Selected Aspects of Computer Security in Open Systems
by Danny Smith
Publisher: Australian Computer Emergency Response Team 1993
Number of pages: 201
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. In addition, an examination of common authentication techniques is provided, including a comparison between X.509 Strong Authentication and Kerberos.
This document is no more available for free.
This is an online book for people studying for the CompTIA Security+ exam and for those interested in designing and implementing secure IT environments. The concepts in this book apply equally to Windows, Linux, UNIX, and MacOS X.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
by National Institute of Standards and Technology
The book provides info on securing hardware and software resources of sensitive systems, explains important concepts and interrelationships of security controls. It illustrates the major techniques for each control, and related considerations.