Alphabeticalize research

This commit is contained in:
Herman Slatman 2016-02-04 19:04:45 +01:00
parent fd9c5a633b
commit eeac4572a2

View File

@ -379,14 +379,6 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
## <a name="research"></a>Research, Standards & Books
<table>
<tr>
<td>
<a href="http://download.microsoft.com/download/8/0/1/801358EC-2A0A-4675-A2E7-96C2E7B93E73/Framework_for_Cybersecurity_Info_Sharing.pdf" target="_blank">Microsoft Research Paper</a>
</td>
<td>
A framework for cybersecurity information sharing and risk reduction. A high level overview paper by Microsoft.
</td>
</tr>
<tr>
<td>
<a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a>
@ -411,6 +403,14 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
The Guide to Cyber Threat Information Sharing (NIST Special Publication 800-15, draft) assists organizations in establishing computer security incident response capabilities that leverage the collective knowledge, experience, and abilities of their partners by actively sharing threat intelligence and ongoing coordination. The guide provides guidelines for coordinated incident handling, including producing and consuming data, participating in information sharingcommunities, and protecting incident-related data.
</td>
</tr>
<tr>
<td>
<a href="http://download.microsoft.com/download/8/0/1/801358EC-2A0A-4675-A2E7-96C2E7B93E73/Framework_for_Cybersecurity_Info_Sharing.pdf" target="_blank">Microsoft Research Paper</a>
</td>
<td>
A framework for cybersecurity information sharing and risk reduction. A high level overview paper by Microsoft.
</td>
</tr>
<tr>
<td>
<a href="https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>