Sep 1 2017

La sécurité informatique

Information security : a vast and complex subject if any, these few links will give you a partial view but nevertheless very rich / Vaste et complexe sujet s’il en est, ces quelques liens vous en donneront une vue certes partielle mais néanmoins très riche :

https://www.deepsec.net

https://deepsec.net/contact.html

https://www.cybermalveillance.gouv.fr/tous-nos-contenus/bonnes-pratiques/securite-objets-connectes-iot

http://blog.deepsec.net

Use Handshake Data to create TLS Fingerprints

https://linuxgazette.net/authors/pfeiffer.html

https://www.futura-sciences.com/tech/actualites/cybersecurite-fbi-nsa-decouvrent-russes-visent-desormais-linux-82563/

GnuPG – Introduction & Cheat-Sheet

Let's Encrypt Vulnerability

https://connect.ed-diamond.com/GNU-Linux-Magazine/GLMFHS-041/Introduction-a-Netfilter-et-iptables

https://www.crowes.eu/

https://www.brocas.org/

http://www.oreilly.com/security/free/

https://www.inria.fr/actualite/actualites-inria/inria-publie-son-livre-blanc-sur-la-cybersecurite

https://www.dsih.fr/images/2019-01/Livre-blanc-Cybersecurite-Inria.pdf

https://inetdoc.net/guides/iptables-tutorial/

https://www.howtogeek.com/177621/the-beginners-guide-to-iptables-the-linux-firewall/

https://anarc.at/blog/2019-03-20-locking-down-registration-mail/

https://doc.ubuntu-fr.org/securite

https://www.miscmag.com/

https://www.swiss-isa.ch/en/

http://www.r00ted.com/

https://en.wikipedia.org/wiki/Denial-of-service_attack

https://en.wikipedia.org/wiki/Transport_Layer_Security

https://en.wikipedia.org/wiki/DomainKeys_Identified_Mail

https://en.wikipedia.org/wiki/Category:Computer_security

https://en.wikipedia.org/wiki/Salt_(cryptography)

http://en.wikipedia.org/wiki/Wireshark

http://www.eyrolles.com/Informatique/Livre/nagios-3-pour-la-supervision-et-la-metrologie-9782212124736

http://solidarites-sante.gouv.fr/IMG/pdf/Guide_-_Introduction_a_la_securite_du_Systeme_d_Information_-_DGOS_-_091213.pdf

https://www.ghostery.com/wp-content/themes/ghostery/images/campaigns/tracker-study/Ghostery_Study_-_Tracking_the_Trackers.pdf

ftp://ftp.software.ibm.com/software/linux/SecurityTeam.pdf

https://tinyurl.com/LaSecuriteInformatique

https://www.gnulinuxmag.com/tag/securite/

https://boutique.ed-diamond.com/home/863-misc-hs-11.html

https://boutique.ed-diamond.com/anciens-numeros/800-gnulinux-magazine-hs-76.html

https://infosec-conferences.com/

https://www.nagios.org/

https://www.nagios.org/documentation/

http://exchange.nagios.org

http://www.nagiosexchange.org

http://nagiosplugins.org

https://library.nagios.com/library/products/nagios-core/manuals//

https://who.rocq.inria.fr/Gaetan.Leurent/files/phd-leurent.pdf

http://doc-admin.istic.univ-rennes1.fr/securite.pdf

https://docs.tenable.com/nessus/6_11/Content/ConfigureNessus.htm

http://static.tenable.com/documentation/nessus_compliance_checks_FR.pdf

http://sanog.org/resources/sanog27/SANOG27-Conference_ashley.jones.secure.apache.with.letsencrypt.pdf

https://www.mitre.org/sites/default/files/pdf/gosselin_apache.pdf

http://www.securityfocus.com/

http://munin-monitoring.org/

https://renemages.wordpress.com/2015/05/01/cryptographie/

http://www.arg0.net/encfs

Suricata

http://linuxfr.org/users/regit

http://lea-linux.org/documentations/Lexique_de_la_securite

http://okki666.free.fr/docmaster/articles/linux043.htm

http://www.miscmag.com/