Publisher: Techotopia 2008
Online book designed for people studying for the CompTIA Security+ exam and for those interested in learning key issues of designing and implementing secure IT environments. Many of the concepts in this book apply equally to a range of popular operating systems including Windows, Linux, UNIX, and MacOS X. On completion of this book the reader will have a clear understanding of both the threats faced by IT infrastructures and the steps involved in planning and implementing a comprehensive multi-layered IT security strategy.
Home page url
Download or read it online for free here:
by Dominick Baier, at al. - Microsoft Press
This book gives you enough information to evaluate claims-based identity as a possible option when you're planning a new application or making changes to an existing one. It is intended for any architect, developer, or IT professional.
by Danny Smith - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
by Kelvin Karanja
An in-depth look at passwords and what they really mean to us; what is their actual role; can it be said that we can't do without passwords, what are their vulnerabilities and what is their effect then on the bigger picture that is Cyber Security.
by Jaydip Sen (ed.) - InTech
The purpose of this book is to present some of the security challenges in today's computing world and to discuss mechanisms for defending against those attacks by using classical and modern approaches of cryptography and other defense mechanisms.