...
Below is a complete list of case study submissions that are referenced throughout the site (look for this symbol: ). To contribute examples of practices that have been effective in your institution, please use the submission form.
Info |
---|
Please note that some case study submissions are available in PDF format, while more recent case studies are available as wiki pages in the guide. |
- Application Security for Database Administrators (last updated February 2011)
- Application Security for Developers and Quality Assurance Personnel (last updated February 2011)
- Building an ISO /IEC 27001 Certified Information Security Management SystemPrograms at the University of Tampa (last updated August 2015)
- Developing a Certification Authority for PKI at Virginia Tech (last updated May 2011)
- Enhancing Application Security with a Web Application Firewall (last updated February 2011)
- Identity Assurance at Virginia Tech (last updated July 2012)
- 2017)
- Identity Identity Finder at The University of Pennsylvania (last updated May 2010)Whole Disk Encryption Evaluation and Deployment at Baylor University (last updated June 2008 (2017)
...
Questions or comments? Contact us.
...