IT Security Cookbook
by Sean Boran
Publisher: Boran Consulting 2003
This document briefly discusses threat & risk analysis, outlines the ingredients necessary to define a security policy and to provide a framework for deciding how tightly systems need to be secured, outlines policies, processes, structure and responsibilities required in a security organization, presents current security mechanisms, and provides a detailed list of technical guidelines for operating systems, applications and networks used in client/server systems.
Home page url
Download or read it online for free here:
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.
by Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.