• Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ
  • Home
  • Foundations
    • OSA Landscape
    • OSA Process Landscape
    • OSA Actors
    • OSA Lifecycle
    • Design principles
    • How to use OSA
    • Writing a Pattern
    • OSA Taxonomy
    • Links to Related Material
  • Definitions
    • IT Architecture
    • IT Risk
    • IT Security Architecture
    • IT Security Pattern
    • IT Security Reqmnts
    • Glossary
  • Library
    • Pattern Landscape
    • Control Catalogue
    • Threat Catalogue
    • Icon Library
    • Pattern Template
  • Community
    • Roadmap
    • Getting Involved
    • Read the blog
    • Discussion Forum
    • Case Studies
    • Contributed Articles
  • About
    • Why have OSA?
    • Who uses OSA?
    • License terms
    • FAQ

Links and Related Materials

In this section anyone with Author status can post articles about their favorite links to IT security architecture related material. We follow the same quality policy as Wikipedia and take the liberty to delete articles that might not be up to common sense quality standards.

 The community thanks you for your contribution.

 

List of articles in category Links and Related Materials
Title Hits
Ars articles on wireless security Hits: 4945
Build Security In: Process Agnostic View Hits: 6344
ICTstandard.org Hits: 5158
Mass collaboration (principles for "we think") Hits: 4969
MITRE: Common Weakness Enumeration Hits: 7760
NIST Special Publications on computer security: 800 Series Hits: 9958
No Tricks Security Blog Hits: 4754
Passwords that are simple and safe Hits: 5289
SCAP Security Content Automation Protocol Hits: 5679
Security Metrics Hits: 7630
Security Pattern Report by Kienzle / Elder Hits: 6018
Software Security Assurance : State of the Art Report Hits: 8222
Where to locate the IS function within the organisation Hits: 5352