Security Enhanced Applications for Information Systems
by Christos Kalloniatis
Publisher: InTech 2012
Number of pages: 224
Designing and implementing security enhanced systems is of vital importance. This book aims to present a number of innovative security enhanced applications. It involves cases based on the standalone, network and Cloud environments.
Home page url
Download or read it online for free here:
by Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
- The National Academies Press
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies.