusetts Institute of Technology, proposes a new method of computer message security. The method is called...
This Web site serves as a collection of seminal research papers that "every serious student of computer security should read." Mostly from the 1970's but also stretching into the '80s, the papers were first collectively...
The Cryptographic Toolkit is being developed by a subgroup of the National Institute of Standards and Technology (NIST), whos members work to implement and promote cryptographic technologies and efficient practices. The...
The University of Michigan's Center for Information Technology Integration has compiled this introduction to cyber security in order to help people create and manage secure systems. In addition to a clear introduction,...
The Cyber Security Education Consortium (CSEC) is "is a National Science Foundation ATE Regional Center of Excellence dedicated to building an information security workforce who will play a critical role in implementing...
|
Next 5 Resources >>>
|
Switch to browsing by Resource TypeSwitch to browsing by FormatSwitch to browsing by Education LevelSwitch to browsing by GEM Subject (Fewer and Broader Classifications)Switch to browsing by Key Concept
|
Manage your resources
Save, organize, and share resources that you find.
Subscribe to bulletins
Automatically be notified about new resources that match your interests.
It's easy, fast, and FREE!
|
|