For a guide to Web site security policies and procedures, see http://www.ietf.org/rfc/rfc2196.txt?number=2196 For more on designing secure networks, go to http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_wp.htm and http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safes_wp.htm For more on designing and implementing Enterprise IP Security (IPSec) virtual private networks (VPNs) see http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safev_wp.htm Check out security and VPN Case Studies at http://www.cisco.com/warp/public/779/largeent/issues/security/secvpn_profiles.html Read a question and answer session on a blueprint for secure e-business at http://www.cisco.com/warp/public/cc/so/cuso/epso/sqfr/safe_qa.htm Find popular resources on computer security at http://www.sans.org/resources/popular.php For more on Internet security, visit http://www.cert.org/ |