Table A.2 is a list of Web sites to use when looking for information on new and old vulnerabilities and countermeasures. Each site has its own unique spin on security, and each is focused differently. Referencing two or three of these sites daily can be extremely helpful in keeping up-to-date with current security issues.
|