The Third Party Vulnerability Resolution Blog covers CVEs and patches in Systems product suite.

reference security blueprints

Guest Author
This is a posting in the Security Community 'Reference' Category ; the function of postings that are placed in this category is to aggregate links to other, useful postings in a single meta-posting which can be referenced via a link in the Security Community Blog sidebar, and which will be re-posted on the blog each time it is refreshed by a member of the security community.

This posting is a list of Sun Security Blueprints.

As-per the description at the BluePrints Home Page

Sun BluePrints OnLine articles are maintained in this archive for the benefit and historical reference of our readers. Details of the recommendations set forth in these articles may not reflect Sun's latest hardware and software releases. Caution, careful analysis and common sense should be exercised when applying these Sun BluePrints articles to newer products and software releases.

Nonetheless, the provision of the entire, historical archive of BluePrints makes a useful corpus of security reference material, certain themes of IT security being invariant through time.

See the security blueprint full listing for the master copy of this list, with article synopses.











Be the first to comment

Comments ( 0 )
Please enter your name.Please provide a valid email address.Please enter a comment.CAPTCHA challenge response provided was incorrect. Please try again.