...
Below is a complete list of case study submissions that are referenced throughout the site (look for this symbol: ). To contribute examples of practices that have been effective in your institution, please use the submission form.
Info |
---|
Please note that some case study submissions are available in PDF format, while more recent case studies are available as wiki pages in the guide. |
- Application Security for Database Administrators (2011)
- Application Security for Developers and Quality Assurance Personnel (2011)
- Building an ISO/IEC 27001 Certified Information Security Management System at University of Tampa (2015)
- Developing a Certification Authority for PKI at Virginia Tech (2011)
- Enhancing Application Security with a Web Application Firewall (2011)
- Identity Assurance at Virginia Tech (2012)
- Identity Finder at The University of Pennsylvania (2010)
- Whole Disk Encryption Evaluation and Deployment at Baylor University (2008)
...