Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

Cybersecurity Whitepapers

Access expert-driven SANS white papers delivering cutting-edge research, technical analysis, and strategic insights on critical cybersecurity topics. These papers provide clarity and actionable guidance to help security professionals navigate evolving threats and advance expertise.

Filter by:

How to Configuring Local Logging on Solaris 8 and Use Symantec Intruder Alert for Centralized Logging

WhitepaperCyber Defense
  • 5 May 2005

The Role of the Security Analyst in the Systems Development Life Cycle

WhitepaperSecurity Awareness
  • 5 May 2005

Configuring a Free Automated Host Auditing System for windows 2000 Server and 2003 Server.

Whitepaper
  • 5 May 2005

Local Privilege Escalation in Solaris 8 and Solaris 9 via Buffer Overflow in passwd(1)

Whitepaper
  • 5 May 2005

Creating a Hardened Internet SMTP Gateway on Exchange 2003

Whitepaper
  • 5 May 2005

Securing Webmin with Tcp Wrappers and SSH Port Forwarding-A Practical and Economical Approach

WhitepaperCyber Defense
  • 5 May 2005

A Honeypot Based Worm Alerting System

WhitepaperDigital Forensics and Incident Response
  • 5 May 2005

Building a Security Policy Framework for a Large, Multi-national Company

WhitepaperSecurity Awareness
  • 5 May 2005

Single-signon with Open Directory from GNU/Linux

Whitepaper
  • 5 May 2005

Security In An Open Environment Such As A University?

Whitepaper
  • 5 May 2005

The Many Issues of a Human Review Downgrader

WhitepaperCybersecurity Leadership
  • 5 May 2005

DNS Spoofing by The Man In The Middle

WhitepaperCyber Defense
  • 5 May 2005