Selected Aspects of Computer Security in Open Systems
by Danny Smith
Publisher: Australian Computer Emergency Response Team 1993
Number of pages: 201
This report examines the threats a computer system might face, and details what tools and techniques are available to combat them. In addition, an examination of common authentication techniques is provided, including a comparison between X.509 Strong Authentication and Kerberos.
This document is no more available for free.
by Kyriacos E. Pavlou, Richard T. Snodgrass - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
by Ross J. Anderson, Ross Anderson - Wiley
The author lays the groundwork on how to build a secure and dependable system. Every security aspect is discussed: passwords, access control, attacks, physical security and policy, information warfare, privacy protection, and more.
This is an introduction to information security aimed primarily at K-12 administrators, educators, and technology staff. Security professionals have found that actions taken to increase security often have a minimal, or even opposite, effect.
by Dan Farmer, Wietse Venema - Addison-Wesley Professional
Forensic information can be found everywhere you look. The authors develop tools to collect information from obvious and not so obvious sources, walk through analyses of real intrusions in detail, and discuss the limitations of their approach.