SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Operations
Linux Security IBM White Paper
Triangle InfoSecon Conference program 2011
Quantitative Risk Analysis Step by Step 849
Techniques Tools Recovering Analyzing Data Volatile Memory 33049
Alberta's Approach To An Itm Control Framework
Best Practices for Leveraging Security Threat Intelligence
SIEM-plifying security monitoring: A different approach to security visibility
SANS Log Management 1
Sans Mc Afee Pandel Slides
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
SANS 2013 Critical Security Controls Survey