The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder
Publisher: MIT 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.
Home page url
Download or read it online for free here:
by Danny Smith - Australian Computer Emergency Response Team
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. An examination of common authentication techniques is provided, including X.509 Strong Authentication and Kerberos.
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.
by Travis H. - subspacefield.org
This is an online book about computer, network, technical, physical, information and cryptographic security, illustrated with interesting examples. It is not intended to be an introductory text, although a beginner could gain something from it.
by Symeon Xenitellis - OpenCA Team
This document describes Public Key Infrastructures, the PKIX standards, practical PKI functionality and gives an overview of available open-source PKI implementations. Its aim is foster the creation of viable open-source PKI implementations.