The Protection of Information in Computer Systems
by J.H. Saltzer, M.D. Schroeder
Publisher: MIT 1975
This tutorial paper explores the mechanics of protecting computer-stored information from unauthorized use or modification. It concentrates on those architectural structures -- whether hardware or software -- that are necessary to support information protection.
Home page url
Download or read it online for free here:
by Georgios Kambourakis, et al. - MDPI AG
Dedicated to the security and privacy aspects of mobile networks, wireless communications, and their apps. The focus is on the security and privacy of mobile software platforms and the increasingly differing spectrum of mobile or wireless apps.
by Tom Szuba - NCES
This guide has been developed for educational administrators at the building, campus, district, system, and state levels. It will help them better understand how to effectively secure their information, software, computer and networking equipment.
by Paul Maher, Alex Mackman - Microsoft Press
This handbook summarises the principal security activities which should be a part of software development processes. It includes identifying security objectives, threat modelling, security design guidelines, security architecture reviews, and more.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.