The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder
Publisher: MIT 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.
Home page url
Download or read it online for free here:
by Micki Krause, Harold F. Tipton - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
by Danny Smith - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
by Georgios Kambourakis, et al. - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.