Use the Links list for links to Web pages that your team members will find interesting or useful.
| | | | | | | | | | | | | | | | | | | | | | | The AMI Security Profile was developed by the ASAP-SG team in order to accelerate the development of security requirements and standards. This work product has been accepted and used by NIST Cyber Security Working Group and the AMI-SEC Task Force within the UCAIug. | | | | Special Publications in the 800 series present documents of general interest to the computer security community. The Special Publication 800 series was established in 1990 to provide a separate identity for information technology security publications. This Special Publication 800 series reports on ITL's research, guidelines, and outreach efforts in computer security, and its collaborative activities with industry, government, and academic organizations. | | | | As information security becomes a business imperative for organizations of all sizes, (ISC)² members – pre-eminent experts in their field – are in more demand than ever. They protect the information assets and infrastructures of their organizations and their communities, ensuring the cyber world is a safe place for us all.
| | | | The Information Systems Security Association (ISSA)® is a not-for-profit, international organization of information security professionals and practitioners. It provides educational forums, publications and peer interaction opportunities that enhance the knowledge, skill and professional growth of its members. | | | | |
|
|
|
|