Cyber Infrastructure Protection
by Tarek N. Saadawi, Louis H. Jordan Jr.
Publisher: Strategic Studies Institute 2011
Number of pages: 324
This book provides an integrated view and a comprehensive framework of the various issues relating to cyber infrastructure protection. It provides the foundation for long-term policy development, a roadmap for cyber security, and an analysis of technology challenges that impede cyber infrastructure protection.
Home page url
Download or read it online for free here:
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
by J.H. Saltzer, M.D. Schroeder - MIT
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures that are necessary to support information protection.
by Sean Boran - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.