• Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ
  • Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ

Links and Related Materials

In this section anyone with Author status can post articles about their favorite links to IT security architecture related material. We follow the same quality policy as Wikipedia and take the liberty to delete articles that might not be up to common sense quality standards.

 The community thanks you for your contribution.

 

List of articles in category Links and Related Materials
Title Hits
Ars articles on wireless security Hits: 4924
Build Security In: Process Agnostic View Hits: 6319
ICTstandard.org Hits: 5139
Mass collaboration (principles for "we think") Hits: 4951
MITRE: Common Weakness Enumeration Hits: 7733
NIST Special Publications on computer security: 800 Series Hits: 9936
No Tricks Security Blog Hits: 4733
Passwords that are simple and safe Hits: 5269
SCAP Security Content Automation Protocol Hits: 5657
Security Metrics Hits: 7611
Security Pattern Report by Kienzle / Elder Hits: 6002
Software Security Assurance : State of the Art Report Hits: 8192
Where to locate the IS function within the organisation Hits: 5333