Publisher: Techotopia 2008
Online book designed for people studying for the CompTIA Security+ exam and for those interested in learning key issues of designing and implementing secure IT environments. Many of the concepts in this book apply equally to a range of popular operating systems including Windows, Linux, UNIX, and MacOS X. On completion of this book the reader will have a clear understanding of both the threats faced by IT infrastructures and the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.
Home page url
Download or read it online for free here:
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by Micki Krause, Harold F. Tipton - Auerbach Publications
This handbook provides dozens of case studies and analyzes showing you exactly how to protect systems and data using the latest tools. Learn how to take the offensive in the battle against information security threats by seeing how the experts do it.
by WeiQi Yan, Jonathan Weir - BookBoon
This introductory text covers media security, highlighting various types of objective and subjective assessment criteria used to evaluate various multimedia types. Steganography algorithms are detailed along with detection of information hiding.
by Sean Boran - Boran Consulting
This document defines a security policy, outlines structure of a security organization, presents current security mechanisms, and provides technical guidelines for operating systems, applications and networks used in client/server systems.