Safeguarding Your Technology
by Tom Szuba
Publisher: NCES 1998
This guide has been developed specifically for educational administrators at the building, campus, district, system, and state levels. It is meant to serve as a framework to help them better understand why, and how, to effectively secure their organization's information, software, and computer and networking equipment.
Home page url
Download or read it online for free here:
by Mitch Tulloch - Microsoft Press
This book is intended as a guide to how to use the powerful security and privacy features of Office 2010 platform effectively. Workers in organizations of all sizes, from small businesses to large enterprises, will benefit from this book.
by Petter Gottschalk - BookBoon
From the table of contents: Introduction; Cyber Crime Defined; Cyber Crime Cases; Child Grooming Case; Crime Protection; Corporate Reputation; Knowledge Management; Intelligence Strategy; Crime Investigations; References.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.