IT Security Cookbook
by Sean Boran
Publisher: Boran Consulting 2003
This document briefly discusses threat & risk analysis, outlines the ingredients necessary to define a security policy and to provide a framework for deciding how tightly systems need to be secured, outlines policies, processes, structure and responsibilities required in a security organization, presents current security mechanisms, and provides a detailed list of technical guidelines for operating systems, applications and networks used in client/server systems.
Home page url
Download or read it online for free here:
by National Institute of Standards and Technology
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by Stefan A. Brands - The MIT Press
In this book Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security. Such certificates function in much the same way as cinema tickets or subway tokens.
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.