Donnal Group Inc.
You may find these links useful for finding InfoSec material for your enterprise network.
Common threads: OpenSSH key management, Part 1
OpenSSH keys understanding RSA/DSA authentication article at IBM.
Special Publications (800 Series)
SANS Institute - The SANS Security Policy Project
SANS Institute Example Policy.
How to Setup Password-less SSH Using Public - Private Keys
Duke Law & Technology Review
Monitoring Employee E-Mail: Efficient Workplaces VS. Employee Privacy
Information Security Risk Evaluation
OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability EvaluationSM) is a suite of tools, techniques, and methods for risk-based information security strategic assessment and planning.
- BugSweep, TSCM,
Counterintelligence and Technical Security
Technical Surveillance Counter Measures (TSCM).
Computer Crime & Intellectual Property Section - United States Department of Justice
- Top 100
Network Security Tools
Top 100 Network Security Tools as surveyed in 2006 by Insecure.org