The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder
Publisher: MIT 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.
Home page url
Download or read it online for free here:
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
by N. Richard Wagner - Univ. of Texas San Antonio
Indeed, what if crime were impossible? This book explores technological possibilities for society, including controversial techniques like computer surveillance and tracking, and sophisticated identification of individuals.